1
2
Conference Paper
3
4
5
6
7
by Chittooparambil, H. J., Shanmugam, B., Azam, S., Kannoorpatti, K., Jonkman, M., Samy, G. N.
Published 2019
Get full textPublished 2019
Get full text
Get full text
Conference or Workshop Item
8
by Kuppusamy, P., Samy, G. N., Maarop, N., Magalingam, P., Kamaruddin, N., Shanmugam, B., Perumal, S.
Published 2020
Get full textPublished 2020
Get full text
Conference or Workshop Item
9
10
11
12
Novel risk assessment method to identify information security threats in cloud computing environment
by Samy, G. N., Hasan Albakri, S., Maarop, N., Magalingam, P., Wong, D. H. T., Shanmugam, B., Perumal, S.
Published 2019
Get full textPublished 2019
Get full text
Get full text
Conference or Workshop Item
13
14
by Sheng, H. K., Samy, G. N., Kamaruddin, N., Maarop, N., Hassan, N. H., Ten, D. W. H.
Published 2019
Get full textPublished 2019
Get full text
Get full text
Conference or Workshop Item
15
by Mohmad, N., Hassan, N.H., Samy, G.N., Abd. Aziz, N.S., Maarop, N., Abu Bakar, N.A.
Published 2020
Get full textPublished 2020
Get full text
Conference or Workshop Item
16
17
18
by Samy G.N., Maarop N., Wong D.H., Rahim F.A., Hassan N.H., Perumal S., Magalingam P., Albakri S.H.
Published 2023
Published 2023
Article
19
by Al-Hashedi K.G., Magalingam P., Maarop N., Samy G.N., Rahim F.B.A., Shanmugam M., Hasan M.K.
Published 2024
Published 2024
Conference Paper