Follow
Mohd Nizam Omar
Mohd Nizam Omar
School of Computing, Universiti Utara Malaysia
Verified email at uum.edu.my
Title
Cited by
Cited by
Year
5Gbps HG 0, 1 and HG 0, 3 optical mode division multiplexing for RoFSO
A Amphawan, S Chaudhary, R Din, MN Omar
2015 IEEE 11th international colloquium on signal processing & its …, 2015
392015
An analysis of alphabet-based techniques in text steganography
B Osman, A Yasin, MN Omar
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8 …, 2016
172016
Hybrid stepping stone detection method
MN Omar, L Siregar, R Budiarto
2008 First International Conference on Distributed Framework and …, 2008
122008
Text steganalysis using evolution algorithm approach
R Din, TZ Tuan Muda, P Lertkrai, MN Omar, A Amphawan, FA Aziz
112012
Detecting backdoor using stepping stone detection approach
K Alminshid, MN Omar
2013 Second International Conference on Informatics & Applications (ICIA), 87-92, 2013
102013
Fitness value based evolution algorithm approach for text steganalysis model
R Din, A Samsudin, TZT Muda, P Lertkrai, A Amphawan, MN Omar
International Journal of Mathematical Models and Methods in Applied Sciences …, 2013
102013
Dropped packet problems in stepping stone detection method
MN Omar, L Siregar, R Budiarto
International Journal of Computer Science & Network Security (IJCSNS) 8 (1 …, 2008
102008
Defining teamwork productivity factors in agile software development
J Iqbal, A Yasin, M Omar
Int. J. Adv. Sci. Eng. Inf. Technol 12 (3), 1160-1172, 2022
82022
The optimization of stepping stone detection: Packet capturing steps
MN Omar, MA Maarof, A Zainal
Jurnal Teknologi 44 (1), 1-14, 2006
62006
A framework of APT detection based on packets analysis and host destination
KAA Alminshid, MN Omar
Iraqi Journal of Science, 215-223, 2020
52020
An Evaluation of Page Token in OpenID Single Sign on (SSO) to Thwart Phishing Attack
NH Zakaria, MF Zainul, N Katuk, HM Tahir, MN Omar
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
52018
A detector generating algorithm for intrusion detection inspired by artificial immune system
WM Alsharafi, MN Omar
ARPN Journal of Engineering and Applied Sciences 10 (2), 608-612, 2015
52015
A performance of embedding process for text steganography method
B Osman, R Din, T Zalizam, T Muda, MN Omar
6th WSEAS World Congr. Appl. Comput. Conf.(ACC’13), 115-119, 2013
52013
A stepping stone perspective to detection of network threats
MN Omar, A Amphawan, R Din
International Journal of Applied Mathematics and Informatics 7 (3), 97-106, 2013
52013
Field evaluation on the effectiveness of a modified approach of chemical fogging against the conventional fogging in controlling dengue outbreak
M Omar, S Zaliza, M Mariappan, AO Zainal, KB Chua
The Malaysian journal of pathology 33 (2), 113, 2011
52011
Factors affecting employees' adoption of e-government in the Iraqi public education sector
K Alminshid, M Omar
Electronic Government, an International Journal 17 (2), 237-252, 2021
42021
Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection
WM Alsharafi, MN Omar, NA Al-Majmar, Y Fazea
Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020
42020
Approach for Solving Active Perturbation Attack problem in Stepping Stone Detection
MN Omar
Universiti Sains Malaysia, 2011
42011
Quality of service performance for Xcast in IPv6 network
L Siregar, R Budiarto, MN Omar, AH Rosli
2008 First International Conference on Distributed Framework and …, 2008
42008
Image Features Selection Based on Computer Vision Techniques to Detect Potholes for Intelligent Transport System
M Omar, P Kumar
2021 International Conference on Information Science and Communications …, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20