Blockchain technology the identity management and authentication service disruptor: a survey SY Lim, PT Fotsing, A Almasri, O Musa, MLM Kiah, TF Ang, R Ismail International Journal on Advanced Science, Engineering and Information …, 2018 | 199 | 2018 |
Network anomaly detection system: The state of art of network behaviour analysis SY Lim, A Jones 2008 International Conference on Convergence and Hybrid Information …, 2008 | 61 | 2008 |
Security issues and future challenges of cloud service authentication SY Lim, MLM Kiah, TF Ang Acta Polytechnica Hungarica 14 (2), 69-89, 2017 | 51 | 2017 |
Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security HW Kim, SY Lim, HJ Lee 2006 International Conference on Hybrid Information Technology 2, 718-723, 2006 | 41 | 2006 |
Dragon-MAC: Securing wireless sensor networks with authenticated encryption SY Lim, CC Pu, HT Lim, HJ Lee Cryptology ePrint Archive, 2007 | 17 | 2007 |
Trust models for blockchain-based self-sovereign identity management: A survey and research directions SY Lim, OB Musa, BAS Al-Rimy, A Almasri Advances in Blockchain Technology for Cyber Physical Systems, 277-302, 2022 | 12 | 2022 |
Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network. SY Lim, MH Lim J. Ubiquitous Syst. Pervasive Networks 2 (1), 39-47, 2011 | 9 | 2011 |
AuthChain: A Decentralized Blockchain-based Authentication System Shu Yun Lim, Pascal Tankam Fotsing, Omar Musa, Abdullah Almasri International Journal of Engineering Trends and Technology (IJETT), 70-74, 2020 | 8 | 2020 |
Digital evidence case management tool for collaborative digital forensics investigation VR Silvarajoo, SY Lim, P Daud 2021 3rd International Cyber Resilience Conference (CRC), 1-4, 2021 | 6 | 2021 |
Dropbox forensics: forensic analysis of a cloud storage service SY Lim, A Johan, P Daud, N Ismail International Journal of Engineering Trends and Technology (IJETT), 45-49, 2020 | 6 | 2020 |
Propose a simple and practical vehicle logo detection and extraction framework MS Kadhm, LS Yun International Journal of Emerging Tendrs and Technology in Computer Sciences …, 2015 | 4 | 2015 |
UPLX: Blockchain platform for integrated health data management O Musa, LS Yun, R Ismail International Conference of Reliable Information and Communication …, 2020 | 3 | 2020 |
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network SY Lim, MH Lim, SG Lee, HJ Lee 2008 The Fourth International Conference on Information Assurance and …, 2008 | 2 | 2008 |
User Profiling with Virtual Pet for Mobile Device Authentication S Yun Lim, JNM Kho Informatics Engineering and Information Science: International Conference …, 2011 | 1 | 2011 |
An Anomaly-based Intrusion Detection Architecture to Secure Wireless Networks SY Lim, A Jones | 1 | 2009 |
Transfer learning with deep models for small food datasets L Cai, L Tang, S Lim International Conference on Automation Control, Algorithm, and Intelligent …, 2023 | | 2023 |
Can Deep Neural Networks Learn Broad Semantic Concepts of Images? L Cai, S Lim, X Wang, L Tang Genetic and Evolutionary Computing: Proceedings of the Thirteenth …, 2020 | | 2020 |
Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안 SY Lim, CC Pu, HT Lim, HJ Lee 한국해양정보통신학회논문지 11 (8), 1519-1527, 2007 | | 2007 |
Ant Colony Optimization and Data Centric Routing Approach for Sensor Networks SY Lim, EY Lee, SH Park, HJ Lee Journal of the Korea Institute of Information and Communication Engineering …, 2007 | | 2007 |
Securing Wireless Sensor Networks with Stream Cipher EY Lee, SY Lim, HJ Lee 한국통신학회 학술대회논문집, 1129-1132, 2006 | | 2006 |