关注
Leau Yu Beng
Leau Yu Beng
Associate Professor, Faculty of Computing and Informatics; Head of Cybersecurity Research Lab
在 ums.edu.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
Software development life cycle AGILE vs traditional approaches
YB Leau, WK Loo, WY Tham, SF Tan
International Conference on Information and Network Technology 37 (1), 162-167, 2012
2972012
Impact of coronavirus pandemic crisis on technologies and cloud computing applications
ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a
Journal of Electronic Science and Technology 19 (1), 100059, 2021
1882021
Network security situation prediction: a review and discussion
YB Leau, S Manickam
Intelligence in the Era of Big Data: 4th International Conference on Soft …, 2015
462015
A lightweight and private mobile payment protocol by using mobile network operator
TS Fun, LY Beng, J Likoh, R Roslan
2008 International Conference on Computer and Communication Engineering, 162-166, 2008
462008
Adaptive path finding algorithm in dynamic environment for warehouse robot
MK Ng, YW Chong, K Ko, YH Park, YB Leau
Neural Computing and Applications 32, 13155-13171, 2020
302020
Security issues on banking systems
MKA Ahmad, RV Rosalim, LY Beng, TS Fun
International Journal of Computer Science and Information Technologies 1 (4 …, 2010
302010
Privacy in new mobile payment protocol
TS Fun, LY Beng, R Roslan, HS Habeeb
International Journal of Computer and Information Engineering 2 (11), 3713-3717, 2008
292008
Hybrid network mobility support in named data networking
Z Yan, YJ Park, YB Leau, L Ren-Ting, R Hassan
2020 International Conference on Information Networking (ICOIN), 16-19, 2020
242020
Implementation of constraint programming and simulated annealing for examination timetabling problem
TL June, JH Obit, YB Leau, J Bolongkikit
Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019
242019
A novel adaptive grey verhulst model for network security situation prediction
YB Leau, S Manickam
International Journal of Advanced Computer Science and Applications 7 (1), 2016
232016
Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements
AK Al-Ani, M Anbar, S Manickam, CY Wey, YB Leau, A Al-Ani
Arabian Journal for Science and Engineering 44, 3745-3763, 2019
222019
A survey of intrusion alert correlation and its design considerations
L Yu Beng, S Ramadass, S Manickam, T Soo Fun
IETE Technical Review 31 (3), 233-240, 2014
222014
Network security situation assessment: A review and discussion
YB Leau, S Manickam, YW Chong
Information Science and Applications, 407-414, 2015
182015
Review of mobile macro-payments schemes
TS Fun, LY Beng, MN Razali
Journal of Advances in Computer Networks 1 (4), 323-327, 2013
182013
Optimal variational mode decomposition and integrated extreme learning machine for network traffic prediction
J Shi, YB Leau, K Li, H Chen
IEEE Access 9, 51818-51831, 2021
152021
A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges
RT Lee, YB Leau, YJ Park, M Anbar
IETE Technical Review 39 (5), 1027-1045, 2022
142022
Hierarchical naming scheme in named data networking for Internet of Things: A review and future security challenges
MSM Shah, YB Leau, Z Yan, M Anbar
IEEE access 10, 19958-19970, 2022
132022
Rom-p: Route optimization management of producer mobility in information-centric networking
L Xian Wee, Z Yan, YJ Park, YB Leau, K Nisar, AA Ag Ibrahim
Intelligent Transport Systems, From Research and Development to the Market …, 2019
132019
Security issues on identity card in Malaysia
YA Kee, YC Nee, LY Beng, TS Fun
International Journal of Engineering and Technology 4 (5), 617, 2012
132012
Optimization and decomposition methods in network traffic prediction model: A review and discussion
J Shi, YB Leau, K Li, YJ Park, Z Yan
IEEE Access 8, 202858-202871, 2020
122020
系统目前无法执行此操作,请稍后再试。
文章 1–20