Showing
1 - 10
results of
10
for search '
Ithnin, Norafida
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Ithnin, Norafida
Showing
1 - 10
results of
10
for search '
Ithnin, Norafida
'
, query time: 0.06s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Towards an understanding of the collaborative partnership in the Malaysian Electronic Government initiative
by
Ithnin
,
Norafida
Published 2004
Get full text
2
An optimization of tree topology based parallel cryptography
by
Damrudi, Masumeh
,
Ithnin
,
Norafida
Published 2012
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
3
Survey on representation techniques for malware detection system
by
Mohamed, Gamal Abdel Nassir
,
Ithnin
,
Norafida
Published 2017
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
4
Broadcasting in connected and fragmented vehicular Ad Hoc networks
by
Najafzadeh, Sara
,
Ithnin
,
Norafida
,
Abd. Razak, Shukor
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
5
Memorability rates of graphical password schemes
by
Adebola Olukayode, Obasan
,
Ithnin
,
Norafida
,
Ogunnusi, Olumide Simeon
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
6
Memorability features of draw-based graphical passwords
by
Ithnin
,
Norafida
,
Obasan Adebola, O.
,
Chua, Siew Weng
Published 2013
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
7
Physical security framework for power plants in Yemen
by
Al-Aghbari, Anas
,
Ithnin
,
Norafida
,
Ibrahim, Othman
,
Saeed, Faisal
Published 2015
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
8
The approaches to quantify web application security scanners quality: A review
by
Lim, Kah Seng
,
Ithnin
,
Norafida
,
Mohd. Said, Syed Zainudeen
Published 2018
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
9
Graphical password schemes design: enhancing memorability features using autobiographical memories
by
Adebola, Obasan
,
Ithnin
,
Norafida
,
Jali, Mohd. Zalisham
,
Akosu, Nicholas
Published 2013
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
10
Estimation of optimal machining control parameters using artificial bee colony
by
Yusup, Norfadzlan
,
Sarkheyli, Arezoo
,
Mohd. Zain, Azlan
,
Mohd. Hashim, Siti Zaiton
,
Ithnin
,
Norafida
Published 2014
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
QA75 Electronic computers. Computer science
QA76 Computer software
T Technology (General)
Loading...