Wearable technology devices security and privacy vulnerability analysis KW Ching, MM Singh International Journal of Network Security & Its Applications 8 (3), 19-30, 2016 | 149 | 2016 |
Impact of coronavirus pandemic crisis on technologies and cloud computing applications ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a Journal of Electronic Science and Technology 19 (1), 100059, 2021 | 124 | 2021 |
Sensors-enabled smart attendance systems using NFC and RFID technologies CB Chew, M Mahinderjit-Singh, KC Wei, TW Sheng, MH Husin, N Malim Int. J. New Comput. Archit. Appl 5, 19-29, 2015 | 63 | 2015 |
Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment LL Bann, MM Singh, A Samsudin Procedia Computer Science 72, 129-136, 2015 | 32 | 2015 |
SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD) MODEL MM Singh, SS Siang, OY San, N Hashimah, AH Malim, ARM Shariff | 30 | 2014 |
Habituation effects in computer security warning A Amran, ZF Zaaba, MK Mahinderjit Singh Information security journal: A global perspective 27 (4), 192-204, 2018 | 29 | 2018 |
Near Field Communication (NFC) technology security vulnerabilities and countermeasures MM Singh, K Adzman, R Hassan International Journal of Engineering & Technology 7 (4.31), 298-305, 2018 | 28 | 2018 |
Security and privacy risks awareness for bring your own device (BYOD) paradigm MM Singh, CW Chan, Z Zulkefli International Journal of Advanced Computer Science and Applications 8 (2), 2017 | 27 | 2017 |
Trust in RFID-enabled supply-chain management M Mahinderjit-Singh, X Li International Journal of Security and Networks 5 (2-3), 96-105, 2010 | 27 | 2010 |
Usable security: Revealing end-users comprehensions on security warnings A Amran, ZF Zaaba, MM Singh, AW Marashdih Procedia Computer Science 124, 624-631, 2017 | 25 | 2017 |
Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map M Almazrooie, A Samsudin, MM Singh Journal of Information Processing Systems 11 (2), 310-324, 2015 | 24 | 2015 |
Email spam detection: a method of metaclassifiers stacking M ZhiWei, MM Singh, ZF Zaaba The 6th international conference on computing and informatics, 750-757, 2017 | 23 | 2017 |
Security strategies for hindering watering hole cyber crime attack KA Ismail, MM Singh, N Mustaffa, P Keikhosrokiani, Z Zulkefli Procedia Computer Science 124, 656-663, 2017 | 21 | 2017 |
Security analysis of mobile crowd sensing applications NP Owoh, MM Singh Applied Computing and Informatics 18 (1/2), 2-21, 2022 | 19 | 2022 |
Advanced persistent threat mitigation using multi level security–access control framework Z Zulkefli, MM Singh, NHAH Malim Computational Science and Its Applications--ICCSA 2015: 15th International …, 2015 | 19 | 2015 |
Rfid-enabled smart attendance management system M Zhi, M Mahinderjit Singh Future information technology-II, 213-231, 2015 | 17 | 2015 |
Automatic annotation of unlabeled data from smartphone-based motion and location sensors N Pius Owoh, M Mahinderjit Singh, ZF Zaaba Sensors 18 (7), 2134, 2018 | 16 | 2018 |
Investigating the Importance of Implementing Ethical Value on a Healthcare System within a Social Media context. NM R.Khanna, M.Mahinderjit Singh, F. Damanhoori International Journal of Innovation, Creativity and Change 12 (5), 352-368, 2020 | 15 | 2020 |
Typosquat cyber crime attack detection via smartphone Z Zulkefli, MM Singh, ARM Shariff, A Samsudin Procedia Computer Science 124, 664-671, 2017 | 14 | 2017 |
Application of six-sigma for process improvement in manufacturing industries: A case study R Hassan, M Marimuthu, M Mahinderjit-Singh | 14 | 2016 |