BYOD: Current state and security challenges M Eslahi, MV Naseri, H Hashim, NM Tahir, EHM Saad 2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014 | 119 | 2014 |
A comparison of lightweight communication protocols in robotic applications MH Amaran, NAM Noh, MS Rohmad, H Hashim Procedia Computer Science 76, 400-405, 2015 | 93 | 2015 |
Robot applications for autism: a comprehensive review MA Saleh, FA Hanapiah, H Hashim Disability and Rehabilitation: Assistive Technology 16 (6), 580-602, 2021 | 75 | 2021 |
Thermal spray coating technology: A review RJ Talib, S Saad, MRM Toff, H Hashim Solid State Sci Technol 11 (1), 109-117, 2003 | 53 | 2003 |
A lightweight and secure TFTP protocol for smart environment MAM Isa, NN Mohamed, H Hashim, SFS Adnan, R Mahmod 2012 International Symposium on Computer Applications and Industrial …, 2012 | 51* | 2012 |
People tracking system using DeepSORT MIH Azhar, FHK Zaman, NM Tahir, H Hashim 2020 10th IEEE international conference on control system, computing and …, 2020 | 46 | 2020 |
An efficient false alarm reduction approach in HTTP-based botnet detection M Eslahi, H Hashim, NM Tahir 2013 IEEE Symposium on Computers & Informatics (ISCI), 201-205, 2013 | 43 | 2013 |
Evaluation of reliable UDP-based transport protocols for Internet of Things (IoT) M Masirap, MH Amaran, YM Yussoff, R Ab Rahman, H Hashim 2016 IEEE Symposium on Computer Applications & Industrial Electronics …, 2016 | 41 | 2016 |
A hybrid anomaly classification with deep learning (DL) and binary algorithms (BA) as optimizer in the intrusion detection system (IDS) K Atefi, H Hashim, T Khodadadi 2020 16th IEEE international colloquium on signal processing & its …, 2020 | 38 | 2020 |
Periodicity classification of HTTP traffic to detect HTTP Botnets M Eslahi, MS Rohmad, H Nilsaz, MV Naseri, NM Tahir, H Hashim 2015 IEEE Symposium on Computer Applications & Industrial Electronics …, 2015 | 38 | 2015 |
Identity-based trusted authentication in wireless sensor network YM Yussoff, H Hashim, MD Baba arXiv preprint arXiv:1207.6185, 2012 | 34 | 2012 |
A review of physical attacks and trusted platforms in wireless sensor networks YM Yussoff, H Hashim, R Rosli, MD Baba Procedia Engineering 41, 580-587, 2012 | 33 | 2012 |
Implementation of quality of service (QoS) in multi protocol label switching (MPLS) networks MRA Rahimi, H Hashim, R Ab Rahman 2009 5th International Colloquium on Signal Processing & Its Applications …, 2009 | 33 | 2009 |
Anomaly analysis for the classification purpose of intrusion detection system with K-nearest neighbors and deep neural network K Atefi, H Hashim, M Kassim 2019 IEEE 7th conference on systems, process and control (ICSPC), 269-274, 2019 | 32 | 2019 |
People detection system using YOLOv3 algorithm NI Hassan, NM Tahir, FHK Zaman, H Hashim 2020 10th IEEE international conference on control system, computing and …, 2020 | 31 | 2020 |
An analysis and comparison for popular video encryption algorithms MA Saleh, NM Tahir, E Hisham, H Hashim 2015 IEEE Symposium on Computer Applications & Industrial Electronics …, 2015 | 30 | 2015 |
Simulation of anaerobic digestion for biogas production from food waste using SuperPro designer N Harun, NA Othman, NA Zaki, NAM Rasul, RA Samah, H Hashim Materials Today: Proceedings 19, 1315-1320, 2019 | 29 | 2019 |
Development of web-based smart security door using qr code system AFM Fauzi, NN Mohamed, H Hashim, MA Saleh 2020 IEEE International Conference on Automatic Control and Intelligent …, 2020 | 26 | 2020 |
Hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: A review NN Mohamed, YM Yussoff, MA Saleh, H Hashim Journal of Information and Communication Technology 19 (3), 279-319, 2020 | 26 | 2020 |
A data collection approach for Mobile Botnet analysis and detection M Eslahi, MR Rostami, H Hashim, NM Tahir, MV Naseri 2014 IEEE symposium on wireless technology and applications (ISWTA), 199-204, 2014 | 26 | 2014 |