Norita Md Norwawi

According to our database1, Norita Md Norwawi authored at least 22 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Features Extraction Technique Analysis of EEG Signal for Motor Imagery Classification.
Proceedings of the IEEE International Conference on Artificial Intelligence in Engineering and Technology, 2023

2022
Hybrid intelligent water Drops algorithm for examination timetabling problem.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
An improved artificial bee colony algorithm based on mean best-guided approach for continuous optimization problems and real brain MRI images segmentation.
Neural Comput. Appl., 2021

2019
Detection algorithm for internet worms scanning that used user datagram protocol.
Int. J. Inf. Comput. Secur., 2019

2017
Lexical Disambiguation in Natural Language Questions (NLQs).
CoRR, 2017

2016
A Prototype Mobile Application for Informing Disaster Complaint - "Informer on Site".
Int. J. Interact. Mob. Technol., 2016

2015
One Stop Center For Disaster Training Information In Smartphone Platform: A Mobile Prototype.
Int. J. Interact. Mob. Technol., 2015

Systematic review of web application security development model.
Artif. Intell. Rev., 2015

2014
Wireless landmines tracking system based on GPS and GPRS.
Proceedings of the 6th International Conference of Soft Computing and Pattern Recognition, 2014

Solving University Examination Timetabling Problem Using Intelligent Water Drops Algorithm.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2014

2012
Security metrics to improve misuse case model.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Intelligent Decision Support Model Based on Neural Network to Support Reservoir Water Release Decision.
Proceedings of the Software Engineering and Computer Systems, 2011

Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Integrated computer forensic investigation model based on Malaysian standards.
Int. J. Electron. Secur. Digit. Forensics, 2010

Interacted Multiple Ant Colonies Optimization Framework: an Experimental Study of the Evaluation and the Exploration Techniques to Control the Search Stagnation.
Int. J. Adv. Comp. Techn., 2010

Interacted Multiple Ant Colonies Optimization Approach to Enhance the Performance of Ant Colony Optimization Algorithms.
Comput. Inf. Sci., 2010

Mining the student programming performance using rough set.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

2009
A Traffic Signature-based Algorithm for Detecting Scanning Internet Worms.
Int. J. Commun. Networks Inf. Secur., 2009

Classification of students' performance in computer programming course according to learning style.
Proceedings of the 2nd Conference on Data Mining and Optimization, 2009

Intelligent Anti-Internet Worm Automatically Detect and Update Signatures Server.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Autonomous Notification and Situation Reporting for Flood Disaster Management.
Comput. Inf. Sci., 2008

2006
Web-Based Support System for Flood Response Operation.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006


  Loading...