Impact of coronavirus pandemic crisis on technologies and cloud computing applications ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a Journal of Electronic Science and Technology 19 (1), 100059, 2021 | 223 | 2021 |
Wearable technology devices security and privacy vulnerability analysis KW Ching, MM Singh International Journal of Network Security & Its Applications 8 (3), 19-30, 2016 | 205 | 2016 |
Sensors-enabled smart attendance systems using NFC and RFID technologies CB Chew, M Mahinderjit-Singh, KC Wei, TW Sheng, MH Husin, N Malim Int. J. New Comput. Archit. Appl 5, 19-29, 2015 | 70 | 2015 |
Near Field Communication (NFC) technology security vulnerabilities and countermeasures MM Singh, K Adzman, R Hassan International Journal of Engineering & Technology 7 (4.31), 298-305, 2018 | 43 | 2018 |
Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment LL Bann, MM Singh, A Samsudin Procedia Computer Science 72, 129-136, 2015 | 42 | 2015 |
Habituation effects in computer security warning A Amran, ZF Zaaba, MK Mahinderjit Singh Information security journal: A global perspective 27 (4), 192-204, 2018 | 41 | 2018 |
Security and privacy risks awareness for bring your own device (BYOD) paradigm MM Singh, CW Chan, Z Zulkefli International Journal of Advanced Computer Science and Applications 8 (2), 2017 | 38 | 2017 |
Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework T Jabar, M Mahinderjit Singh Sensors 22 (13), 4662, 2022 | 32 | 2022 |
Security strategies for hindering watering hole cyber crime attack KA Ismail, MM Singh, N Mustaffa, P Keikhosrokiani, Z Zulkefli Procedia Computer Science 124, 656-663, 2017 | 31 | 2017 |
SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD) MODEL MM Singh, SS Siang, OY San, N Hashimah, AH Malim, ARM Shariff | 31 | 2014 |
Security analysis of mobile crowd sensing applications NP Owoh, MM Singh Applied Computing and Informatics 18 (1/2), 2-21, 2022 | 30 | 2022 |
Usable security: revealing end-users comprehensions on security warnings A Amran, ZF Zaaba, MM Singh, AW Marashdih Procedia Computer Science 124, 624-631, 2017 | 29 | 2017 |
Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy ZR Alashhab, M Anbar, MM Singh, IH Hasbullah, P Jain, TA Al-Amiedy Applied Sciences 12 (23), 12441, 2022 | 28 | 2022 |
Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map M Almazrooie, A Samsudin, MM Singh Journal of Information Processing Systems 11 (2), 310-324, 2015 | 28 | 2015 |
Trust in RFID-enabled supply-chain management M Mahinderjit-Singh, X Li International Journal of Security and Networks 5 (2-3), 96-105, 2010 | 28 | 2010 |
Email spam detection: a method of metaclassifiers stacking M ZhiWei, MM Singh, ZF Zaaba The 6th international conference on computing and informatics, 750-757, 2017 | 25 | 2017 |
SenseCrypt: a security framework for mobile crowd sensing applications N Pius Owoh, M Mahinderjit Singh Sensors 20 (11), 3280, 2020 | 23 | 2020 |
Advanced persistent threat mitigation using multi level security–access control framework Z Zulkefli, MM Singh, NHAH Malim Computational Science and Its Applications--ICCSA 2015: 15th International …, 2015 | 22 | 2015 |
Typosquat cyber crime attack detection via smartphone Z Zulkefli, MM Singh, ARM Shariff, A Samsudin Procedia Computer Science 124, 664-671, 2017 | 21 | 2017 |
Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia MM Singh, R Frank, WMNW Zainon Bulletin of Electrical Engineering and Informatics 10 (3), 1658-1668, 2021 | 20 | 2021 |