Showing
1 - 11
results of
11
for search '
Buja, A.G
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Buja, A.G
Showing
1 - 11
results of
11
for search '
Buja, A.G
'
, query time: 0.08s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
A security analysis of Iot encryption: Sidechannel cube attack on Simeck32/64
by
Abdul-Latip, S.F
,
Ahmad, R.
,
Buja
,
A.G
Published 2018
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
2
The Direction of Lightweight Ciphers in Mobile Big Data Computing
by
Bordea G.
,
Buja
,
A.G
,
Latip, S.F.A
Published 2015
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
3
Mining social media opinion on online distance learning issues during and after movement control order (MCO) in Malaysia using topic modeling approach
by
Ali Mohd Isa, M.
,
Buja
,
A.G
,
Deraman, N.A
,
Mohd Wahid, S.D
Published 2021
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
4
Assessing the influential factors of cybersecurity awareness in Malaysia during the pandemic outbreak: A structural equation modeling
by
Aziz, A.A
,
Buja
,
A.G
,
Hasrol Jono, M.N.H
,
Wahid, S.D.M
Published 2021
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
5
Soil moisture monitoring for plant irrigation: A botanic tourism sustainability during Covid-19 pandemic
by
Arip, M.A.M
,
Buja
,
A.G
,
Deraman, N.A
,
Jono, M.N.H.H
,
Samah, K.A.F.A
Published 2020
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
6
C19-SmartQ: Applying Real-Time Multi-Organization Queuing Management System Using Predictive Model to Maintain Social Distancing
by
Buja
,
A.G
,
Halim, S.A
,
Othman, M.H
,
Rahid, N.N.A
,
Sharip, A.A
,
Zain, S.M.M
Published 2021
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
7
Development of organization, social and individual cyber security awareness model (Osicsam) for the elderly
by
Aziz, A.A
,
Buja
,
A.G
,
Deraman, N.A
,
Jono, M.N.H.H
,
Rahman, T.F.A
,
Wahid, S.D.M
Published 2021
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
8
Enhancing a mobile application with contextual information delivery using proximity beacon: A preliminary study at a tourist destination
by
Abu Samah, K.A.F
,
Buja
,
A.G
,
Deraman, N.A
,
Hasrol Jono, M.N.H
,
Isa, M.A.M
,
Saad, S.B
Published 2021
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
9
A Method for Web Application Vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm
by
Ali, F.H.M
,
Bordea G.
,
Buja
,
A.G
,
Jalil, K.A
,
Rahman, T.F.A
,
Rozali, N.A
,
Saleh, A.Z.M
Published 2015
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
10
Development of a browser extension for web application vulnerability detection, avoidance, and secure browsing (Vdas)
by
Buja
,
A.G
,
Deraman, N.A
,
Jono, M.N.H.H
,
Khairuddin, N.S
,
Rashid, N.A.M.D
,
Samah, K.A.F.A
Published 2021
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
11
A social media mining using topic modeling and sentiment analysis on tourism in Malaysia during COVID19
by
Buja
,
A.G
,
Deraman, N.A
,
Isa, M.A.M
,
Jono, M.N.H.H
,
Saad, S.
,
Samah, K.A.F.A
,
Wibowo F.W
Published 2021
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Cyber security
Cyber-attack
Information systems
Mobile computing
Tourism
Adult
Advanced technology
Algorithms
Big Data Computing
Big data
Block cipher
Botanic tourism
Browser
Buffer Overflow
Buffer overflows
Buffer storage
COVID-19
Cipher
Cloud Computing
Cloud computing
Communication tools
Computer activities
Computer architecture
Computing technology
Contextual information
Covid-19
Cross site scripting
Cross-Site Request Forgery
Cross-Site Scripting
Cryptography
Loading...