Analytics Driven Security Operation Center Based on Zero-Trust Framework Led by Pandemic
AUTHORS:
Akram Bin Abdul Rahman
Siti Arpah Ahmad
Mobile Application Clone Detection Using Digital Signature
AUTHORS:
Emir Fikri Bin Roslan
Kamarulariffin Abd Jalil
Tail-Gating Detection Using Software Based Solution in Physical Access Control System
AUTHORS:
Hairul Fadzli Bin Ab Razak
Mohd Izani Mohamed Rawi
Intrusion Detection System (IDS) Implementation in Cloud Computing
AUTHORS:
Mohammad Ikmal Bin Abdul Rahman
Nor Shahniza Kamal Bashah
Management Initiative Plan on Work from Home from Cyber Security Perspective in Malaysia Context
AUTHORS:
Mohd Alif Erfan Bin Mohd Efendi
Nurul Huda binti Nik Zulkipli
Securing E-Wallet Transaction Over MiTM Attacks by Enhancing the Payment Sanction Method
AUTHORS:
Mohd Mahfudz Bin Tahir
Nurul Huda binti Nik Zulkipli
A Malware Attack Mitigation Method in Raspberry Pi IoT Environment
AUTHORS:
Muhamad Fakhrul Razy Bin Faizul
Mohd. Yusof Darus
Impact Of Covid-19 Pandemic Towards Phishing Attack Pattern
AUTHORS:
Muhammad Aiman Bin Sharul Nizam
Norkhushaini Awang
A Lightweight Source Code Scanning Application for Securing Application Layer Using Python
AUTHORS:
Muhammad Farhan Bin Bolhan
Mohd. Yusof Darus
Private Blockchain Integration in Digital Forensics for Preservation of Evidences
AUTHORS:
Muhammad Hafizuddin Bin Mohd Padzli
Nurul Huda bt Nik Zulkipli
Bring Your Own Device (BYOD) Security Compliance Model Validation Using Hybrid Approach
AUTHORS:
Noor Sabariah Salleh
Norkhushaini Awang
Comparison Between Manual and Automatic Software Testing for Web
AUTHORS:
Nur Hazirah Binti Rosli
Siti Arpah Ahmad
A Hybrid Solution to DDoS Attacks on Cryptocurrency Using Mempool Optimization
AUTHORS:
Nurul Camelia Binti Bidi
Jasni Binti Mohamad Zain
Securing Digital Evidence in Cybercrime Investigation with Blockchain
AUTHORS:
Raja Muhammad Hanif Bin Raja Rizal Iskandar
Fakariah Hani Mohd Ali
Brought to you by:Â