Norziana Jamil

Orcid: 0000-0002-7363-1466

According to our database1, Norziana Jamil authored at least 30 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A systematic literature review on advanced persistent threat behaviors and its detection strategy.
J. Cybersecur., January, 2024

A Comparative Performance Analysis of Malware Detection Algorithms Based on Various Texture Features and Classifiers.
IEEE Access, 2024

2023
Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection.
IEEE/ACM Trans. Netw., October, 2023

On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM.
J. Inf. Secur. Appl., August, 2023

SIM-P - A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution.
IEEE Internet Things J., 2023

Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection.
IEEE Access, 2023

A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications.
IEEE Access, 2023

2022
A Steganalysis Classification Algorithm Based on Distinctive Texture Features.
Symmetry, 2022

Memory Visualization-Based Malware Detection Technique.
Sensors, 2022

New differential cryptanalysis results for the lightweight block cipher BORON.
J. Inf. Secur. Appl., 2022

Enhancing Federated Learning with spectrum allocation optimization and device selection.
CoRR, 2022

Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces.
IEEE Access, 2022

Authenticated Encryption Schemes: A Systematic Review.
IEEE Access, 2022

Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB.
Proceedings of the Emerging Information Security and Applications, 2022

2021
Blockchain Consensus: An Overview of Alternative Protocols.
Symmetry, 2021

An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.
Sensors, 2021

Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes.
IEEE Access, 2021

Symptoms-Based Network Intrusion Detection System.
Proceedings of the Advances in Visual Informatics, 2021

Impact Analysis and Correlation Study on the Spread of Fake News During Pandemic COVID-19 in Malaysia.
Proceedings of the Advances in Visual Informatics, 2021

Effective Deep Features for Image Splicing Detection.
Proceedings of the 11th IEEE International Conference on System Engineering and Technology, 2021

2020
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system.
Int. J. Crit. Infrastructures, 2020

Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models.
IACR Cryptol. ePrint Arch., 2020

Compromising the Data Integrity of an Electrical Power Grid SCADA System.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
An Improved Indoor Location Technique Using Combination of Kalman Filter and Centroid Positioning.
J. Commun., 2019

A review of security assessment methodologies in industrial control systems.
Inf. Comput. Secur., 2019

Towards implementing scalable and reconfigurable SCADA security testbed in power system environment.
Int. J. Crit. Infrastructures, 2019

Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations.
Proceedings of the 9th IEEE International Conference on Control System, 2019

2016
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance.
New Gener. Comput., 2016

2013
S-box construction from non-permutation power functions.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013


  Loading...