Nazri Kama

Orcid: 0000-0003-2535-3438

According to our database1, Nazri Kama authored at least 50 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems.
IEEE J. Biomed. Health Informatics, May, 2023

A multivocal literature review on record management potential components in CRUD operation for web application development.
Int. J. Model. Simul. Sci. Comput., April, 2023

Integrating user experience assessment in Re-CRUD console framework development.
Wirel. Networks, 2023

TRUTH: Trust and Authentication Scheme in 5G-IIoT.
IEEE Trans. Ind. Informatics, 2023

Methods for Application Development by Non-Programmers: A Systematic Literature Review.
Proceedings of the 5th World Symposium on Software Engineering, 2023

Data Exchange Interoperability Protocol for Electric Vehicle Charging Systems Infrastructure.
Proceedings of the 20th IEEE International Conference on Smart Technologies, 2023

2022
PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-Based 6G Networking.
IEEE Trans. Ind. Informatics, 2022

Software effort estimation accuracy prediction of machine learning techniques: A systematic performance evaluation.
Softw. Pract. Exp., 2022

A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET.
Ad Hoc Networks, 2022

2021
A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET.
Veh. Commun., 2021

An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network.
Complex., 2021

ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map.
IEEE Access, 2021

2020
A Hybrid Prediction Model for Energy-Efficient Data Collection in Wireless Sensor Networks.
Symmetry, 2020

A Trust Model Using Edge Nodes and a Cuckoo Filter for Securing VANET under the NLoS Condition.
Symmetry, 2020

A systematic review of studies on use case points and expert-based estimation of software development effort.
J. Softw. Evol. Process., 2020

Recent Analysis of Forged Request Headers Constituted by HTTP DDoS.
Sensors, 2020

An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET.
Sci. China Inf. Sci., 2020

Crytojacking Classification based on Machine Learning Algorithm.
Proceedings of the ICCBN 2020: 8th International Conference on Communications and Broadband Networking, 2020

2019
Determinants of master data management adoption by local government organizations: An empirical study.
Int. J. Inf. Manag., 2019

Critical influential determinants of IT innovation adoption at organisational level in local government context.
IET Softw., 2019

Using static and dynamic impact analysis for effort estimation.
Int. Arab J. Inf. Technol., 2019

Data collection using unmanned aerial vehicles for Internet of Things platforms.
Comput. Electr. Eng., 2019

Customer Churn Prediction In Telecommunication Industry Using Machine Learning Classifiers.
Proceedings of the ICVISP 2019: 3rd International Conference on Vision, 2019

A New Cryptojacking Malware Classifier Model Based on Dendritic Cell Algorithm.
Proceedings of the ICVISP 2019: 3rd International Conference on Vision, 2019

Estimating Change Effort Using a Combination of Change Impact Analysis Technique with Function Point Analysis.
Proceedings of the 2019 8th International Conference on Software and Information Engineering, 2019

2018
Self-Organizing Traffic Flow Prediction with an Optimized Deep Belief Network for Internet of Vehicles.
Sensors, 2018

State of the Art Intrusion Detection System for Cloud Computing.
Int. J. Commun. Networks Inf. Secur., 2018

Social Media for Medical and Health Information: Malaysian Medical Tourism Hospital.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018

An Empirical Study with Function Point Analysis for Software Development Phase Method.
Proceedings of the 7th International Conference on Software and Information Engineering, 2018

Extending Function Point Analysis Effort Estimation Method for Software Development Phase.
Proceedings of the 7th International Conference on Software and Computer Applications, 2018

Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System.
Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, 2018

2017
CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism.
Int. J. Commun. Networks Inf. Secur., 2017

Applying Data Analytics Approach in Systematic Literature Review: Master Data Management Case Study.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2017

Assessing the Capability and Priority of Enterprise Architecture Implementation in Malaysian Public Sector.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Issues of Using Function Point Analysis Method for Requirement Changes During Software Development Phase.
Proceedings of the Requirements Engineering for Internet of Things, 2017

2016
Using static and dynamic impact analysis for effort estimation.
IET Softw., 2016

Predicting effort for requirement changes during software development.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016

Enterprise architecture implementation model: Measurement from experts and practitioner perspectives.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

Assessment of Enterprise Architecture Implementation Capability and Priority in Public Sector Agency.
Proceedings of the International Conference on ENTERprise Information Systems/International Conference on Project MANagement/International Conference on Health and Social Care Information Systems and Technologies, 2016

An Algorithmic-Based Change Effort Estimation Model for Software Development.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

2015
A Change Impact Analysis Tool: Integration Between Static and Dynamic Analysis Techniques.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015

HMAC Authentication Mechanisms in a Grid Computing Environment Using Gridsim Toolkit.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015

2014
Action Driven Decision Modeling Framework towards Formulating Software Project Management Tacit Knowledge.
J. Softw., 2014

Considering Partially Developed Artifacts in Change Impact Analysis Implementation.
J. Softw., 2014

An Evaluation of COCHCOMO Tool for Change Effort Estimation in Software Development Phase.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2014

COCHCOMO: A Change Effort Estimation Tool for Software Development Phase.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2014

2013
A Change Impact Size Estimation Approach during the Software Development.
Proceedings of the 22nd Australian Conference on Software Engineering (ASWEC 2013), 2013

2012
A Change Impact Analysis Approach for the Software Development Phase.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2010
Impact Analysis using Class Interaction Prediction Approach.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010

Considering Patterns in Class Interactions Prediction.
Proceedings of the Advances in Software Engineering, 2010


  Loading...