Saadiah Yahya

According to our database1, Saadiah Yahya authored at least 14 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A Review of Phone Scam Activities in Malaysia.
Proceedings of the 9th IEEE International Conference on System Engineering and Technology, 2019

2018
Validated agile cost management success factors in software development projects.
Int. J. Adv. Intell. Paradigms, 2018

2016
Deployment models: Enhancing security in cloud computing environment.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

2014
A dynamic approach for device characteristics based on string matching technique.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2012
Device Characteristics and Capabilities Discovery for Multimedia Content.
J. Comput. Networks Commun., 2012

Available Bandwidth Estimation in Network-Aware Applications for Wireless Campus e-Learning System.
J. Comput. Networks Commun., 2012

Enabling trust and privacy for RFID system.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Analysis of Wormhole attack on MANETs using different MANET routing protocols.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

2011
Success Factors in Cost Estimation for Software Development Project.
Proceedings of the Software Engineering and Computer Systems, 2011

A Review of Bio-inspired Algorithms as Image Processing Techniques.
Proceedings of the Software Engineering and Computer Systems, 2011

Trusted anonymizer-based RFID system with integrity verification.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
The System Integrity Verification for Trusted RFID Protocol.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2007
Facial Expression as an Implicit Customers' Feedback and the Challenges.
Proceedings of the 4th International Conference on Computer Graphics, 2007


  Loading...