Software development life cycle AGILE vs traditional approaches YB Leau, WK Loo, WY Tham, SF Tan International Conference on Information and Network Technology 37 (1), 162-167, 2012 | 309 | 2012 |
Impact of coronavirus pandemic crisis on technologies and cloud computing applications ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a Journal of Electronic Science and Technology 19 (1), 100059, 2021 | 222 | 2021 |
Network security situation prediction: a review and discussion YB Leau, S Manickam Intelligence in the Era of Big Data: 4th International Conference on Soft …, 2015 | 46 | 2015 |
A lightweight and private mobile payment protocol by using mobile network operator TS Fun, LY Beng, J Likoh, R Roslan 2008 International Conference on Computer and Communication Engineering, 162-166, 2008 | 46 | 2008 |
Adaptive path finding algorithm in dynamic environment for warehouse robot MK Ng, YW Chong, K Ko, YH Park, YB Leau Neural Computing and Applications 32, 13155-13171, 2020 | 37 | 2020 |
Security issues on banking systems MKA Ahmad, RV Rosalim, LY Beng, TS Fun International Journal of Computer Science and Information Technologies 1 (4 …, 2010 | 34 | 2010 |
Privacy in new mobile payment protocol TS Fun, LY Beng, R Roslan, HS Habeeb International Journal of Computer and Information Engineering 2 (11), 3713-3717, 2008 | 30 | 2008 |
Hybrid network mobility support in named data networking Z Yan, YJ Park, YB Leau, L Ren-Ting, R Hassan 2020 International Conference on Information Networking (ICOIN), 16-19, 2020 | 26 | 2020 |
Implementation of constraint programming and simulated annealing for examination timetabling problem TL June, JH Obit, YB Leau, J Bolongkikit Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019 | 26 | 2019 |
A novel adaptive grey verhulst model for network security situation prediction YB Leau, S Manickam International Journal of Advanced Computer Science and Applications 7 (1), 2016 | 25 | 2016 |
A survey of intrusion alert correlation and its design considerations L Yu Beng, S Ramadass, S Manickam, T Soo Fun IETE Technical Review 31 (3), 233-240, 2014 | 23 | 2014 |
Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements AK Al-Ani, M Anbar, S Manickam, CY Wey, YB Leau, A Al-Ani Arabian Journal for Science and Engineering 44, 3745-3763, 2019 | 21 | 2019 |
Network security situation assessment: A review and discussion YB Leau, S Manickam, YW Chong Information Science and Applications, 407-414, 2015 | 20 | 2015 |
A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges RT Lee, YB Leau, YJ Park, M Anbar IETE Technical Review 39 (5), 1027-1045, 2022 | 18 | 2022 |
Review of mobile macro-payments schemes TS Fun, LY Beng, MN Razali Journal of Advances in Computer Networks 1 (4), 323-327, 2013 | 18 | 2013 |
Security and integrity attacks in named data networking: a survey MSM Shah, YB Leau, M Anbar, AA Bin-Salem IEEE Access 11, 7984-8004, 2023 | 17 | 2023 |
Hierarchical naming scheme in named data networking for Internet of Things: A review and future security challenges MSM Shah, YB Leau, Z Yan, M Anbar IEEE access 10, 19958-19970, 2022 | 17 | 2022 |
Optimization and decomposition methods in network traffic prediction model: A review and discussion J Shi, YB Leau, K Li, YJ Park, Z Yan IEEE Access 8, 202858-202871, 2020 | 17 | 2020 |
Optimal variational mode decomposition and integrated extreme learning machine for network traffic prediction J Shi, YB Leau, K Li, H Chen IEEE Access 9, 51818-51831, 2021 | 16 | 2021 |
A Review on detection of cross-site scripting attacks (XSS) in web security JM Gan, HY Ling, YB Leau Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 15 | 2021 |