Search Results - "Fatimah Awang, Nor"
-
1
The impact of big data on firm performance in hotel industry
Published in Electronic commerce research and applications (01-03-2020)“…•The impact of big data on tourism performance is investigated.•TOE and HOT-fit are used for model development.•SEM and ANFIS are used for data analysis.•The…”
Get full text
Journal Article -
2
Method For Generating Test Data For Detecting SQL Injection Vulnerability in Web Application
Published in 2019 7th International Conference on Cyber and IT Service Management (CITSM) (01-11-2019)“…SQL injection is among the most dangerous vulnerabilities in web applications that allow attackers to bypass the authentication and access the application…”
Get full text
Conference Proceeding -
3
Crime Suspect Profiling (CSP) for Forensic Investigation on Smartphone
Published in 2019 4th International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE) (01-11-2019)“…Recently, crime cases have been highly reported due to the increased of the utilization of technology. The development of system aims to identify the probable…”
Get full text
Conference Proceeding -
4
Framework Of Malay Intelligent Autonomous Helper (Min@H): Text, Speech And Knowledge Dimension Towards Artificial Wisdom For Future Military Training System
Published in 2019 1st International Conference on Artificial Intelligence and Data Sciences (AiDAS) (01-09-2019)“…Industrial Revolution 4.0 is expected to improve the way of military training system. Most of the assistant systems use English for their Human Machine…”
Get full text
Conference Proceeding -
5
Trusted computing - opportunities & risks
Published in 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (01-11-2009)“…Computer security is undeniably important in IT era nowdays. Most computer users today are fighting for - either by battling viruses, spam, phishing or other…”
Get full text
Conference Proceeding -
6
Predicting NDUM Student's Academic Performance Using Data Mining Techniques
Published in 2009 Second International Conference on Computer and Electrical Engineering (01-12-2009)“…The ability to predict the students' academic performance is very important in institution educational system. Recently some researchers have been proposed…”
Get full text
Conference Proceeding -
7
Customizing GINA for authentication in virtualization
Published in 2010 International Symposium on Information Technology (01-06-2010)“…GINA is a dynamic link library (DLL) and it is part of the Windows Operating System. GINA not only provides facilities for the user identification and…”
Get full text
Conference Proceeding -
8
Web Vulnerability Assessment: Outsource dilemmas
Published in Proceedings of the 2011 International Conference on Electrical Engineering and Informatics (01-07-2011)“…Vulnerability Assessment (VAS) is a process to search for any potential loopholes contain in a system that lead to compromise it. It is important to do VAS on…”
Get full text
Conference Proceeding