default search action
Nazri Kama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j26]Asyraf Wahi Anuar, Nazri Kama, Azri Azmi, Hazlifah Mohd Rusli:
A multivocal literature review on record management potential components in CRUD operation for web application development. Int. J. Model. Simul. Sci. Comput. 14(2): 2341019:1-2341019:29 (2023) - [j25]Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Haitham S. Cruickshank, Anish Jindal, Nazri Kama:
TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Trans. Ind. Informatics 19(1): 880-889 (2023) - [j24]Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Anish Jindal, Nazri Kama, Saiful Adli Ismail:
A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems. IEEE J. Biomed. Health Informatics 27(5): 2314-2322 (2023) - [j23]Asyraf Wahi Anuar, Azri Azmi, Nazri Kama, Hazlifah Mohd Rusli, Nur Azaliah Abu Bakar, Norliza Mohamed:
Integrating user experience assessment in Re-CRUD console framework development. Wirel. Networks 29(1): 109-127 (2023) - [c25]Faizura Haneem, Nazri Kama, Roshaimieza Mat Adam, Sufyan Basri, Hazlifah Mohd Rusli, Haslina Md Sarkan:
Data Exchange Interoperability Protocol for Electric Vehicle Charging Systems Infrastructure. EUROCON 2023: 193-198 - [c24]Imran Harith Azmy, Azri Azmi, Nazri Kama, Hazlifah Mohd Rusli, Suriayati Chuprat, Asyraf Wahi Anuar:
Methods for Application Development by Non-Programmers: A Systematic Literature Review. WSSE 2023: 1-8 - 2022
- [j22]Shidrokh Goudarzi, Seyed Ahmad Soleymani, Mohammad Hossein Anisi, Mohammad Abdollahi Azgomi, Zeinab Movahedi, Nazri Kama, Hazlifah Mohd Rusli, Muhammad Khurram Khan:
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks 128: 102782 (2022) - [j21]Yasir Mahmood, Nazri Kama, Azri Azmi, Ahmad Salman Khan, Mazlan Ali:
Software effort estimation accuracy prediction of machine learning techniques: A systematic performance evaluation. Softw. Pract. Exp. 52(1): 39-65 (2022) - [j20]Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Zeinab Movahedi, Anish Jindal, Nazri Kama:
PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-Based 6G Networking. IEEE Trans. Ind. Informatics 18(7): 4902-4911 (2022) - 2021
- [j19]Shawal Khan, Shahzad Khan, Mahdi Zareei, Faisal S. Alanazi, Nazri Kama, Masoom Alam, Adeel Anjum:
ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map. IEEE Access 9: 46313-46324 (2021) - [j18]Gulzar Mehmood, Muhammad Sohail Khan, Abdul Waheed, Mahdi Zareei, Muhammad Fayaz, Tariq Sadad, Nazri Kama, Azri Azmi:
An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network. Complex. 2021: 6577492:1-6577492:10 (2021) - [j17]Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Mahdi Zareei, Abdul Hanan Abdullah, Nazri Kama:
A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Veh. Commun. 29: 100335 (2021) - [i1]Yasir Mahmood, Nazri Kama, Azri Azmi, Ahmad Salman Khan, Mazlan Ali:
Software Effort Estimation Accuracy Prediction of Machine Learning Techniques: A Systematic Performance Evaluation. CoRR abs/2101.10658 (2021) - 2020
- [j16]Seyed Ahmad Soleymani, Mohammad Hossein Anisi, Abdul Hanan Abdullah, Md. Asri Ngadi, Shidrokh Goudarzi, Muhammad Khurram Khan, Mohd Nazri Kama:
An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Sci. China Inf. Sci. 63(12) (2020) - [j15]Ghafar A. Jaafar, Saiful Adli Ismail, Mohd Shahidan Abdullah, Nazri Kama, Azri Azmi, Othman Mohd Yusop:
Recent Analysis of Forged Request Headers Constituted by HTTP DDoS. Sensors 20(14): 3820 (2020) - [j14]Yasir Mahmood, Nazri Kama, Azri Azmi:
A systematic review of studies on use case points and expert-based estimation of software development effort. J. Softw. Evol. Process. 32(7) (2020) - [j13]Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Nazri Kama, Saiful Adli Ismail, Azri Azmi, Mahdi Zareei, Abdul Hanan Abdullah:
A Trust Model Using Edge Nodes and a Cuckoo Filter for Securing VANET under the NLoS Condition. Symmetry 12(4): 609 (2020) - [j12]Seyed Ahmad Soleymani, Shidrokh Goudarzi, Nazri Kama, Saiful Adli Ismail, Mazlan Ali, Zaini M. D. Zainal, Mahdi Zareei:
A Hybrid Prediction Model for Energy-Efficient Data Collection in Wireless Sensor Networks. Symmetry 12(12): 2024 (2020) - [c23]Wan Nur Aaisyah Binti Wan Mansor, Azuan Ahmad, Wan Shafiuddin Zainudin, Madihah Mohd Saudi, Mohd Nazri Kama:
Crytojacking Classification based on Machine Learning Algorithm. ICCBN 2020: 73-76
2010 – 2019
- 2019
- [j11]Shidrokh Goudarzi, Nazri Kama, Mohammad Hossein Anisi, Sherali Zeadally, Shahid Mumtaz:
Data collection using unmanned aerial vehicles for Internet of Things platforms. Comput. Electr. Eng. 75: 1-15 (2019) - [j10]Nazri Kama, Sufyan Basri, Saiful Adli Ismail, Roslina Ibrahim, Haslina Md Sarkan:
Using static and dynamic impact analysis for effort estimation. Int. Arab J. Inf. Technol. 16(2): 163-170 (2019) - [j9]Faizura Haneem, Nazri Kama, Nur Azaliah Abu Bakar:
Critical influential determinants of IT innovation adoption at organisational level in local government context. IET Softw. 13(4): 233-240 (2019) - [j8]Sabrina Ahmad, Siti Azirah Asmai, Siti Zarah Zaid, Nazri Kama:
Shopping Assistant App for People with Visual impairment: an Acceptance Evaluation. Int. J. Comput. 18: 285-292 (2019) - [j7]Faizura Haneem, Nazri Kama, Nazim Taskin, David Pauleen, Nur Azaliah Abu Bakar:
Determinants of master data management adoption by local government organizations: An empirical study. Int. J. Inf. Manag. 45: 25-43 (2019) - [c22]Jalal Shah, Nazri Kama, Nur Azaliah Abu Bakar:
Estimating Change Effort Using a Combination of Change Impact Analysis Technique with Function Point Analysis. ICSIE 2019: 9-14 - [c21]Nurul Izzati Mohammad, Saiful Adli Ismail, Mohd Nazri Kama, Othman Mohd Yusop, Azri Azmi:
Customer Churn Prediction In Telecommunication Industry Using Machine Learning Classifiers. ICVISP 2019: 34:1-34:7 - [c20]Azuan Ahmad, Wan Shafiuddin, Mohd Nazri Kama, Madihah Mohd Saudi:
A New Cryptojacking Malware Classifier Model Based on Dendritic Cell Algorithm. ICVISP 2019: 84:1-84:5 - 2018
- [j6]Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Norbik Bashah Idris, Madihah Mohd Saudi, Nur Hafiza Zakaria:
State of the Art Intrusion Detection System for Cloud Computing. Int. J. Commun. Networks Inf. Secur. 10(3) (2018) - [j5]Shidrokh Goudarzi, Mohd Nazri Kama, Mohammad Hossein Anisi, Seyed Ahmad Soleymani, Faiyaz Doctor:
Self-Organizing Traffic Flow Prediction with an Optimized Deep Belief Network for Internet of Vehicles. Sensors 18(10): 3459 (2018) - [c19]Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Norbik Bashah Idris, Madihah Mohd Saudi:
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System. AICCC 2018: 76-82 - [c18]Jalal Shah, Nazri Kama:
Extending Function Point Analysis Effort Estimation Method for Software Development Phase. ICSCA 2018: 77-81 - [c17]Jalal Shah, Nazri Kama, Saiful Adli Ismail:
An Empirical Study with Function Point Analysis for Software Development Phase Method. ICSIE 2018: 7-11 - [c16]Hazila Timan, Nazri Kama, Rasimah Che Mohd Yusoff, Ali Selamat:
Social Media for Medical and Health Information: Malaysian Medical Tourism Hospital. SoMeT 2018: 143-156 - 2017
- [j4]Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama:
CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism. Int. J. Commun. Networks Inf. Secur. 9(1) (2017) - [c15]Jalal Shah, Nazri Kama:
Issues of Using Function Point Analysis Method for Requirement Changes During Software Development Phase. APRES 2017: 156-163 - [c14]Nur Azaliah Abu Bakar, Harihodin Selamat, Mohd Nazri Kama:
Assessing the Capability and Priority of Enterprise Architecture Implementation in Malaysian Public Sector. PACIS 2017: 79 - [c13]Faizura Haneem, Nazri Kama, Rosmah Ali, Ali Selamat:
Applying Data Analytics Approach in Systematic Literature Review: Master Data Management Case Study. SoMeT 2017: 705-718 - 2016
- [j3]Sufyan Basri, Nazri Kama, Saiful Adli Ismail, Faizura Haneem:
Using static and dynamic impact analysis for effort estimation. IET Softw. 10(4): 89-95 (2016) - [c12]Sufyan Basri, Nazri Kama, Haslina Md Sarkan, Saiful Adli Ismail, Faizura Haneem:
An Algorithmic-Based Change Effort Estimation Model for Software Development. APSEC 2016: 177-184 - [c11]Nur Azaliah Abu Bakar, S. Harihodin, Nazri Kama:
Assessment of Enterprise Architecture Implementation Capability and Priority in Public Sector Agency. CENTERIS/ProjMAN/HCist 2016: 198-206 - [c10]Nur Azaliah Abu Bakar, S. Harihodin, Nazri Kama:
Enterprise architecture implementation model: Measurement from experts and practitioner perspectives. CIST 2016: 1-6 - [c9]Sufyan Basri, Nazri Kama, Faizura Haneem, Saiful Adli Ismail:
Predicting effort for requirement changes during software development. SoICT 2016: 380-387 - 2015
- [c8]Nazri Kama, Saiful Adli Ismail, Kamilia Kamardin, Norziha Megat Zainuddin, Azri Azmi, Wan Shafiuddin Zainuddin:
A Change Impact Analysis Tool: Integration Between Static and Dynamic Analysis Techniques. SoMeT 2015: 413-424 - [c7]Saiful Adli Ismail, Md. Asri Ngadi, Johan Mohamad Sharif, Nazri Kama, Othman Mohd Yusop:
HMAC Authentication Mechanisms in a Grid Computing Environment Using Gridsim Toolkit. SoMeT 2015: 442-452 - 2014
- [j2]Nazri Kama, Sufyan Basri:
Considering Partially Developed Artifacts in Change Impact Analysis Implementation. J. Softw. 9(8): 2174-2179 (2014) - [j1]Ali Tizkar Sadabad, Nazri Kama:
Action Driven Decision Modeling Framework towards Formulating Software Project Management Tacit Knowledge. J. Softw. 9(9): 2474-2483 (2014) - [c6]Nazri Kama, Sufyan Basri, Mehran Halimi Asl, Roslina Ibrahim:
An Evaluation of COCHCOMO Tool for Change Effort Estimation in Software Development Phase. SoMeT (Selected Papers) 2014: 311-328 - [c5]Nazri Kama, Sufyan Basri, Mehran Halimi Asl, Roslina Ibrahim:
COCHCOMO: A Change Effort Estimation Tool for Software Development Phase. SoMeT 2014: 1029-1045 - 2013
- [c4]Mehran Halimi Asl, Nazri Kama:
A Change Impact Size Estimation Approach during the Software Development. Australian Software Engineering Conference 2013: 68-77 - 2012
- [c3]Nazri Kama, Faizul Azli:
A Change Impact Analysis Approach for the Software Development Phase. APSEC 2012: 583-592 - 2010
- [c2]Nazri Kama, Tim French, Mark Reynolds:
Considering Patterns in Class Interactions Prediction. FGIT-ASEA 2010: 11-22 - [c1]Nazri Kama, Tim French, Mark Reynolds:
Impact Analysis using Class Interaction Prediction Approach. SoMeT 2010: 96-111
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint