Fiza Abdul Rahim

Orcid: 0000-0001-7746-6843

According to our database1, Fiza Abdul Rahim authored at least 18 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Proposed Multifactor Authentication Framework for SME in Cloud Computing Environment.
Proceedings of the 13th IEEE International Conference on System Engineering and Technology, 2023

2022
Security and Privacy Challenges of Big Data Adoption: A Qualitative Study in Telecommunication Industry.
Int. J. Interact. Mob. Technol., October, 2022

Phishing Attack Types and Mitigation: A Survey.
Proceedings of the Data Science and Emerging Technologies, 2022

2021
Establishing Field of Study: Towards Development of a Multilingual Model for Auto-detection of Cyberbullying Using Fuzzy-Crisp Rules and Internet Crowd Data.
Proceedings of the Advances in Visual Informatics, 2021

Systematic Review of Common Factors Used to Measure Individuals' Career Choice.
Proceedings of the Advances in Visual Informatics, 2021

Identifying the Presence of Cyberbullying in Tamil-English Phonetic Words Using Browser Plugin.
Proceedings of the Advances in Visual Informatics, 2021

A Short Review: Issues and Threats Pertaining the Security of SCADA Systems.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

2020
Healthcare practitioner behaviours that influence unsafe use of hospital information systems.
Health Informatics J., 2020

Safe use of hospital information systems: an evaluation model based on a sociotechnical perspective.
Behav. Inf. Technol., 2020

2019
Endure: Augmented Reality Fitness Mobile Application.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

Smart Vision: Assistive Device for the Visually Impaired Community U sing Online Computer Vision Service.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

A Comparative Study of Data Anonymization Techniques.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

A Survey on Deception Techniques for Securing Web Application.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

A Survey on Privacy Concerns in Blockchain Applications and Current Blockchain Solutions to Preserve Data Privacy.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2014
Information Privacy Concerns in Electronic Medical Records: A Preliminary Investigation.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014

2013
A Conceptual Model for Privacy Preferences in Healthcare Environment.
Proceedings of the 8th International Conference on Knowledge Management in Organizations, 2013


  Loading...