1
2
3
4
Article
5
6
7
Book Chapter
8
Book Chapter
9
10
11
by Kuppusamy, P., Samy, G. N., Maarop, N., Magalingam, P., Kamaruddin, N., Shanmugam, B., Perumal, S.
Published 2020
Get full textPublished 2020
Get full text
Conference or Workshop Item
12
Novel risk assessment method to identify information security threats in cloud computing environment
by Samy, G. N., Hasan Albakri, S., Maarop, N., Magalingam, P., Wong, D. H. T., Shanmugam, B., Perumal, S.
Published 2019
Get full textPublished 2019
Get full text
Get full text
Conference or Workshop Item
13
14
15
by Suhaimi, N. A. D., Salleh, S. I. M., Abdul Hakim, S. A. F., Magalingam, P., Maarop, N., Shanmugam, M.
Published 2021
Get full textPublished 2021
Get full text
Get full text
Conference or Workshop Item
16
17
by Samy G.N., Maarop N., Wong D.H., Rahim F.A., Hassan N.H., Perumal S., Magalingam P., Albakri S.H.
Published 2023
Published 2023
Article
18
by Al-Hashedi K.G., Magalingam P., Maarop N., Samy G.N., Rahim F.B.A., Shanmugam M., Hasan M.K.
Published 2024
Published 2024
Conference Paper
19
by Chuprat, S., Ariffin, A., Sahibuddin, S., Mahrin, M. N., Senan, F. M., Ahmad, N. A., Narayana, G., Magalingam, P., Anuar, S., Talib, M. Z.
Published 2019
Get full textPublished 2019
Get full text
Conference or Workshop Item