Rabiah Ahmad

According to our database1, Rabiah Ahmad authored at least 34 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Peer Online Training (POT) as Learning Activity in Computer Security Audit and Risks Management Teaching Module.
Proceedings of the Knowledge Management in Organisations - 17th International Conference, 2023

2022
A new intelligent multilayer framework for insider threat detection.
Comput. Electr. Eng., 2022

2021
An Emotion and Gender Detection Using Hybridized Convolutional 2D and Batch Norm Residual Network Learning.
Proceedings of the ICIT 2021: IoT and Smart City, Guangzhou, China, December 22 - 25, 2021, 2021

A Review of Digital Forensics Framework for Blockchain in Cryptocurrency Technology.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2018
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers.
IACR Cryptol. ePrint Arch., 2018

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64.
CoRR, 2018

Inclination of Insider Threats' Mitigation and Implementation: Concurrence View from Malaysian Employees.
Proceedings of the Knowledge Management in Organizations - 13th International Conference, 2018

2017
Integrating information quality dimensions into information security risk management (ISRM).
J. Inf. Secur. Appl., 2017

2015
Collective information structure model for Information Security Risk Assessment (ISRA).
J. Syst. Inf. Technol., 2015

A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia.
Inf. Secur. J. A Glob. Perspect., 2015

2014
Effective Measurement Requirements for Network Security Management.
CoRR, 2014

2013
Transmission control Protocol Performance Comparison using Piggyback Scheme in WLANs.
J. Comput. Sci., 2013

A conceptual framework of info structure for information security risk assessment (ISRA).
J. Inf. Secur. Appl., 2013

Feature extraction from epigenetic traits using edge detection in iris recognition system.
Proceedings of the 2013 IEEE International Conference on Signal and Image Processing Applications, 2013

Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Profiling mobile malware behaviour through hybrid malware analysis approach.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
Perception on Cyber Terrorism: A Focus Group Discussion Approach.
J. Information Security, 2012

The Application of Mixed Method in Developing a Cyber Terrorism Framework.
J. Information Security, 2012

Correlated Node Behavior Model based on Semi Markov Process for MANETS
CoRR, 2012

Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Adopting a Knowledge Management Concept in Securing the Privacy of Electronic Medical Record Systems.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012

Correlated node behavior in wireless ad hoc networks: An epidemic model.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Enhancement of Asset value classification for Mobile devices.
Proceedings of the 2012 International Conference on Cyber Security, 2012

A propose technical security metrics model for SCADA systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Understanding cyber terrorism: The grounded theory method applied.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Surveying the Wireless Body Area Network in the realm of wireless communication.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Security threats categories in healthcare information systems.
Health Informatics J., 2010

Fuzzy Based Threat Analysis in Total Hospital Information System.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

A framework for integrated risk management process using survival analysis approach in information security.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Digital Evidence Retrieval and Forensic Analysis on Gambling Machine.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

Threats to Health Information Security.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2004
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people.
Health Informatics J., 2004


  Loading...