Items where Author is "Udzir, Nur Izura "
Up a level |
Group by: Item Type | No Grouping
Number of items: 150.
Article
Salji, Mohd Rafiz and Udzir, Nur Izura
(2023)
An autonomous role and consideration of electronic health systems with access control in developed countries: a review.
International Journal of Advanced Computer Science and Applications, 14 (2).
848 - 860.
ISSN 2158-107X; eISSN: 2156-5570
Dehaki, Ghoncheh Babanejad and Ibrahim, Hamidah and A. Alwan, Ali and Sidi, Fatimah and Udzir, Nur Izura and Mohammed Lawal, Ma'aruf
(2022)
A continuous Region-based Skyline computation for A Group of Mobile Users.
Symmetry, 14 (10).
art. no. 2003.
pp. 1-29.
ISSN 2073-8994
Thabit, Reema and Udzir, Nur Izura and Md Yasin, Sharifah and Asmawi, Aziah and Abdul-Aziz Gutub, Adnan
(2022)
CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data.
IEEE Access, 10.
65439 - 65458.
ISSN 2169-3536
Roslan, Nuur Alifah and Udzir, Nur Izura and Mahmod, Ramlan and Gutub, Adnan
(2022)
Systematic literature review and analysis for Arabic text steganography method practically.
Egyptian Informatics Journal, 23 (4).
177 - 191.
ISSN 1110-8665; ESSN: 2090-4754
Salji, Mohd Rafiz and Udzir, Nur Izura and Hafez Ninggal, Mohd Izuan and Mohd Sani, Nor Fazlida and Ibrahim, Hamidah
(2022)
Trust-based access control model with quantification method for protecting sensitive attributes.
International Journal of Advanced Computer Science and Applications, 13 (2).
695 - 707.
ISSN 2158-107X ; ESSN: 2156-5570
Din, Roshidi and Thabit, Reema Ahmed and Udzir, Nur Izura and Utama, Sunariya
(2021)
Traid-bit embedding process on Arabic text steganography method.
Bulletin of Electrical Engineering and Informatics, 10 (1).
493 - 500.
ISSN 2089-3191; ESSN: 2302-9285
Hussien, Hassan Mansur and Md Yasin, Sharifah and Udzir, Nur Izura and Ninggal, Mohd Izuan Hafez and Salman, Sadeq
(2021)
Blockchain technology in the healthcare industry: trends and opportunities.
Journal of Industrial Information Integration, 22.
art. no. 100217.
pp. 1-23.
ISSN 2452-414X
Hussien, Hassan Mansur and Md Yasin, Sharifah and Udzir, Nur Izura and Ninggal, Mohd Izuan Hafez
(2021)
Blockchain-based access control scheme for secure shared personal health records over decentralised storage.
Sensors, 21 (7).
art. no. 2462.
pp. 1-36.
ISSN 1424-8220
Babanejaddehaki, Ghazaleh and Ibrahim, Hamidah and Alwan, Ali Amer and Sidi, Fatimah and Udzir, Nur Izura
(2021)
Efficient skyline computation over an incomplete database with changing states and structures.
IEEE Access, 9.
88699 - 88723.
ISSN 2169-3536
Torabi, Majid and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik and Yaakob, Razali
(2021)
A Review on feature selection and ensemble techniques for intrusion detection system.
International Journal of Advanced Computer Science and Applications, 12 (5).
538 - 553.
ISSN 2158-107X; ESSN: 2156-5570
Teo, Poh Kuang and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura and Alwan, Ali Amer
(2021)
An effective naming heterogeneity resolution for XACML policy evaluation in a distributed environment.
Symmetry-Basel, 13 (12).
art. no. 2394.
pp. 1-26.
ISSN 2073-8994
Teo, Poh Kuang and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura
(2020)
Modality conflict detection model with authorization propagation in policy evaluation.
Journal of Theoretical and Applied Information Technology, 98 (17).
3472 - 3485.
ISSN 1992-8645; ESSN:1817-3195
Roslan, Nuur Alifah and Udzir, Nur Izura and Mahmod, Ramlan and Ahmad Zukarnain, Zuriati and Ninggal, Mohd Izuan Hafez and Thabit, Reema Ahmed Abdalla
(2020)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection.
Journal of Theoretical and Applied Information Technology, 98 (24).
4140 - 4157.
ISSN 1992-8645; ESSN: 1817-3195
Dehaki, Ghazaleh Babanejad and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura and Alwan, Ali A. and Gulzar, Yonis
(2020)
Efficient computation of skyline queries over a dynamic and incomplete database.
IEEE Access, 8.
141523 - 141546.
ISSN 2169-3536
Md Yasin, Sharifah and Hamid, Ayman Majid and Udzir, Nur Izura and Turaev, Sherzod and Kamel Ariffin, Muhammad Rezal
(2020)
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher.
Journal of Theoretical and Applied Information Technology, 98 (23).
3808 - 3822.
ISSN 1992-8645; ESSN: 1817-3195
B., Prabadevi and N., Jeyanthi and Udzir, Nur Izura and Nagamalai, Dhinaharan
(2019)
Lattice structural analysis on sniffing to denial of service attacks.
International Journal of Computer Networks and Communications, 11 (4).
pp. 101-119.
ISSN 0975-2293; ESSN: 0974-9322
Hussien, Hassan Mansur and Md Yasin, Sharifah and Muda, Zaiton and Udzir, Nur Izura
(2019)
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming.
Journal of Theoretical and Applied Information Technology, 97 (7).
pp. 1926-1936.
ISSN 1992-8645; ESSN: 1817-3195
Asmawi, Aziah and Affendey, Lilly Suriani and Udzir, Nur Izura and Mahmod, Ramlan
(2019)
Implementing severity factor to mitigate malicious insider.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8 (7s).
pp. 319-322.
ISSN 2278-3075
Abdul Raheem, Waleed K. and Md Yasin, Sharifah and Udzir, Nur Izura and Kamel Ariffin, Muhammad Rezal
(2019)
Improving the performance of {0,1,3}-NAF recoding algorithm for elliptic curve scalar multiplication.
International Journal of Advanced Computer Science and Applications, 10 (4).
pp. 275-279.
ISSN 2158-107X; ESSN: 2156-5570
Abdul Raheem, Waleed Khalid Amin and Md Yasin, Sharifah and Udzir, Nur Izura and Kamel Ariffin, Muhammad Rezal
(2019)
New quintupling point arithmetic 5P formulas for Lŏpez-Dahab coordinate over binary elliptic curve cryptography.
International Journal of Advanced Computer Science and Applications, 10 (7).
pp. 397-401.
ISSN 2156-5570; ESSN: 2158-107X
Yusof, Ahmad Riza’ain and Udzir, Nur Izura and Selamat, Ali
(2019)
Systematic literature review and taxonomy for DDoS attack detection and prediction.
International Journal of Digital Enterprise Technology, 1 (3).
pp. 292-315.
ISSN 1756-2554; ESSN: 1756-2562
Udzir, Nur Izura and Hajamydeen, Asif Iqbal
(2019)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework.
Scalable Computing, 20 (1).
pp. 113-160.
ISSN 1895-1767
Chng, Chern Wei and Md. Yasin, Sharifah and Abdullah, Mohd. Taufik and Udzir, Nur Izura
(2018)
New DNA based dynamical S-Box for block cipher.
International Journal of Engineering Research and Applications, 8 (7 part. 4).
64 - 69.
ISSN 2248-9622
Kassim, Murizah and Mohd Sahalan @ Salam, Maznifah and Udzir, Nur Izura
(2018)
Framework architecture on High Data Availability Server Virtualization for Disaster Recovery.
Journal of Telecommunication, Electronic and Computer Engineering, 10 (1-5).
163 - 169.
ISSN 2180-1843; ESSN: 2289-8131
Salji, Mohd Rafiz and Udzir, Nur Izura and Hafez Ninggal, Mohd Izuan and Mohd Sani, Nor Fazlida and Ibrahim, Hamidah
(2018)
Performance and divisional trust and purpose-based access control for privacy preservation.
Journal of Engineering and Applied Sciences, 13 (spec. 9).
7032 - 7038.
ISSN 1816-949X; ESSN: 1818-7803
Jegede, Abayomi and Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan
(2018)
Revocable and non-invertible multibiometric template protection based on matrix transformation.
Pertanika Journal of Science & Technology, 26 (1).
pp. 133-160.
ISSN 0128-7680; ESSN: 2231-8526
Ibrahim, Hamidah and Teo, Poh Kuang and Udzir, Nur Izura and Sidi, Fatimah
(2018)
An effective modality conflict model for identifying applicable policies during policy evaluation.
The Journal of Advances in Computer Engineering and Technology (JACET), 4 (4).
255 - 266.
ISSN 2423-4206
Jegede, Abayomi and Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan
(2017)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues.
International Journal of Advanced and Applied Sciences, 4 (11).
65 - 77.
ISSN 2313-626X; ESSN: 2313-3724
Jegede, Abayomi and Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan
(2017)
Modified shielding function for multi-biometric authentication and template protection.
ESTEEM Academic Journal, 13 (1).
118 - 128.
ISSN 1675-7939; ESSN: 2289-4934
Jegede, Abayomi and Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan
(2017)
State of the art in biometric key binding and key generation schemes.
International Journal of Communication Networks and Information Security, 9 (3).
pp. 333-344.
ISSN 2076-0930; ESSN: 2073-607X
Mat Isa, Mohd Anuar and Mahmod, Ramlan and Udzir, Nur Izura and Ab Manan, Jamalul-lail and Dehghantanha, Ali and Shamsuddin, Solahuddin
(2017)
A formal verification and simulation of Common Criteria Recognition Arrangement (CCRA).
World Journal of Modelling and Simulation, 13 (3).
173 - 182.
ISSN 1746-7233; ESSN: 2515-1754
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah
(2016)
Processing skyline queries in incomplete distributed databases.
Journal of Intelligent Information Systems, 48 (2).
399 - 420.
ISSN 0925-9902; ESSN: 1573-7675
Hajamydeen, Asif Iqbal and Udzir, Nur Izura
(2016)
A refined filter for UHAD to improve anomaly detection.
Security and Communication Networks, 9 (14).
pp. 2434-2447.
ISSN 1939-0122
Ibrahim, Hamidah and Mohammed, Waheed Yasin and Udzir, Nur Izura and Abdul Hamid, Nor Asilah Wati
(2016)
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems.
Journal of Information and Communication Technology, 15 (2).
pp. 85-116.
ISSN 1675-414X; ESSN: 2180-3862
Salji, Mohd Rafiz and Udzir, Nur Izura and Ninggal, Mohd Izuan Hafez and Mohd Sani, Nor Fazlida and Ibrahim, Hamidah
(2016)
Role performance trust-based access control for protecting sensitive attributes.
International Journal of Security and Its Applications, 10 (12).
pp. 153-172.
ISSN 1738-9976; ESSN: 2207-9629
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatima
(2016)
An efficient approach for processing skyline queries in incomplete multidimensional database.
Arabian Journal for Science and Engineering, 41 (8).
pp. 2927-2943.
ISSN 1319-8025; ESSN: 2191-4281
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura
(2015)
A model for processing skyline queries over a database with missing data.
Journal of Advanced Computer Science and Technology Research, 5 (3).
pp. 71-82.
ISSN 2231-8852
Ibrahim, Hamidah and Abdul Hamid, Nor Asilah Wati and Udzir, Nur Izura and Yasin, Waheed
(2015)
Cooperative web proxy caching for media objects based on peer-to-peer systems.
International Journal of Innovative Computing, Information and Control, 11 (2).
pp. 555-568.
ISSN 1349-4198
Abdullah@Selimun, Mohd. Taufik and Udzir, Nur Izura and Mahmod, Ramlan and Farjamfar, Anahita
(2015)
Multimedia files signature analysis in Blackberry Z10.
Journal of Applied Sciences, 15.
668 - 674.
ISSN 1812-5654; ESSN: 1812-5662
Halboob, Waleed Abduljabbar Mohammed and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik
(2015)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation.
Procedia Computer Science, 56.
pp. 370-375.
ISSN 1877-0509
Mirabi, Meghdad and Ibrahim, Hamidah and Fathi, Leila and Udzir, Nur Izura and Mamat, Ali
(2015)
A dynamic compressed accessibility map for secure XML querying and updating.
Journal of Information Science and Engineering, 31.
pp. 59-93.
ISSN 1016-2364
Roslan, Nuur Alifah and Mahmod, Ramlan and Udzir, Nur Izura and Ahmad Zulkarnain, Zuriati
(2014)
Primitive structural method for high capacity text steganography.
Journal of Theoretical and Applied Information Technology, 67 (2).
pp. 373-383.
ISSN 1992-8645; ESSN: 1817-3195
Abdul Aziz, Nor Azah and Udzir, Nur Izura and Mahmod, Ramlan
(2014)
Extending TLS with mutual attestation for platform integrity assurance.
Journal of Communications, 9 (1).
pp. 63-72.
ISSN 2374-4367; ESSN: 1796-2021
Teh, Jia Yew and Samsudin, Khairulmizam and Udzir, Nur Izura and Hashim, Shaiful Jahari
(2014)
Buffer overflow attack mitigation via Trusted Platform Module (TPM).
Infrastructure University Kuala Lumpur Research Journal, 2 (1).
pp. 73-84.
ISSN 2289-4144
Barjini, Hassan and Othman, Mohamed and Ibrahim, Hamidah and Udzir, Nur Izura
(2014)
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks.
Cluster Computing, 17 (2).
pp. 551-568.
ISSN 1386-7857; ESSN: 1573-7543
Barati, Mehdi and Abdullah, Azizol and Udzir, Nur Izura and Behzadi, Mostafa and Mahmod, Ramlan and Mustapha, Norwati
(2014)
Intrusion detection system in secure shell traffic in cloud environment.
Journal of Computer Science, 10 (10).
pp. 2029-2036.
ISSN 1549-3636; ESSN: 1552-6607
Lisehroodi, Mazyar Mohammadi and Muda, Zaiton and Yassin, Warusia and Udzir, Nur Izura
(2014)
KM-NEU: an efficient hybrid approach for intrusion detection system.
Research Journal of Information Technology, 6 (1).
pp. 46-57.
ISSN 1815-7432; ESSN: 2151-7959
Adinehnia, Reza and Udzir, Nur Izura and Affendey, Lilly Suriani and Ishak, Iskandar and Mohd Hanapi, Zurina
(2014)
User-independent and self-optimizing intrusion detection framework for large database systems.
WSEAS Transactions on Information Science and Applications, 12.
art. no. 26.
pp. 269-276.
ISSN 1790-0832; ESSN: 2224-3402
Yasin, Waheed and Ibrahim, Hamidah and Udzir, Nur Izura and Abdul Hamid, Nor Asilah Wati
(2014)
Windows web proxy caching simulation: a tool for simulating web proxy caching under windows operating systems.
Journal of Computer Science, 10 (8).
pp. 1380-1388.
ISSN 1549-3636; ESSN: 1552-6607
Halboob, Waleed and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik and Deghantanha, Ali
(2014)
An ordered selective imaging and distributed analysis computer forensics model.
Journal of Applied Sciences, 14 (21).
pp. 2704-2712.
ISSN 1812-5654; ESSN: 1812-5662
Yasin, Waheed and Ibrahim, Hamidah and Udzir, Nur Izura and Abdul Hamid, Nor Asilah Wati
(2014)
An overview of media streams caching in peer-to-peer systems.
The Computer Journal, 57 (8).
pp. 1167-1177.
ISSN 0010-4620; ESSN: 1460-2067
Farjamfar, Anahita and Abdullah @ Selimun, Mohd Taufik and Mahmod, Ramlan and Udzir, Nur Izura
(2014)
A review on mobile device's digital forensic process models.
Research Journal of Applied Sciences, Engineering and Technology, 8 (3).
pp. 358-366.
ISSN 2040-7459; ESSN: 2040-7467
Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood
(2013)
A survey on privacy impacts of digital investigation.
Journal of Next Generation Information Technology, 4 (8).
pp. 57-68.
ISSN 2092-8637; ESSN: 2233-9388
Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood
(2013)
Analysis of known and unknown malware bypassing techniques.
International Journal of Information Processing and Management, 4 (6).
pp. 50-59.
ISSN 2093-4009; ESSN: 2233-940X
Muda, Zaiton and Ab. Ahfaidha, Abdeladeem and Udzir, Nur Izura and Mahmod, Ramlan
(2013)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion.
International Journal of Advancements in Computing Technology, 5 (11).
pp. 109-117.
ISSN 2005-8039; ESSN: 2233-9337
Asmawi, Aziah and Affendey, Lilly Suriani and Udzir, Nur Izura and Mahmod, Ramlan
(2013)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
International Journal of Advancements in Computing Technology, 5 (10).
pp. 69-77.
ISSN 2005-8039; ESSN:2233-9337
Mahboubian, Mohammad and Udzir, Nur Izura
(2013)
A naturally inspired statistical intrusion detection model.
International Journal of Computer Theory and Engineering, 5 (3).
pp. 578-581.
ISSN 1793-8201; ESSN: 1793-821X
Alwan, Ali A. and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah
(2013)
Preference evaluation techniques of preference queries in database.
International Journal of Advancements in Computing Technology, 5 (5).
pp. 756-766.
ISSN 2005-8039; ESSN: 2233-9337
Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura
(2013)
Towards green frameworks for digital forensics investigation.
Journal of Convergence Information Technology, 8 (2).
pp. 669-678.
ISSN 1975-9320; ESSN: 2233-9299
Ganji, Majid and Dehghantanha, Ali and Udzir, Nur Izura and Damshenas, Mohsen
(2013)
Cyber warfare trends and future.
Advances in Information Sciences and Service Sciences, 5 (13).
pp. 1-10.
ISSN 1976-3700; ESSN: 2233-9345
Abd Aziz, Norazah and Setapa, Sharipah and Udzir, Nur Izura
(2013)
Mutual remote attestation in IPSec based VPN.
International Journal of Cryptology Research, 4 (1).
pp. 55-67.
ISSN 1985-5753
Yew, Teh Jia and Samsudin, Khairulmizam and Udzir, Nur Izura and Hashim, Shaiful Jahari
(2013)
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM.
Pertanika Journal of Science & Technology, 21 (2).
pp. 507-520.
ISSN 0128-7680; ESSN: 2231-8526
Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood
(2013)
A survey about impacts of cloud computing on digital forensics.
International Journal of Cyber-Security and Digital Forensics, 2 (2).
pp. 77-94.
ISSN 2305-0012
Alwan, Ali Amer and Ibrahim, Hamidah and Tan, Chik Yip and Udzir, Nur Izura and Sidi, Fatimah
(2012)
A Performance evaluation of preference evaluation
techniques in real high dimensional database.
Procedia Computer Science, 10.
pp. 894-901.
ISSN 1877-0509
Mirabi, Meghdad and Ibrahim, Hamidah and Udzir, Nur Izura and Mamat, Ali
(2012)
A compact bit string accessibility map for secure XML query processing.
Procedia Computer Science, 10.
pp. 1172-1179.
ISSN 1877-0509
Esfahani, Faramarz Safi and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2011)
Adaptable decentralized Service Oriented Architecture.
Journal of Systems and Software, 84 (10).
1591 -1617.
ISSN 1873-1228
Abdullah, Zul Hilmi and Udzir, Nur Izura and Mahmod, Ramlan and Samsudin, Khairulmizam
(2011)
Towards a dynamic file integrity monitor through a security classification.
International Journal of New Computer Architectures and Their Applications, 1 (3).
pp. 766-779.
ISSN 2412-3587; ESSN: 2220-9085
Tabatabaie, Zahra Sadri and O. K. Rahmat, Rahmita Wirza and Udzir, Nur Izura and Kheirkhah, Esmaeil
(2011)
Adaptive skin color classification technique for color-based face detection systems using integral image.
International Review on Computers and Software, 6 (1).
pp. 32-39.
ISSN 1828-6003; ESSN: 1828-6011
Hajamydeen, Asif Iqbal and Udzir, Nur Izura and Mahmod, Ramlan and Abd Ghani, Abdul Azim
(2011)
Filtering events using clustering in heterogeneous security logs.
Information Technology Journal, 10 (4).
pp. 798-806.
ISSN 1812-5638; ESSN: 1812-5646
Muda, Zaiton and Yassin, Warusia and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2011)
A K-Means and Naive Bayes learning approach for better intrusion detection.
Information Technology Journal, 10 (3).
pp. 648-655.
ISSN 1812-5638; ESSN: 1812-5646
Jazayeriy, Hamid and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2011)
Pareto-optimal algorithm in bilateral automated negotiation.
International Journal of Digital Content Technology and its Applications, 5 (3).
pp. 1-11.
ISSN 1975-9339; ESSN: 2233-9310
Alwan, Ali Amer and Ibrahim, Hamidah and Tan, Chik Yip and Sidi, Fatimah and Udzir, Nur Izura and Mohd Saad, Nurul Husna
(2011)
Performance evaluation of preference queries techniques over a high multidimensional database.
International Journal of Computational Linguistics Research, 2 (1).
pp. 37-47.
ISSN 0976-416X; ESSN: 0976-4178
Teo, Poh Kuang and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah
(2011)
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments.
American Journal of Economics and Business Administration, 3 (1).
pp. 101-111.
ISSN 1945-5488; ESSN: 1945-5496
Roslan, Nuur Alifah and Mahmod, Ramlan and Udzir, Nur Izura
(2011)
Sharp-edges method in Arabic text steganography.
Journal of Theoretical and Applied Information Technology, 33 (1).
pp. 32-41.
ISSN 1992-8645; ESSN: 1817-3195
Barjini, Hassan and Othman, Mohamed and Ibrahim, Hamidah and Udzir, Nur Izura
(2011)
Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks.
Peer-to-Peer Networking and Applications, 5 (1).
pp. 1-13.
ISSN 1936-6442; ESSN: 1936-6450
Golzari, Shahram and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2011)
An efficient and effective immune based classifier.
Journal of Computer Science, 7 (2).
pp. 148-153.
ISSN 1549-3636; ESSN: 1552-6607
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura
(2011)
A framework for checking and ranking integrity constraints in a distributed database.
Journal of Next Generation Information Technology, 2 (1).
pp. 37-48.
ISSN 2092-8637; ESSN: 2233-9388
Almurtadha, Yahya Mohammed and Sulaiman, Md. Nasir and Mustapha, Norwati and Udzir, Nur Izura
(2011)
iPACT: improved web page recommendation system using profile aggregation based on clustering of transactions.
American Journal of Applied Sciences, 8 (3).
pp. 277-283.
ISSN 1546-9239; ESSN: 1554-3641
Jazayeriy, Hamid and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2011)
A review on soft computing techniques in automated negotiation.
Scientific Research and Essays, 6 (24).
art. no. 2FC710D32038.
pp. 5100-5106.
ISSN 1992-2248
Yasin, Waheed and Ibrahim, Hamidah and Abdul Hamid, Nor Asila Wati and Udzir, Nur Izura
(2011)
A systematic review of file sharing in mobile devices using peer-to-peer systems.
Computer and Information Science, 4 (1).
pp. 28-41.
ISSN 1913-8989; ESSN: 1913-8997
Mirabi, Meghdad and Ibrahim, Hamidah and Mamat, Ali and Udzir, Nur Izura and Fathi, Leila
(2010)
Controlling label size increment of efficient XML encoding and labeling scheme in dynamic XML update.
Journal of Computer Science, 6 (12).
pp. 1535-1540.
ISSN 1549-3636
Udzir, Nur Izura and Ibrahim, Hamidah and Demesie, Sileshi
(2010)
Finer garbage collection in LINDACAP.
International Journal of Information Technology and Web Engineering, 5 (3).
pp. 1-26.
ISSN 1554-1045
AlMurtadha, Yahya M. and Sulaiman, Md. Nasir and Mustapha, Norwati and Udzir, Nur Izura
(2010)
Mining web navigation profiles for recommendation systems.
Information Technology Journal, 9 (4).
pp. 790-796.
ISSN 1812-5638; ESSN: 1812-5646
Alwan, Ali A. and Ibrahim, Hamidah and Udzir, Nur Izura
(2010)
A model for ranking and selecting integrity tests in a distributed database.
International Journal of Information Technology and Web Engineering, 5 (3).
pp. 65-84.
ISSN 1554-1045
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura
(2009)
Improved integrity constraints checking in distributed databases by exploiting local checking.
Journal of Computer Science and Technology, 24 (4 ).
pp. 665-674.
ISSN 1000-9000
Heidarinezhad, Mohammad Reza and Ahmad Zukarnain, Zuriati and Udzir, Nur Izura and Othman, Mohamed
(2009)
A host mobility support with adaptive network selection method in hybrid wireless environment.
International Journal of Digital Content Technology and its Applications, 3 (1).
pp. 34-39.
ISSN 1975-9339
Golzari, Shahram and Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2009)
Effect of fuzzy resource allocation method on AIRS classifier accuracy.
Journal of Theoretical and Applied Information Technology, 5 (1).
pp. 18-24.
ISSN 1992-8645
Bagherian, Elham and O. K. Rahmat, Rahmita Wirza and Udzir, Nur Izura
(2009)
Extract of facial feature point.
International Journal of Computer Science and Network Security, 9 (1).
pp. 49-53.
ISSN 1738-7906
Heidarinezhad, Mohammad Reza and Ahmad Zukarnain, Zuriati and Udzir , Nur Izura and Othman, Mohamad
(2009)
Mobility support across hybrid IP-based wireless environment : review of concepts, solutions and related issues.
Annals of Telecommunications, 64.
pp. 677-691.
ISSN 0003-4347
Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura and Ahmad Zulkarnain, Zuriati
(2009)
UPEM : user-centered privacy evaluation model in pervasive computing system.
Ubiquitous Computing and Communication Journal, 4 (4).
pp. 50-57.
ISSN 1992-8424; ESSN: 1992-8424
Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura and Ahmad Zulkarnain, Zuriati
(2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
Ubiquitous Computing and Communication Journal, 4 (4).
pp. 50-57.
ISSN 1992-8424
Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura
(2009)
A XML based, user-centered privacy model in pervasive
computing systems.
International Journal of Computer Science and Network Security, 9 (10).
pp. 167-173.
ISSN 1738-7906
Golzari, Shahram and C. Doraisamy, Shyamala and Udzir, Nur Izura and Sulaiman, Md. Nasir
(2009)
The effect of noise on RWTSAIRS classifier.
European Journal of Scientific Research, 31 (4).
pp. 632-641.
ISSN 1450-216X; ESSN: 1450-202X
Tabatabaie, Zahra Sadri and O. K. Rahmat, Rahmita Wirza and Udzir, Nur Izura and Kheirkhah, Esmaeil
(2009)
A hybrid face detection system using combination of appearance-based and feature-based methods.
International Journal of Computer Science and Network Security, 9 (5).
pp. 181-185.
ISSN 1738-7906
Safi, Faramarz and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2008)
Business process distribution: an intelligent approach.
Journal of Theoretical and Applied Information Technology, 4 (10).
pp. 1236-1245.
ISSN 1992-8645
Ahmad Zukarnain, Zuriati and Udzir, Nur Izura and Othman, Mohamed
(2008)
HTS : a hierarchical method for load balancing in autonomous networks.
International Journal of Computer Science and Network Security, 8 (6).
pp. 1-4.
ISSN 1738-7906
Book
Udzir, Nur Izura and Yaakob, Razali and Zakaria, Mohamed Nordin
(2001)
C++: pengenalan kepada pengaturcaraan.
Prentice Hall, Petaling Jaya, Selangor.
ISBN 9839236814
Book Section
Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan
(2017)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation.
In:
Information Security Applications.
Springer International Publishing, Germany, 341 - 352.
ISBN 9783319565484
Yusof, Ahmad Riza’ain and Udzir, Nur Izura and Selamat, Ali
(2016)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack.
In:
Trends in Applied Knowledge-Based Systems and Data Science.
Lecture Notes in Computer Science
.
Springer, Switzerland, pp. 95-102.
ISBN 9783319420066; EISBN: 9783319420073
Halboob, Waleed and Alghathbar, Khaled S. and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik and Deghantanha, Ali
(2014)
An efficient computer forensics selective imaging model.
In:
Future Information Technology.
Lecture Notes in Electrical Engineering, 276
.
Springer, Heidelberg, Germany, pp. 277-284.
ISBN 9783642408601; EISBN: 9783642408618
Barjini, Hassan and Othman, Mohamed and Ibrahim, Hamidah and Udzir, Nur Izura
(2012)
Analytical studies and experimental examines for flooding-based search algorithms.
In:
Information Computing and Applications.
Lecture Notes in Computer Science
(7473).
Springer, Berlin Heidelberg, pp. 299-306.
ISBN 9783642340628; EISBN: 9783642340628
Conference or Workshop Item
Salji, Mohd Rafiz and Udzir, Nur Izura and Ninggal, Mohd Izuan Hafez and Mohd Sani, Nor Fazlida and Ibrahim, Hamidah
(2019)
Trust, purpose, and role-based access control model for privacy protection.
In: International Symposium on ICT Management and Administration (ISICTMA2019), 31 July-2 Aug. 2019, Putrajaya Marriott Hotel, Malaysia. (pp. 69-73).
Yusof, Ahmad Riza'ain and Udzir, Nur Izura and Selamat, Ali and Hamdan, Hazlina and Abdullah @ Selimun, Mohd Taufik
(2017)
Adaptive feature selection for denial of services (DoS) attack.
In: 2017 IEEE Conference on Application, Information and Network Security (AINS), 13-14 Nov. 2017, Miri Marriott Resort & Spa, Miri, Sarawak. (pp. 81-84).
Babanejaddehaki, Ghazaleh and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah and Aljuboori, Ali Amer Alwan
(2017)
Deriving skyline points over dynamic and incomplete databases.
In: 6th International Conference on Computing and Informatics (ICOCI 2017), 25-27 Apr. 2017, Kuala Lumpur, Malaysia. (pp. 77-83).
Teo, Poh Kuang and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura
(2017)
Modality conflict analysis in XACML policy evaluation.
In: 6th International Conference on Computing and Informatics (ICOCI 2017), 25-27 Apr. 2017, Kuala Lumpur, Malaysia. (pp. 708-713).
Babanejaddehaki, Ghazaleh and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah and Dehaki, Ghoncheh Babanejad and Aljuboori, Ali Amer Alwan
(2015)
Identifying skylines in dynamic incomplete database.
In: 9th International Conference on Computer Engineering and Applications (CEA '15), 22-24 Feb. 2015, Dubai, United Arab Emirates. (pp. 231-236).
Maharani, Sitti Syarah and Yaakob, Razali and Udzir, Nur Izura
(2015)
An investigation of back-propagation neural network on university selection.
In: 2nd International Conference on Computer, Communications, and Control Technology (I4CT 2015), 21-23 Apr. 2015, Kuching, Sarawak, Malaysia. (pp. 248-252).
Barati, Mehdi and Abdullah, Azizol and Udzir, Nur Izura and Mahmod, Ramlan and Mustapha, Norwati
(2014)
Distributed Denial of Service detection using hybrid machine learning technique.
In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 26-27 Aug. 2014, Kuala Lumpur, Malaysia. (pp. 268-273).
Adinehnia, Reza and Udzir, Nur Izura and Affendey, Lilly Suriani and Ishak, Iskandar and Mohd Hanapi, Zurina
(2014)
Effective mining on large databases for intrusion detection.
In: International Symposium on Biometrics and Security Technologies (ISBAST 2014), 26-27 Aug. 2014, Kuala Lumpur, Malaysia. (pp. 204-207).
Teo, Poh Kuang and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah
(2014)
Heterogeneity XACML policy evaluation engine.
In: Malaysian National Conference of Databases 2014 (MaNCoD 2014), 17 Sept. 2014, Universiti Putra Malaysia, Serdang, Selangor. (pp. 230-238).
Ibrahim, Hamidah and Yasin, Waheed and Abdul Hamid, Nor Asilah Wati and Udzir, Nur Izura
(2014)
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm.
In: Malaysian National Conference of Databases 2014 (MaNCoD 2014), 17 Sept. 2014, Universiti Putra Malaysia, Serdang, Selangor. (pp. 69-74).
(Unpublished)
Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Muda, Zaiton and Zulzalil, Hazura
(2014)
Packet header anomaly detection using statistical analysis.
In: 7th International Conference on Computational Intelligence in Security for Information Systems (CISIS14), 25-27 June 2014, Bilbao, Spain. (pp. 473-482).
Abd Aziz, Norazah and Udzir, Nur Izura and Mahmod, Ramlan
(2014)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance.
In: 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems (IEEE-CYBER 2014), 4-7 June 2014, Hong Kong, China. (pp. 13-18).
Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Zulzalil, Hazura and Muda, Zaiton
(2014)
Signature-based anomaly intrusion detection using integrated data mining classifiers.
In: International Symposium on Biometrics and Security Technologies (ISBAST 2014), 26-27 Aug. 2014, Kuala Lumpur, Malaysia. (pp. 232-237).
Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Muda, Zaiton and Zulzalil, Hazura
(2013)
Host-based packet header anomaly detection using statistical analysis.
In: International Seminars on Mathematics and Natural Sciences (ISMNS 2013), 15-17 Aug. 2013, Samarkand, Uzbekistan. (pp. 1-8).
Mohamed Yassin, Warusia and Udzir, Nur Izura and Muda, Zaiton and Sulaiman, Md. Nasir
(2013)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification.
In: 4th International Conference on Computing and Informatics (ICOCI 2013), 28-30 Aug. 2013, Sarawak, Malaysia. (pp. 298-303).
Alwan, Ali A. and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah
(2013)
Estimating missing values of skylines in incomplete database.
In: The Second International Conference on Digital Enterprise and Information Systems (DEIS 2013), 4-6 Mar. 2013, Kuala Lumpur, Malaysia. (pp. 220-229).
Barati, Mehdi and Abdullah, Azizol and Mahmod, Ramlan and Mustapha, Norwati and Udzir, Nur Izura
(2013)
Features selection for ids in encrypted traffic using genetic algorithm.
In: 4th International Conference on Computing and Informatics (ICOCI 2013), 28-30 Aug. 2013, Sarawak, Malaysia. (pp. 279-285).
Yasin, Waheed and Ibrahim, Hamidah and Abdul Hamid, Nor Asilah Wati and Udzir, Nur Izura
(2013)
The affects of caching in browser stage on the performance of web items delivery.
In: The Second International Conference on Digital Enterprise and Information Systems (DEIS 2013), 4-6 Mar. 2013, Kuala Lumpur, Malaysia. (pp. 212-219).
Udzir, Nur Izura and Wood, Alan and Muda, Zaiton and Dehghantanha, Ali and Abdullah @ Selimun, Mohd Taufik and Abdullah, Azizol
(2012)
Access control in open distributed systems.
In: Workshop on Information Technology and Applications (WIT-A 2012), 4-5 June 2012, Istanbul, Turkey. (pp. 1-5).
Salehian, Solmaz and Masoumiyan, Farzaneh and Udzir, Nur Izura
(2012)
Energy-efficient intrusion detection in wireless sensor network.
In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 207-212).
Manavi, Sina and Mohammadalian, Sadra and Udzir, Nur Izura and Abdullah, Azizol
(2012)
Hierarchical secure virtualization model for cloud.
In: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012) , 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 219-224).
Asmawi, Aziah and Affendey, Lilly Suriani and Udzir, Nur Izura and Mahmod, Ramlan
(2012)
Model-based system architecture for preventing XPath injection in database-centric web services environment.
In: 7th International Conference on Computing and Convergence Technology (ICCCT 2012), 3-5 Dec. 2012, Seoul, Korea. (pp. 621-625).
Abd Aziz, Norazah and Setapa, Sharipah and Udzir, Nur Izura
(2012)
Mutual remote attestation in IPSec based VPN.
In: 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012), 4-6 June 2012, Langkawi, Malaysia. (pp. 1-5).
(Unpublished)
Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin
(2012)
Towards secure model for SCADA systems.
In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 60-64).
Mahboubian, Mohammad and Udzir, Nur Izura and Subramaniam, Shamala and Abdul Hamid, Nor Asila Wati
(2012)
An alert fusion model inspired by artificial immune system.
In: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012) , 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 317-322).
Yassin, Warusia and Udzir, Nur Izura and Muda, Zaiton and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik
(2012)
A cloud-based intrusion detection service framework.
In: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012) , 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 213-218).
Abdullah, Zul Hilmi and Udzir, Nur Izura and Mahmod, Ramlan and Samsudin, Khairulmizam
(2011)
File integrity monitor scheduling based on file security level classification.
In: Second International Conference on Software Engineering and Computer Systems (ICSECS 2011), 27-29 June 2011, Kuantan, Pahang, Malaysia. (pp. 177-189).
Almurtadha, Yahya Mohammed and Sulaiman, Md. Nasir and Mustapha, Norwati and Udzir, Nur Izura
(2011)
Improved web page recommender system based on web usage mining.
In: 3rd International Conference on Computing and Informatics (ICOCI 2011), 8-9 June 2011, Bandung, Indonesia. (pp. 32-36).
Muda, Zaiton and Mohamed Yassin, Warusia and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification.
In: 7th International Conference on Information Technology in Asia (CITA 2011), 12-13 July 2011, Kuching, Sarawak. .
Muda, Zaiton and Mohamed Yassin, Warusia and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2011)
Intrusion detection based on k-means clustering and OneR classification.
In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec. 2011, Melaka, Malaysia. (pp. 192-197).
Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura
(2011)
Investigation of bypassing malware defences and malware detections.
In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec. 2011, Melaka, Malaysia. (pp. 173-178).
Teo, Poh Kuang and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura
(2011)
Policy inconsistency detection based on RBAC model in cross-organizational collaboration.
In: 3rd International Conference on Computing and Informatics (ICOCI 2011), 8-9 June 2011, Bandung, Indonesia. (pp. 333-338).
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah
(2011)
Skyline queries over incomplete multidimensional database.
In: 3rd International Conference on Computing and Informatics (ICOCI 2011), 8-9 June 2011, Bandung, Indonesia. (pp. 201-206).
Dehghantanha, Ali and Udzir, Nur Izura and Mahmod, Ramlan
(2011)
Towards data centric mobile security.
In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec. 2011, Melaka, Malaysia. (pp. 62-67).
Abu Bakar, Azreena and Abdullah, Rusli and Udzir, Nur Izura and Ibrahim, Hamidah
(2011)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment.
In: International Conference on Electrical Engineering and Informatics (ICEEI 2011), 17-19 July 2011, Bandung, Indonesia. .
Nooshabadi, Meghdad Mirabi and Ibrahim, Hamidah and Fathi, Leila and Mamat, Ali and Udzir, Nur Izura
(2011)
A fractional number based labeling scheme for dynamic XML updating.
In: 3rd International Conference on Computing and Informatics (ICOCI 2011), 8-9 June 2011, Bandung, Indonesia. (pp. 194-200).
Lee, Soon and Othman, Mohamed and Udzir, Nur Izura
(2009)
IP spoofing defense: an introduction.
In: Second International Conference on Computing and Informatics 2009 (ICOCI09), 24-25 June 2009, Kuala Lumpur, Malaysia. .
Hormozi, Shahram Golzari and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2009)
Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase.
In: 2009 IEEE Congress on Evolutionary Computation (CEC 2009), 18-21 May 2009, Trondheim, Norway. (pp. 3040-3044).
Hormozi, Shahram Golzari and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura and Mohd Norowi, Noris
(2008)
Artificial immune recognition system with nonlinear resource allocation method and application to traditional Malay music genre classification.
In: 7th International Conference on Artificial Immune Systems (ICARIS 2008), 10-13 Aug. 2008, Phuket, Thailand. (pp. 132-141).
Hormozi, Shahram Golzari and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2008)
Effect of nonlinear resource allocation on AIRS classifier accuracy.
In: Knowledge Management International Conference 2008 (KMICe 2008), 10-12 June 2008, Langkawi, Kedah. (pp. 596-600).
Udzir, Nur Izura and Sulaiman, Md. Nasir and Muda, Zaiton and Zulzalil, Hazura and Abdullah, Rusli
(2008)
Refined garbage collection for open distributed systems with multicapabilities.
In: 3rd International Symposium on Information Technology (ITSim'08), 26-28 Aug. 2008, Kuala Lumpur, Malaysia. .
Heidarinezhad, Mohammed Reza and Ahmad Zukarnain, Zuriati and Udzir, Nur Izura and Othman, Mohamed
(2008)
A connection selection method for vertical handoff in hybrid wireless environment.
In: First International Symposium on Applied Sciences on Biomedical and Communication Technologies (ISABEL 2008), 25-28 Oct. 2008, Aalborg University, Denmark. .
Hamzah, Rosliza and Ibrahim, Hamidah and Udzir, Nur Izura
(2008)
A framework for mobile web query searching using ontology domain.
In: Knowledge Management International Conference 2008 (KMICe 2008), 10-12 June 2008, Langkawi, Kedah. (pp. 433-438).
Hormozi, Shahram Golzari and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2008)
A hybrid approach to traditional Malay music genre classification: combining feature selection and artificial immune recognition system.
In: 3rd International Symposium on Information Technology (ITSim'08), 26-28 Aug. 2008, Kuala Lumpur, Malaysia. .
Jazayeriy, Hamid and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2008)
A neural network-based model to learn agent's utility function.
In: 3rd International Symposium on Information Technology (ITSim'08), 26-28 Aug. 2008, Kuala Lumpur, Malaysia. .
Doraisamy, Shyamala and Golzari, Shahram and Mohd. Norowi, Noris and Sulaiman, Md. Nasir and Udzir, Nur Izura
(2008)
A study on feature selection and classification techniques for automatic genre classification of traditional Malay music.
In: 9th International Conference on Music Information Retrieval, ISMIR 2008, 14-18 Sep. 2008, Philadelphia, USA. (pp. 331-336).
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura
(2007)
Analysis of integrity tests for checking integrity constraints in a distributed database.
In: 1st Regional Conference on Computational Science and Technologies (RCCST 2007), 29-30 Nov. 2007, Shangri-la Tanjung Aru Resort and Spa, Kota Kinabalu, Sabah. (pp. 321-325).
Udzir, Nur Izura and Wood, Alan
(2006)
Establishing private communications in open systems using multicapabilities.
In: 2nd International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA 2006), 24-28 Apr. 2006, Damascus, Syria. (pp. 3371-3376).
Thesis
Udzir, Nur Izura
(1998)
Rangkaian Neural Untuk Sistem Dapatan Semula Perkataan Daripada Pangkalan Data.
Masters thesis, Universiti Putra Malaysia.