Image Item
Image Item
  • The impact of data analytics in cyber security
    Reshiwaran Jegatheswarn, Julia Juremi
  • Web-based attendance system with OTP implementation
    Luai Ahmed Haidar Al-Mesbahi, Julia Juremi, Mohamed Shabbir Hamza
  • Securing e-commerce against SQL injection, cross site scripting and broken authentication
    Ng Yi Xuan, Julia Juremi, Nurul Husna Mohd Saad
  • Performance evaluation of routing protocols in Zigbee network: DSR vs AODV
    Sharmilla G Vijayan, Kuruvikulum Chandrasekaran Arun
  • Implementation of virtual reality in solving crime scene investigation
    Reshiwaran Jegatheswaran, Chandra Reka Ramachandiran, Julia Juremi
  • Performance evaluation of Wireless and Wired Network Topologies                                                                                                                                                              Pei-Shan Choong, Kuruvikulam Chandrasekaran Arun
  • Comparative performance evaluation of RIP with OSPF routing protocol 
    Zakariyya Abubakar Yau, Kuruvikulam Chandrasekaran Arun

SciVal Publication List

  • Secure MedRecord – Your Medical Record, In Your Pocket
    Choi Kelvin, Julia Juremi, Ma’en Tayseer Ekrayem Alrashd
  • The Application of Electronic Wallet in APU Campus
    Julia Juremi, Mohamad Firdaus Che Abdul Rani, Cheng Ma
  • Understanding of PE Headers and analyzing PE File
    Maxim Demidenko, Alzhan Kaipiyev,Maryam Var Naseri,Yogeswaran A/L Nathan, Nor Afifah Binti Sabri
  • Win-Tri Imager
    Tan Yong Siang, Maryam Var Naseri,Yusnita Yusuf
  • Public Awareness on How Vape is used as a Tool for Hacking
    Nor Azlina Abd Rahman, Mohammad Haziq Roszlan , Serry Khaled , Ameer A.N. Alasaad and Mohammed Salem
  • Dark Web and Drug Trafficking : Technology factors that influence, reduce and prevent drug trafficking
    Md Shakhawat Shafaet Romeo, Nor Azlina Abd Rahman,Wavda Aniva Zabidi,Husin Jazri,Supriya Singh
  • Common Security Protocols for Wireless Networks: A Comparative Analysis
    Muhammad Ehsan Rana, Mohammed Abdulla, Dr Kuruvikulam Chandrasekaran Arun
  • Internet of Things : Smart Sensors, Smart Sensors, Smart Applications and Supportive Technologies for Automation
    Dr Kuruvikulam Chandrasekaran Arun, Mubashir Ali, Muhammad Haroon, Taimoor Ahmad Baig, Alveena Ahmad
  • Big Data Analytics With Machine Learning For IOT Sensed Data
    Dr Kuruvikulam Chandrasekaran Arun, Mubashir Ali, Ghulam Irtaza, Talha Anwar
  • Rice Disease Prevention Using IOT– A Review
    Dr Kuruvikulam Chandrasekaran Arun, Mubashir Ali, Muhammad Haroon, Taimoor Ahmad Baig, Alveena Ahmad
  • A Refined Cyber Crime Investigation Process Model to Cater Traditional and Digital Forensic Investigation
    Leong Zhao Yan, Vinesha Selvarajah ,Maryam Var Naseri
  • A Customized Data Recovery Tool
    Kausalyani A/P Angamutu* , Nor Azlina Abd Rahman and Nik Nurul Ain Nik Suki
  • Nscanner: Vulnerabilities Detection Tool for Web Application
    R. Utaya Surian, Nor Azlina Abd Rahman and Yogeswaran Nathan
  • IoMT: A Review of OpenAPS System Security for Type 1 Diabetes Mellitus
    Jasvindir Singh, Nor Azlina Abd Rahman
  • A Review on IoMT device Vulnerabilities and Countermeasures
    Reshiwaran A/L Jegatheswaran, Isaac Joshua Sakira and Nor Azlina Abd Rahman
  • Ransomware as a service and public awareness
    Haidhar Athir Mohd Puat and Nor Azlina Abd Rahman
  • APU Online Exam Docket System
    Chan Yuan Han , Maryam Var Naseri , Raheem Mafas , Dr. Fatemeh Meskaran
  • Application of Biometric Recognition for Patient Management System
    Normahanim Abu Hassan, Nik Sakinah Nik Ab Aziz, Tanveer Shaikh
  • MyCite indexed journal
  • Bandwidth management system to monitor the internet connection
    Lim Keah Hui, Dr Kamalakannan Machap & Dr Kuruvikulam Chandra sekaran

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.