Image Item
Image Item
  • EHLS: Beginner to Advanced Ethical Hacking Learning Platform
    Ahmed Ali Ahmed Gubran, Vinesha Selvarajah, Julia Juremi, Vinothini Kasinathan
  • Distributed Denial of Service: Detection Method and Response Strategy
    Reshiwaran jegatheswaran, Julia Juremi
  • Proposal: Mall Parking Application for Central Business District
    Phea Jia Le, Salasiah Sulaiman, Julia Juremi, Leo Gertrude David
  • Utilisation of Unmanned Aerial Vechicle (UAV) Technology in Crime Scene Investigation
    Vinesh Thiruchelvam, Alvin Y. C. Wei, Julia Juremi, Haidhar A. M. Puat, Reshiwaran Jegatheswaran
  • Framework on 4IR Technology in Solving Crime Scene Investigation
    Vinesh Thiruchelvam, Julia Juremi, Alvin Yap Chee Wei , Reshiwaran Jegatheswaran, Haidhar A. M. Puat
  • Millennial Psychology Towards Hacking Activity
    Nor Azlina Abd Rahman, Ibiwani Alisa Hussain, Noris Ismail, Hains Jojo, Yusra Khan
  • CyberGeeksMY: Public Awareness on Website Vulnerability and Proposed Idea of “Smuggy” prototype
    Kua Wee Seng, Yusnita Yusof, Nor Azlina Abd Rahman, Yogeswaran Nathan
  • Implementation of the First E- Commerce Website for Convenience Product in Yemen
    Muheeb Mohammed Qasem, Hairul Aysa Abdul Halim Sithiq, Nor Azlina Abd Rahman
  • Secure Parking and Reservation System Integrated with Car Plate Recognition and QR Code
    Nor Azlina Abd Rahman, Ahmed Bahaj, Hairul Aysa Abdul Halim Sithiq, Intan Farhana Kamsin, Nur Khairunnisha Zainal
  • Smart Parking Reservation Mobile Application
    Chong Chen How, Intan Farana Kamsin, Nur Khairunnisha Zainal, Hairul Aysa Abdul Halim Sithiq, Nor Azlina Abd Rahman
  • Convergence of APCARD and RFID for Attendance System
    Ho Jun Jie, Hairul Aysa Abdul Halim Sithiq, Nor Azlina Abd Rahman
  • Adoption of Future Banking using Biometric Technology in Automated Teller Machine (ATM)
    Yoganandar Chandrasekran, Chandra Reka Ramachandiran, Kurivukulam Chandrasekaran Arun
  • The impact of data analytics in cyber security
    Reshiwaran Jegatheswarn, Julia Juremi
  • Web-based attendance system with OTP implementation
    Luai Ahmed Haidar Al-Mesbahi, Julia Juremi, Mohamed Shabbir Hamza
  • Securing e-commerce against SQL injection, cross site scripting and broken authentication
    Ng Yi Xuan, Julia Juremi, Nurul Husna Mohd Saad
  • Performance evaluation of routing protocols in Zigbee network: DSR vs AODV
    Sharmilla G Vijayan, Kuruvikulum Chandrasekaran Arun
  • Implementation of virtual reality in solving crime scene investigation
    Reshiwaran Jegatheswaran, Chandra Reka Ramachandiran, Julia Juremi
  • Performance evaluation of Wireless and Wired Network Topologies                                                                                                                                                              Pei-Shan Choong, Kuruvikulam Chandrasekaran Arun
  • Comparative performance evaluation of RIP with OSPF routing protocol 
    Zakariyya Abubakar Yau, Kuruvikulam Chandrasekaran Arun

SciVal Publication List

  • Secure MedRecord – Your Medical Record, In Your Pocket
    Choi Kelvin, Julia Juremi, Ma’en Tayseer Ekrayem Alrashd
  • The Application of Electronic Wallet in APU Campus
    Julia Juremi, Mohamad Firdaus Che Abdul Rani, Cheng Ma
  • Understanding of PE Headers and analyzing PE File
    Maxim Demidenko, Alzhan Kaipiyev,Maryam Var Naseri,Yogeswaran A/L Nathan, Nor Afifah Binti Sabri
  • Win-Tri Imager
    Tan Yong Siang, Maryam Var Naseri,Yusnita Yusuf
  • Public Awareness on How Vape is used as a Tool for Hacking
    Nor Azlina Abd Rahman, Mohammad Haziq Roszlan , Serry Khaled , Ameer A.N. Alasaad and Mohammed Salem
  • Dark Web and Drug Trafficking : Technology factors that influence, reduce and prevent drug trafficking
    Md Shakhawat Shafaet Romeo, Nor Azlina Abd Rahman,Wavda Aniva Zabidi,Husin Jazri,Supriya Singh
  • Common Security Protocols for Wireless Networks: A Comparative Analysis
    Muhammad Ehsan Rana, Mohammed Abdulla, Dr Kuruvikulam Chandrasekaran Arun
  • Internet of Things : Smart Sensors, Smart Sensors, Smart Applications and Supportive Technologies for Automation
    Dr Kuruvikulam Chandrasekaran Arun, Mubashir Ali, Muhammad Haroon, Taimoor Ahmad Baig, Alveena Ahmad
  • Big Data Analytics With Machine Learning For IOT Sensed Data
    Dr Kuruvikulam Chandrasekaran Arun, Mubashir Ali, Ghulam Irtaza, Talha Anwar
  • Rice Disease Prevention Using IOT– A Review
    Dr Kuruvikulam Chandrasekaran Arun, Mubashir Ali, Muhammad Haroon, Taimoor Ahmad Baig, Alveena Ahmad
  • A Refined Cyber Crime Investigation Process Model to Cater Traditional and Digital Forensic Investigation
    Leong Zhao Yan, Vinesha Selvarajah ,Maryam Var Naseri
  • A Customized Data Recovery Tool
    Kausalyani A/P Angamutu* , Nor Azlina Abd Rahman and Nik Nurul Ain Nik Suki
  • Nscanner: Vulnerabilities Detection Tool for Web Application
    R. Utaya Surian, Nor Azlina Abd Rahman and Yogeswaran Nathan
  • IoMT: A Review of OpenAPS System Security for Type 1 Diabetes Mellitus
    Jasvindir Singh, Nor Azlina Abd Rahman
  • A Review on IoMT device Vulnerabilities and Countermeasures
    Reshiwaran A/L Jegatheswaran, Isaac Joshua Sakira and Nor Azlina Abd Rahman
  • Ransomware as a service and public awareness
    Haidhar Athir Mohd Puat and Nor Azlina Abd Rahman
  • APU Online Exam Docket System
    Chan Yuan Han , Maryam Var Naseri , Raheem Mafas , Dr. Fatemeh Meskaran
  • Application of Biometric Recognition for Patient Management System
    Normahanim Abu Hassan, Nik Sakinah Nik Ab Aziz, Tanveer Shaikh
  • MyCite indexed journal
  • Bandwidth management system to monitor the internet connection
    Lim Keah Hui, Dr Kamalakannan Machap & Dr Kuruvikulam Chandra sekaran

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.