Norafida Ithnin

Orcid: 0000-0001-8537-5343

According to our database1, Norafida Ithnin authored at least 22 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
CFaaS: bilaterally agreed evidence collection.
J. Cloud Comput., 2018

2016
Factors influencing cloud computing adoption for e-government implementation in developing countries: Instrument development.
J. Syst. Inf. Technol., 2016

2015
A multi-criteria recommendation system using dimensionality reduction and Neuro-Fuzzy techniques.
Soft Comput., 2015

Clustering- and regression-based multi-criteria collaborative filtering with incremental updates.
Inf. Sci., 2015

A multi-criteria collaborative filtering recommender system for the tourism domain using Expectation Maximization (EM) and PCA-ANFIS.
Electron. Commer. Res. Appl., 2015

2014
Multi-criteria collaborative filtering with high accuracy using higher order singular value decomposition and Neuro-Fuzzy system.
Knowl. Based Syst., 2014

Estimation of optimal machining control parameters using artificial bee colony.
J. Intell. Manuf., 2014

Hybrid recommendation approaches for multi-criteria collaborative filtering.
Expert Syst. Appl., 2014

Towards managing information security knowledge through metamodelling approach.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Object Tracking Methods in Wireless Sensor Network: Network Structure Classification.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2013
Enhancing the Conventional Information Security Management Maturity Model (ISM3) in Resolving Human Factors in Organization Information Sharing.
CoRR, 2013

People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization.
CoRR, 2013

2012
Competency based Education (CBE) for IT Security: Towards Bridging the Gap.
Int. J. Eng. Pedagog., 2012

Bio-Thentic Card: Authentication concept for RFID Card
CoRR, 2012

Users Authentication and Privacy control of RFID Card
CoRR, 2012

2011
Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device.
Comput. Inf. Sci., 2011

2010
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks.
Int. J. Adv. Comp. Techn., 2010

Existing Recognition Base Usability Features of the Graphical Password.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010

2008
Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2006
The Acceptance Behavior of Online Recruitment Users in Malaysia.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

2004
Effective collaborative partnership for Malaysian electronic government service delivery.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

An interconnected success factor approach for service functional in Malaysian electronic government.
Proceedings of the 6th International Conference on Electronic Commerce, 2004


  Loading...