Author of the publication

A framework for integrated risk management process using survival analysis approach in information security.

, , and . IAS, page 185-190. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correlated node behavior in wireless ad hoc networks: An epidemic model., , and . ICITST, page 403-410. IEEE, (2012)Peer Online Training (POT) as Learning Activity in Computer Security Audit and Risks Management Teaching Module., , , and . KMO, volume 1825 of Communications in Computer and Information Science, page 222-229. Springer, (2023)Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network., , and . ICITST, page 536-541. IEEE, (2013)Security threats categories in healthcare information systems., , and . Health Informatics J., 16 (3): 201-209 (2010)Profiling mobile malware behaviour through hybrid malware analysis approach., , , , , and . IAS, page 78-84. IEEE, (2013)Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers., , and . IACR Cryptology ePrint Archive, (2018)Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region., , , and . PAISI, volume 7299 of Lecture Notes in Computer Science, page 27-35. Springer, (2012)Surveying the Wireless Body Area Network in the realm of wireless communication., and . IAS, page 58-61. IEEE, (2011)A framework for integrated risk management process using survival analysis approach in information security., , and . IAS, page 185-190. IEEE, (2010)A Review of Digital Forensics Framework for Blockchain in Cryptocurrency Technology., , , , , , and . CRC, page 1-6. IEEE, (2021)