Norziana Jamil
Orcid: 0000-0002-7363-1466
According to our database1,
Norziana Jamil
authored at least 36 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A recent advances on autism spectrum disorders in diagnosing based on machine learning and deep learning.
Artif. Intell. Rev., October, 2025
Transfer learning with dual-stage discrete wavelet transform for enhanced visual malware image compression and classification.
J. Supercomput., June, 2025
Extra dimension algorithm: a breakthrough for optimization and enhancing DNN efficiency.
Artif. Intell. Rev., January, 2025
An anonymous and privacy-preserving lightweight authentication protocol for secure communication in UAV-assisted IoAV networks.
Comput. Commun., 2025
Design of a provable secure lightweight privacy-preserving authentication protocol for autonomous vehicles in IoT systems.
Comput. Networks, 2025
2024
A systematic literature review on advanced persistent threat behaviors and its detection strategy.
J. Cybersecur., January, 2024
A Comparative Performance Analysis of Malware Detection Algorithms Based on Various Texture Features and Classifiers.
IEEE Access, 2024
2023
Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection.
IEEE/ACM Trans. Netw., October, 2023
On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM.
J. Inf. Secur. Appl., August, 2023
SIM-P - A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution.
IEEE Internet Things J., 2023
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection.
IEEE Access, 2023
A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications.
IEEE Access, 2023
2022
Symmetry, 2022
J. Inf. Secur. Appl., 2022
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces.
IEEE Access, 2022
Proceedings of the Emerging Information Security and Applications, 2022
2021
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.
Sensors, 2021
Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes.
IEEE Access, 2021
Proceedings of the Advances in Visual Informatics, 2021
Impact Analysis and Correlation Study on the Spread of Fake News During Pandemic COVID-19 in Malaysia.
Proceedings of the Advances in Visual Informatics, 2021
Proceedings of the 11th IEEE International Conference on System Engineering and Technology, 2021
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
2020
Int. J. Crit. Infrastructures, 2020
IACR Cryptol. ePrint Arch., 2020
Contrast Image Quality Assessment Algorithm Based on Probability Density Functions Features.
Proceedings of the Innovative Systems for Intelligent Health Informatics, 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
An Improved Indoor Location Technique Using Combination of Kalman Filter and Centroid Positioning.
J. Commun., 2019
Inf. Comput. Secur., 2019
Towards implementing scalable and reconfigurable SCADA security testbed in power system environment.
Int. J. Crit. Infrastructures, 2019
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations.
Proceedings of the 9th IEEE International Conference on Control System, 2019
2016
New Gener. Comput., 2016
2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013