Showing
1 - 7
results of
7
for search '
Seleviawati, Tarmizi
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Seleviawati, Tarmizi
Showing
1 - 7
results of
7
for search '
Seleviawati, Tarmizi
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Latency Analysis of Cloud Infrastructure for Time-Critical IoT Use Cases
by
Kartinah, Zen
,
Saju, Mohanan
,
Seleviawati
,
Tarmizi
,
Noralifah, Annuar
Published 2022
Get full text
Get full text
Get full text
Proceeding
Save to List
Saved in:
2
Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET
by
Adnan Shahid, Khan
,
Kuhanraj, Balan
,
Yasir, Javed
,
Seleviawati
,
Tarmizi
,
Johari, Abdullah
Published 2019
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
3
Assessing the Influence of Computational Thinking Technique on STEM Based and Non-STEM Based Subjects in Sarawak Schools
by
Shaadah, Shariman
,
Faizah, Mas'ud
,
Seleviawati
,
Tarmizi
,
Kartinah, Zen
,
Eaqerzilla, Phang
Published 2024
Get full text
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
4
S-ADS: Spectrogram Image-based Anomaly Detection System for IoT networks
by
Zeeshan, Ahmad
,
Adnan Shahid, Khan
,
Azlina, Ahmadi Julaihi
,
Seleviawati
,
Tarmizi
,
Noralifah, Annuar
Published 2022
Get full text
Get full text
Get full text
Proceeding
Save to List
Saved in:
5
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
by
Nayeem Ahmad, Khan
,
Adnan Shahid, Khan
,
Seleviawati
,
Tarmizi
,
Azlina, Ahmadi Julaihi
,
Zeeshan, Ahmad
Published 2022
Get full text
Get full text
Get full text
Proceeding
Save to List
Saved in:
6
Anomaly Detection Using Deep Neural Network for IoT Architecture
by
Zeeshan, Ahmad
,
Adnan, Shahid Khan
,
Kashif, Nisar
,
Iram, Haider
,
Rosilah, Hassan
,
Muhammad Reazul, Haque
,
Seleviawati
,
Tarmizi
,
Joel J. P. C., Rodrigues
Published 2021
Get full text
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
7
Evaluating The Alternative Assessment Practices in All Current Courses Offered by WC11 Programme
by
Seleviawati
,
Tarmizi
,
Kartinah, Zen
,
Johari, Abdullah
,
Tan, Chong Eng
,
Lau, Sei Ping
,
Halikul, Lenando
,
Adnan, Shahid Khan
,
Mohamad Imran, Bandan
,
Ahmad Hadinata, Fauzi
,
Rajan, Thangaveloo
,
Noralifah, Annuar
,
Azlina, Ahmadi Julaihi
Published 2020
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...