Sirat, Maheyzah Md
18  results:
Search for persons X
?
1

Data Integrity for Dynamic Big Data in Cloud Storage: A Com..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Emerging Technologies in Computing,
 
?
2

An Anomaly Intrusion Detection Systems in IoT Based on Auto..:

, In: Lecture Notes on Data Engineering and Communications Technologies; Advances in Intelligent Computing Techniques and Applications,
 
?
4

Google Dorking Commands-based Approach for Assisting Forens..:

, In: 2023 3rd International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA),
 
?
5

An effective attack scenario construction model based on id..:

Alhaj, Taqwa Ahmed ; Siraj, Maheyzah Md ; Zainal, Anazida...
International Journal of Information Security.  22 (2023)  5 - p. 1481-1496 , 2023
 
?
7

Anomaly Intrusion Detection Systems in IoT Using Deep Learn..:

, In: Lecture Notes on Data Engineering and Communications Technologies; Innovative Systems for Intelligent Health Informatics,
 
?
9

Towards Enhancement of Privacy-Preserving Data Mining Model..:

, In: 2021 IEEE International Conference on Computing (ICOCO),
 
?
10

Named Entity Recognition of South China Sea Conflicts:

Sulaiman, Nur Rafeeqkha ; Siraj, Maheyzah Md ; Din, Mazura Mat
IOP Conference Series: Materials Science and Engineering.  884 (2020)  1 - p. 012057 , 2020
 
?
11

Oil Well Detection System for Seismic Surveying Based on In..:

Puad, Norsyazwani Mohd ; Siraj, Maheyzah Md. ; Sulaiman, Nur Rafeeqkha
IOP Conference Series: Materials Science and Engineering.  884 (2020)  1 - p. 012056 , 2020
 
?
12

Hybrid Solution for Privacy-Preserving Data Mining on the C..:

, In: Advances in Intelligent Systems and Computing; Emerging Trends in Intelligent Computing and Informatics,
 
?
13

A Survey on Privacy Preserving Data Mining Approaches and T..:

, In: Proceedings of the 2019 8th International Conference on Software and Computer Applications,
 
?
14

Cyber Physical Security Protection in Online Authentication..:

, In: Advances in Intelligent Systems and Computing; Intelligent Computing,
 
1-15