Rahim, Nor Zairah Ab
22  results:
Search for persons X
?
1

Ransomware Attacks: Tools and Techniques for Detection:

, In: 2024 2nd International Conference on Cyber Resilience (ICCR),
 
?
3

Empowered corrosion-resistant products through HCP crystal ..:

Hamid, Khalid ; Ayub, Nasir ; Delshadi, Mohammad Amir...
Indonesian Journal of Electrical Engineering and Computer Science.  34 (2024)  3 - p. 1544 , 2024
 
?
4

Knowledge Communication in Government ICT Projects: A Cross..:

, In: Knowledge Management in Organisations; Communications in Computer and Information Science,
 
?
5

Extending the Occupational Safety and Health Management Sys..:

, In: Knowledge Management in Organisations; Communications in Computer and Information Science,
 
?
6

Adoption of Open Government Data in Local Government Contex..:

, In: Proceedings of the 2019 5th International Conference on Computer and Technology Applications,
 
?
7

Between Habit and Addiction : An Overview of Preliminary..:

, In: Proceedings of the 2019 5th International Conference on Computer and Technology Applications,
 
?
9

It's a bird… It's a plane… It's a drone…: Telecommunication..:

, In: 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS),
 
?
10

Knowledge Communication Model: Malaysian Public Service Phe..:

, In: Communications in Computer and Information Science; Knowledge Management in Organizations,
 
?
11

Towards the Development of a Citizens' Trust Model in Using..:

, In: Advances in Intelligent Systems and Computing; Recent Trends in Data Science and Soft Computing,
 
?
12

Factors influencing knowledge communication in Malaysian pu..:

, In: 2017 International Conference on Research and Innovation in Information Systems (ICRIIS),
 
?
15

The Impact of UTAUT Model and ICT Theoretical Framework on ..:

David, Oye Nathaniel ; N., A. Iahad ; Ab.Rahim, Nor Zairah
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY.  2 (2012)  2 - p. 103-111 , 2012
 
1-15