Showing
1 - 7
results of
7
for search '
Shahrin , Sahib
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Shahrin , Sahib
Showing
1 - 7
results of
7
for search '
Shahrin , Sahib
'
, query time: 0.03s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
A Psychovisual Model based on Discrete Orthonormal Transform
by
Abu, Nur Azman
,
Ferda, Ernawan
,
Shahrin
,
Sahib
Published 2013
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
2
Perception on Cyber Terrorism: A Focus Group Discussion Approach
by
Rabiah, Ahmad
,
Zahari, Yunos
,
Shahrin
,
Sahib
,
Mariana, Yusoff
Published 2012
Get full text
Get full text
Article
Save to List
Saved in:
3
Image Projection Over The Edge
by
Abu, Nur Azman
,
Siaw Lang, Wong
,
Shahrin
,
Sahib
Published 2010
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
4
CNC PCB drilling machine using novel natural approach to euclidean TSP
by
Zulkifli, Tahir
,
Nur Azman, Abu
,
Shahrin
,
Sahib
,
Nanna Suryana, Herman
Published 2010
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
5
Discovering Cyber Terrorism Using Trace Pattern
by
Nurhashikin, Mohd Salleh
,
Siti Rahayu, Selamat
,
Robiah, Yusof
,
Shahrin
,
Sahib
Published 2016
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
6
An Evaluation Of N-gram System Call Sequence In Mobile Malware Detection
by
Mohd Zaki, Mas'ud
,
Shahrin
,
Sahib
,
Mohd Faizal, Abdollah
,
Siti Rahayu, Selamat
,
Robiah, Yusof
Published 2016
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
7
Formulating Generalize Malware Attack Pattern Using Features Selection
by
Robiah, Yusof
,
Mohd Zaki, Mas'ud
,
Siti Rahayu, Selamat
,
Mohd Faizal, Abdollah
,
Shahrin
,
Sahib
,
Rudy Fadhlee, Mohd Dollah
Published 2016
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...