default search action
Norafida Ithnin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2018
- [j11]Ahmed Nour Moussa, Norafida Ithnin, Anazida Zainal:
CFaaS: bilaterally agreed evidence collection. J. Cloud Comput. 7: 1 (2018) - 2016
- [j10]Fathey Mohammed, Othman Ibrahim, Norafida Ithnin:
Factors influencing cloud computing adoption for e-government implementation in developing countries: Instrument development. J. Syst. Inf. Technol. 18(3): 297-327 (2016) - 2015
- [j9]Mehrbakhsh Nilashi, Othman bin Ibrahim, Norafida Ithnin, Nor Haniza Sarmin:
A multi-criteria collaborative filtering recommender system for the tourism domain using Expectation Maximization (EM) and PCA-ANFIS. Electron. Commer. Res. Appl. 14(6): 542-562 (2015) - [j8]Mehrbakhsh Nilashi, Dietmar Jannach, Othman bin Ibrahim, Norafida Ithnin:
Clustering- and regression-based multi-criteria collaborative filtering with incremental updates. Inf. Sci. 293: 235-250 (2015) - [j7]Mehrbakhsh Nilashi, Othman bin Ibrahim, Norafida Ithnin, Rozana Zakaria:
A multi-criteria recommendation system using dimensionality reduction and Neuro-Fuzzy techniques. Soft Comput. 19(11): 3173-3207 (2015) - 2014
- [j6]Mehrbakhsh Nilashi, Othman Ibrahim, Norafida Ithnin:
Hybrid recommendation approaches for multi-criteria collaborative filtering. Expert Syst. Appl. 41(8): 3879-3900 (2014) - [j5]Norfadzlan Yusup, Arezoo Sarkheyli, Azlan Mohd Zain, Siti Zaiton Mohd Hashim, Norafida Ithnin:
Estimation of optimal machining control parameters using artificial bee colony. J. Intell. Manuf. 25(6): 1463-1472 (2014) - [j4]Mehrbakhsh Nilashi, Othman bin Ibrahim, Norafida Ithnin:
Multi-criteria collaborative filtering with high accuracy using higher order singular value decomposition and Neuro-Fuzzy system. Knowl. Based Syst. 60: 82-101 (2014) - 2012
- [j3]Hazinah Kutty Mammi, Norafida Ithnin:
Competency based Education (CBE) for IT Security: Towards Bridging the Gap. Int. J. Eng. Pedagog. 2(4): 24-26 (2012) - 2011
- [j2]Lim Kah Seng, Norafida Ithnin, Hazinah Kutty Mammi:
Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device. Comput. Inf. Sci. 4(4): 109-119 (2011) - 2010
- [j1]Ali Modirkhazeni, Norafida Ithnin, Othman Ibrahim:
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks. Int. J. Adv. Comp. Techn. 2(5): 25-41 (2010)
Conference and Workshop Papers
- 2014
- [c7]Rozanawati Darman, Norafida Ithnin:
Object Tracking Methods in Wireless Sensor Network: Network Structure Classification. ICITCS 2014: 1-3 - [c6]Doaa Saleh Abobakr Baras, Siti Hajar Othman, Mohammad Nazir Ahmad, Norafida Ithnin:
Towards managing information security knowledge through metamodelling approach. ISBAST 2014: 310-315 - 2010
- [c5]Ali Mohamed Eljetlawi, Norafida Ithnin:
Existing Recognition Base Usability Features of the Graphical Password. WiMo 2010: 379-388 - 2008
- [c4]Muhammad Daniel Hafiz Abdullah, Abdul Hanan Abdullah, Norafida Ithnin, Hazinah Kutty Mammi:
Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique. Asia International Conference on Modelling and Simulation 2008: 396-403 - 2006
- [c3]Othman Ibrahim, Norafida Ithnin, Noor Awanis Muslim:
The Acceptance Behavior of Online Recruitment Users in Malaysia. PACIS 2006: 45 - 2004
- [c2]Trevor Wood-Harper, Othman Ibrahim, Norafida Ithnin:
An interconnected success factor approach for service functional in Malaysian electronic government. ICEC 2004: 446-450 - [c1]Trevor Wood-Harper, Norafida Ithnin, Othman Ibrahim:
Effective collaborative partnership for Malaysian electronic government service delivery. ICEC 2004: 526-525
Informal and Other Publications
- 2013
- [i4]Oyelami Julius Olusegun, Norafida Binti Ithnin:
People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization. CoRR abs/1309.0188 (2013) - [i3]Oyelami Julius Olusegun, Norafida Binti Ithnin:
Enhancing the Conventional Information Security Management Maturity Model (ISM3) in Resolving Human Factors in Organization Information Sharing. CoRR abs/1309.0189 (2013) - 2012
- [i2]Adeyemi R. Ikuesan, Norafida Ithnin:
Users Authentication and Privacy control of RFID Card. CoRR abs/1210.1647 (2012) - [i1]Adeyemi R. Ikuesan, Norafida Ithnin:
Bio-Thentic Card: Authentication concept for RFID Card. CoRR abs/1210.5913 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint