User profiles for Norziana Jamil
Norziana JamilUnited Arab Emirates University and Universiti Tenaga Nasional Verified email at uaeu.ac.ae Cited by 1703 |
Blockchain consensus: An overview of alternative protocols
Blockchain networks are based on cryptographic notions that include asymmetric-key encryption,
hash functions and consensus protocols. Despite their popularity, mainstream protocols…
hash functions and consensus protocols. Despite their popularity, mainstream protocols…
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the area …
confidentiality and integrity. A considerable amount of research has been devoted to the area …
A review of security assessment methodologies in industrial control systems
Purpose The common implementation practices of modern industrial control systems (ICS)
has left a window wide open to various security vulnerabilities. As the cyber-threat landscape …
has left a window wide open to various security vulnerabilities. As the cyber-threat landscape …
Cybersecurity of microgrid: state-of-the-art review and possible directions of future research
The infrastructure of and processes involved in a microgrid electrical system require advanced
technology to facilitate connection among its various components in order to provide the …
technology to facilitate connection among its various components in order to provide the …
Malware threat analysis techniques and approaches for iot applications: A review
CC Uchenna, N Jamil, R Ismail, LK Yan… - Bulletin of Electrical …, 2021 - beei.org
Internet of things (IoT) is a concept that has been widely used to improve business efficiency
and customer’s experience. It involves resource constrained devices connecting to each …
and customer’s experience. It involves resource constrained devices connecting to each …
An improved indoor positioning algorithm based on rssi-trilateration technique for internet of things (iot)
Indoor positioning system (IPS) allows an object to be located and tracked within an indoor
environment. With the introduction of Internet of Things (IoT), the business interest in location-…
environment. With the introduction of Internet of Things (IoT), the business interest in location-…
Determinants of cloud computing integration and its impact on sustainable performance in SMEs: An empirical investigation using the SEM-ANN approach
Although extant literature has thoroughly investigated the incorporation of cloud computing
services, examining their influence on sustainable performance, particularly at the …
services, examining their influence on sustainable performance, particularly at the …
Memory forensics-based malware detection using computer vision and machine learning
Malware has recently grown exponentially in recent years and poses a serious threat to
individual users, corporations, banks, and government agencies. This can be seen from the …
individual users, corporations, banks, and government agencies. This can be seen from the …
[PDF][PDF] A survey of scada testbed implementation approaches
Objectives: SCADA systems are turning into the central nerve system of the electric power
system critical infrastructure. With the increasing availability and use of computer networks …
system critical infrastructure. With the increasing availability and use of computer networks …
Robust malware family classification using effective features and classifiers
Malware development has significantly increased recently, posing a serious security risk to
both consumers and businesses. Malware developers continually find new ways to …
both consumers and businesses. Malware developers continually find new ways to …