Fatimah Sidi, A. Jabar Marzanah, Lilly Suriani Affendey, Iskandar Ishak, Nurfadhlina Mohd Sharef, Maslina Zolkepli, Tan Ming Ming, Muhammad Faidhi Abd Mokthi, Maslina Daud, Naqliyah Bt Zainuddin and Rafidah Abdul Hamid
Journal of Engineering and Applied Sciences, 2017, 12(3), 548-554.
This study describes a comparative analysis study conducted on existing approaches, frameworks and relevant references used in field of information security. The purpose of this study is to identify suitable components in developing a threat factor profiling. By having a threat factor profiling, organizations will have a clear understanding of the threats that they face and enable them to implement a proactive incident management program that focuses on the threat components. This study also discusses the proposed threat factor profiling.
ASCI-ID: 157-1604
Journal of Engineering and Applied Sciences, 2018, 13(12 SI), 9400-9402.
Design and Analysis of Secured Electronic Voting ProtocolJournal of Engineering and Applied Sciences, 2012, 7(2), 143-147.
A Novel Approach to Incorporate Efficient Security in Content DistributionJournal of Engineering and Applied Sciences, 2014, 9(5), 190-197.
UAGNI an Intelligent Wildfire Monitoring and Assessment SystemJournal of Engineering and Applied Sciences, 2017, 12(12), 3117-3123.
CRADG: A Chaotic RADG Security SystemJournal of Engineering and Applied Sciences, 2017, 12(16), 4118-4122.
Balancing Sales and Safety: A Methodological Approach to Economic Security Analysis of EnterprisesJournal of Engineering and Applied Sciences, 2017, 12(19), 4974-4978.
A Review: Analysis and Comparison of Different Detection Techniques of IDPSJournal of Engineering and Applied Sciences, 2017, 12(22), 5939-5943.
Secure Password Scheme Using Cryptography, Steganography and Top-K Retrieval ConceptJournal of Engineering and Applied Sciences, 2017, 12(2 SI), 6148-6151.
An Implementation of Honeypots in a Cloud Environment for Analyzing Attacks on WebsitesJournal of Engineering and Applied Sciences, 2017, 12(2 SI), 6208-6214.
Development of Message Threat Model on the Basis of Composition of Fuzzy AutomationsJournal of Engineering and Applied Sciences, 2017, 12(4 SI), 6837-6844.
Data Security in Hadoop: A Technological Perspective and ReviewJournal of Engineering and Applied Sciences, 2017, 12(5 SI), 7069-7073.
Network Security: Internal and External AttacksJournal of Engineering and Applied Sciences, 2017, 12(24), 7494-7500.
Definition of the Method of Determination of the Violator of Information Security in Process of Modeling the Threats of Information Security in the Information Systems of Processing Personal DataJournal of Engineering and Applied Sciences, 2017, 12(6 SI), 7776-7778.
A Study on Improvement of Device Removal Processes from ZigBee NetworkJournal of Engineering and Applied Sciences, 2018, 13(1), 254-258.
Internet of Things (IoT): Architectural Framework for Secure Payment ModeJournal of Engineering and Applied Sciences, 2018, 13(2), 415-421.
Preliminary Study on Security Issues of Online Banking: A Case Study of MalaysiaJournal of Engineering and Applied Sciences, 2018, 13(3), 709-716.
A Study on Information Protection in Hospital Information SystemJournal of Engineering and Applied Sciences, 2018, 13(4), 898-902.
Efficiently Process in Reducing the Load Risk from Security Using ABR (Associate-Based Routing) Routing ProtocolJournal of Engineering and Applied Sciences, 2018, 13(5), 1235-1238.
Transformation of Image Using Wavelet Transform for Image Watermarking of Text in Binary ImagesJournal of Engineering and Applied Sciences, 2017, 12(9 SI), 8652-8656.
Symmetric Key Generation using Integrated System of Multi-Modal Biometrics and User-PasswordJournal of Engineering and Applied Sciences, 2017, 12(9 SI), 8657-8660.
Data Encryption Employing Genetic Algorithm Based on a New Algorithm of Key GeneratorJournal of Engineering and Applied Sciences, 2017, 12(9 SI), 8679-8682.
Penetration Testing: Vulnerability Analysis in a Virtual EnvironmentJournal of Engineering and Applied Sciences, 2017, 12(9 SI), 8723-8729.
UR5 New Symmetrical Algorithm For SecurityJournal of Engineering and Applied Sciences, 2017, 12(12 SI), 9386-9388.
Building a Dynamic Virtual Machines Using KBR Agent for Data Security in Hybrid CloudJournal of Engineering and Applied Sciences, 2017, 12(12 SI), 9400-9404.
Implementation of PS2 Remote Control and Monitoring System for Android Operating System Based Robot PlatformJournal of Engineering and Applied Sciences, 2018, 13(7), 1851-1858.
S-RADG: A Stream Cipher RADG CryptographyJournal of Engineering and Applied Sciences, 2018, 13(1 SI), 2317-2321.
Internet of Things-Proactive Security ApproachJournal of Engineering and Applied Sciences, 2018, 13(9), 2668-2671.
Design and Implementation of Smart Home Security SystemJournal of Engineering and Applied Sciences, 2018, 13(2 SI), 2867-2871.
Security Service Technology in Self-Driving EnvironmentJournal of Engineering and Applied Sciences, 2018, 13(2 SI), 3007-3012.
Combined Theater-Level Command and ControlJournal of Engineering and Applied Sciences, 2018, 13(3 SI), 3255-3260.
Cross Layer Security Approach Using Friendly Jammers in Wireless NetworksJournal of Engineering and Applied Sciences, 2018, 13(4 SI), 3753-3757.
Investigation of Security and Privacy Methods for Public Mobile Cloud ComputingJournal of Engineering and Applied Sciences, 2018, 13(12), 4396-4402.
Smart Network Probes for Campus Network Incident AnalysisJournal of Engineering and Applied Sciences, 2018, 13(9 SI), 6961-6966.
Analysis of Security Attacks on Lightweight Block Ciphers and their CountermeasuresJournal of Engineering and Applied Sciences, 2018, 13(20), 8439-8447.
Analysis of Vulnerability and Security of AI Bluetooth Speaker Connected with IoTJournal of Engineering and Applied Sciences, 2018, 13(11 SI), 8695-8699.
Secure Database Server Handles Spatial LocationJournal of Engineering and Applied Sciences, 2018, 13(12 SI), 9415-9418.
A Study on the Management and Security for a Web-Server System in the Same Area Using the Back-Door Type Private NetworkJournal of Engineering and Applied Sciences, 2018, 13(12 SI), 9491-9496.
Mobile Ad Hoc Networks and Routing Protocols in IoT Enabled Smart Environment: A ReviewJournal of Engineering and Applied Sciences, 2019, 14(3), 802-811.
LA-Based Approach for IoT SecurityJournal of Engineering and Applied Sciences, 2019, 14(3), 951-959.
Burglar Detection using Deep Learning TechniquesJournal of Engineering and Applied Sciences, 2019, 14(8), 2672-2686.
An Updated Hybrid Cryptography Based Security for Cloud Computing SystemJournal of Engineering and Applied Sciences, 2019, 14(10), 3359-3365.
Image and Password Multifactor Authentication Scheme for e-VotingJournal of Engineering and Applied Sciences, 2019, 14(11), 3732-3740.
Blockchain Hash Function for Secure Biometric SystemJournal of Engineering and Applied Sciences, 2019, 14(11), 3797-3805.
Factors Influencing Adoption of Electronic Payment System: Case Study on IraqJournal of Engineering and Applied Sciences, 2019, 14(12), 4235-4241.
An Energy Efficient Cluster based Routing Protocol for MANETs using DCCHSM AlgorithmJournal of Engineering and Applied Sciences, 2019, 14(15), 5287-5296.
Speech Encryption Based on Zaslavsky MapJournal of Engineering and Applied Sciences, 2019, 14(17), 6392-6399.
Design and Implementation of Input/Output Port Blocker System to Thwart Input/Output AttacksJournal of Engineering and Applied Sciences, 2019, 14(19), 7098-7104.
Implicit Drag and Drop Image CAPTCHA for Web SecurityJournal of Engineering and Applied Sciences, 2019, 14(20), 7669-7678.
A Study on the Voice Authentication Security for Recorded Voice through Sound Color Marker AnalysisJournal of Engineering and Applied Sciences, 2019, 14(21), 7922-7927.
An IoT Enabled Home Automation SystemJournal of Engineering and Applied Sciences, 2019, 14(Supplementary 01), 8496-8502.
Internet of Things: A Security Survey Review on Long Range Wide Area Network (LoRaWAN)Journal of Engineering and Applied Sciences, 2019, 14(24), 9774-9787.
High-Assurance Security in Swift ComponentJournal of Engineering and Applied Sciences, 2019, 14(7 SI), 10186-10194.
A Study of Text Steganography MethodsJournal of Engineering and Applied Sciences, 2020, 15(2), 369-372.
SIEM Implementation for Small and Mid-Sized Business EnvironmentsJournal of Engineering and Applied Sciences, 2019, 14(9 SI), 10497-10501.
A Genetic Fuzzy Model for Investigating Security and Trust in E-Commerce with Genetic AlgorithmJournal of Engineering and Applied Sciences, 2020, 15(6), 1445-1450.
McEliece in RADG using Diffie-Hellman Key Exchange Security SystemJournal of Engineering and Applied Sciences, 2020, 15(17), 3138-3145.