Search Results - "Fatimah Awang, Nor"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    The impact of big data on firm performance in hotel industry by Yadegaridehkordi, Elaheh, Nilashi, Mehrbakhsh, Shuib, Liyana, Hairul Nizam Bin Md Nasir, Mohd, Asadi, Shahla, Samad, Sarminah, Fatimah Awang, Nor

    “…•The impact of big data on tourism performance is investigated.•TOE and HOT-fit are used for model development.•SEM and ANFIS are used for data analysis.•The…”
    Get full text
    Journal Article
  2. 2

    Method For Generating Test Data For Detecting SQL Injection Vulnerability in Web Application by Awang, Nor Fatimah, Jarno, Ahmad Dahari, Marzuki, Syahaneim, Jamaludin, Nor Azliana Akmal, Majid, Khairani Abd, Tajuddin, Taniza

    “…SQL injection is among the most dangerous vulnerabilities in web applications that allow attackers to bypass the authentication and access the application…”
    Get full text
    Conference Proceeding
  3. 3

    Crime Suspect Profiling (CSP) for Forensic Investigation on Smartphone by Tajuddin, Taniza, Manaf, Azizah Abd, Fatimah Awang, Nor, Muhamat Dawam, Siti Rafidah, Rasidah Ali, Noor, Amat, Rafidah

    “…Recently, crime cases have been highly reported due to the increased of the utilization of technology. The development of system aims to identify the probable…”
    Get full text
    Conference Proceeding
  4. 4
  5. 5

    Trusted computing - opportunities & risks by Awang, N.F.B.

    “…Computer security is undeniably important in IT era nowdays. Most computer users today are fighting for - either by battling viruses, spam, phishing or other…”
    Get full text
    Conference Proceeding
  6. 6

    Predicting NDUM Student's Academic Performance Using Data Mining Techniques by Wook, M., Yahaya, Y.H., Wahab, N., Isa, M.R.M., Awang, N.F., Hoo Yann Seong

    “…The ability to predict the students' academic performance is very important in institution educational system. Recently some researchers have been proposed…”
    Get full text
    Conference Proceeding
  7. 7

    Customizing GINA for authentication in virtualization by Ahmad, Siti Rohaidah, Ahmad, Arniyati, Awang, Nor Fatimah, Ghazali, Nik Nur Aisyah Nik

    “…GINA is a dynamic link library (DLL) and it is part of the Windows Operating System. GINA not only provides facilities for the user identification and…”
    Get full text
    Conference Proceeding
  8. 8

    Web Vulnerability Assessment: Outsource dilemmas by Ahmad, A., Ahmad, S. R., Awang, N. F., Ali, Z. M.

    “…Vulnerability Assessment (VAS) is a process to search for any potential loopholes contain in a system that lead to compromise it. It is important to do VAS on…”
    Get full text
    Conference Proceeding