default search action
Norziana Jamil
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir, Norziana Jamil, Muhammet Deveci, Saraswathy Shamini Gunasekaran, Rina Azlin Razali:
Extra dimension algorithm: a breakthrough for optimization and enhancing DNN efficiency. Artif. Intell. Rev. 58(1): 13 (2025) - 2024
- [j20]Ismail Taha Ahmed, Baraa Tareq Hammad, Norziana Jamil:
A Comparative Performance Analysis of Malware Detection Algorithms Based on Various Texture Features and Classifiers. IEEE Access 12: 11500-11519 (2024) - [j19]Nur Ilzam Che mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah:
A systematic literature review on advanced persistent threat behaviors and its detection strategy. J. Cybersecur. 10(1) (2024) - 2023
- [j18]Mohamud Ahmed Jimale, Nor Aniza Abdullah, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Muhammad Reza Z'aba, Norziana Jamil, Mohd Saufy Rohmad:
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection. IEEE Access 11: 59661-59674 (2023) - [j17]Abbas M. Al-Ghaili, Saraswathy Shamini Gunasekaran, Norziana Jamil, Zaid Abdi Alkareem Alyasseri, Naif Mohammed Al-Hada, Zul-Azri Bin Ibrahim, Asmidar Abu Bakar, Hairoladenan Kasim, Eghbal Hosseini, Ridha Omar, Rafiziana Md. Kasmani, Rina Azlin Razali:
A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications. IEEE Access 11: 101924-101948 (2023) - [j16]Damilare Peter Oyinloye, Je Sen Teh, Norziana Jamil, Jiashen Teh:
SIM-P - A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution. IEEE Internet Things J. 10(6, March 15): 5083-5094 (2023) - [j15]Weijian Teng, Je Sen Teh, Norziana Jamil:
On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM. J. Inf. Secur. Appl. 76: 103531 (2023) - [j14]Tinghao Zhang, Kwok-Yan Lam, Jun Zhao, Feng Li, Huimei Han, Norziana Jamil:
Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection. IEEE/ACM Trans. Netw. 31(5): 1981-1996 (2023) - 2022
- [j13]Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad:
Authenticated Encryption Schemes: A Systematic Review. IEEE Access 10: 14739-14766 (2022) - [j12]Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad:
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces. IEEE Access 10: 50819-50838 (2022) - [j11]Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap:
New differential cryptanalysis results for the lightweight block cipher BORON. J. Inf. Secur. Appl. 66: 103129 (2022) - [j10]Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan:
Memory Visualization-Based Malware Detection Technique. Sensors 22(19): 7611 (2022) - [j9]Baraa Tareq Hammad, Ismail Taha Ahmed, Norziana Jamil:
A Steganalysis Classification Algorithm Based on Distinctive Texture Features. Symmetry 14(2): 236 (2022) - [c10]Yen Yee Chan, Cher-Yin Khor, Je Sen Teh, Weijian Teng, Norziana Jamil:
Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB. EISA 2022: 55-67 - [i3]Tinghao Zhang, Kwok-Yan Lam, Jun Zhao, Feng Li, Huimei Han, Norziana Jamil:
Enhancing Federated Learning with spectrum allocation optimization and device selection. CoRR abs/2212.13544 (2022) - 2021
- [j8]Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen:
Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes. IEEE Access 9: 134052-134064 (2021) - [j7]Mohammad Shamsul Hoque, Norziana Jamil, Nowshad Amin, Kwok-Yan Lam:
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding. Sensors 21(12): 4220 (2021) - [j6]Damilare Peter Oyinloye, Je Sen Teh, Norziana Jamil, Moatsum Alawida:
Blockchain Consensus: An Overview of Alternative Protocols. Symmetry 13(8): 1363 (2021) - [c9]Qais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi, Zaihisma Che Cob, Fiza Abdul Rahim, Lariyah Mohd Sidek:
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. ACeS 2021: 230-247 - [c8]Ismail Taha Ahmed, Baraa Tareq Hammad, Norziana Jamil:
Effective Deep Features for Image Splicing Detection. ICSET 2021: 189-193 - [c7]Qais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi:
Symptoms-Based Network Intrusion Detection System. IVIC 2021: 482-494 - [c6]Ahmad Qayyim Nordin, Norziana Jamil, Zuhaira Muhammad Zain, Md Nabil Ahmad Zawawi:
Impact Analysis and Correlation Study on the Spread of Fake News During Pandemic COVID-19 in Malaysia. IVIC 2021: 495-507 - [i2]Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap:
New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON. IACR Cryptol. ePrint Arch. 2021: 1640 (2021) - 2020
- [j5]Qais Saif Qassim, Norziana Jamil, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman:
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system. Int. J. Crit. Infrastructures 16(2): 91-106 (2020) - [c5]Collins Uchenna Chimeleze, Norziana Jamil, Roslan Ismail, Kwok-Yan Lam:
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction. ACeS 2020: 354-370 - [c4]Qais Saif Qassim, Norziana Jamil, Maslina Daud, Norhamadi Ja'affar, Wan Azlan Wan Kamarulzaman, Mohammed Najah Mahdi:
Compromising the Data Integrity of an Electrical Power Grid SCADA System. ACeS 2020: 604-626 - [c3]Ismail Taha Ahmed, Soong-Der Chen, Norziana Jamil, Baraa Tareq Hammad:
Contrast Image Quality Assessment Algorithm Based on Probability Density Functions Features. IRICT 2020: 1030-1040 - [i1]Ting Rong Lee, Je Sen Teh, Jasy Suet Yan Liew, Norziana Jamil, Jiageng Chen:
Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models. IACR Cryptol. ePrint Arch. 2020: 1235 (2020)
2010 – 2019
- 2019
- [j4]Qais Saif Qassim, Norziana Jamil, Maslina Daud, Hafizah Che Hasan:
Towards implementing scalable and reconfigurable SCADA security testbed in power system environment. Int. J. Crit. Infrastructures 15(2): 91-120 (2019) - [j3]Qais Saif Qassim, Norziana Jamil, Maslina Daud, Ahmed Patel, Norhamadi Ja'affar:
A review of security assessment methodologies in industrial control systems. Inf. Comput. Secur. 27(1): 47-61 (2019) - [j2]Nik Fariz Nik Ahmad Aziz, Norziana Jamil, Marina Md. Din:
An Improved Indoor Location Technique Using Combination of Kalman Filter and Centroid Positioning. J. Commun. 14(1): 17-25 (2019) - [c2]Razali Jidin, M. Reyasudin Basir Khan, Norziana Jamil, Ibrahim Al-Bahadly:
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations. ICCSCE 2019: 99-103 - 2016
- [j1]Herman Isa, Norziana Jamil, Muhammad Reza Z'aba:
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance. New Gener. Comput. 34(3): 221-238 (2016) - 2013
- [c1]Herman Isa, Norziana Jamil, Muhammad Reza Z'aba:
S-box construction from non-permutation power functions. SIN 2013: 46-53
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint