Adaptive authentication based on analysis of user behavior KAA Bakar, GR Haron 2014 Science and Information Conference, 601-606, 2014 | 32 | 2014 |
Adaptive authentication: Issues and challenges KAA Bakar, GR Haron 2013 World Congress on Computer and Information Technology (WCCIT), 1-6, 2013 | 29 | 2013 |
Adaptive authentication: Implementing random canvas fingerprinting as user attributes factor NI Daud, GR Haron, SSS Othman 2017 IEEE Symposium on Computer Applications & Industrial Electronics …, 2017 | 26 | 2017 |
User behaviour and interactions for multimodal authentication GR Haron, D Maniam, LM Nen, NI Daud 2016 14th Annual Conference on Privacy, Security and Trust (PST), 309-316, 2016 | 10 | 2016 |
Re-engineering of web reverse proxy with shibboleth authentication GR Haron, D Maniam, V Sadasivam, WH Loon 2012 International Conference for Internet Technology and Secured …, 2012 | 7 | 2012 |
A centralized multimodal unified authentication platform for web-based application SC Seak, NK Siong, WH Loon, GR Haron Proceedings of the World Congress on Engineering and Computer Science 1, 2014 | 6 | 2014 |
Extrapolating security requirements to an established software process: Version 1.0 GR Haron, NK Siong 2011 International Conference for Internet Technology and Secured …, 2011 | 6 | 2011 |
Revisiting secure documents with xml security: A component-based approach GR Haron, D Maniam, STS Ngiap 2010 Developments in E-systems Engineering, 257-262, 2010 | 6 | 2010 |
Adaptive Authentication to determine login attempt penalty from multiple input sources NI Daud, GR Haron, D Din 2019 IEEE Conference on Application, Information and Network Security (AINS …, 2019 | 4 | 2019 |
Context-Aware analysis for adaptive unified authentication platform KAA Bakar, GR Haron Proceedings of the 5Th International Conference on Computing & Informatics …, 2015 | 3 | 2015 |
Translation of RFC 3820 to software codes using OpenSSL primitives GR Haron, NK Siong, TF Bee Proceedings of the Fourth IASTED International Advances in Computer Science …, 2008 | 3 | 2008 |
Narrative of digital signature technology and moving forward GR Haron, NI Daud, MS Mohamad Int J Intell Comput Res (IJICR) 10 (3), 2019 | 1 | 2019 |
Executing security scanning in secure software process implementation within organization NI Daud, SC Seak, GR Haron Presented at International Association of Science and Technology for Development, 2011 | 1 | 2011 |
Extending security token to directly issue proxy certificate on P-GRADE portal GR Haron, NK Siong, SC Seak, TF Bee 2009 IEEE Symposium on Industrial Electronics & Applications 2, 979-984, 2009 | 1 | 2009 |
Improvement from Proof Of Concept into the production environment: cater for highperformance capability NI Daud, GR Haron, D Din, MS Mohamad 2020 8th International Conference on Information Technology and Multimedia …, 2020 | | 2020 |
Context-aware analysis for adaptive unified authentication platform KA Abu Bakar, GR Haron | | 2015 |
Introducing Pandanaceae Via IOS-Based Software Application HF Mohsin, I Abdul Wahab, GR Haron ICGSCE 2014: Proceedings of the International Conference on Global …, 2015 | | 2015 |
Improvement and Enhancement in Configuration Management Process Area within the Organization NI Daud, RA Bakar, GR Haron International Workshop on CMMI based Software Process Improvement in Small …, 2011 | | 2011 |
Issuance of Proxy Certificate Residing In Web Portal By Browser Based Digital Certificate Through HyperText Transfer Protocol SC Seak, NK Siong, TF Bee, GR Haron Proceedings of the International MultiConference of Engineers and Computer …, 2009 | | 2009 |
Fostering evolutionary solution for Grid security with MyKad N Abdullah, HA Shahrom, GR Haron 2008 International Symposium on Information Technology 3, 1-5, 2008 | | 2008 |