Mohd Fairuz Iskandar Othman
Cited by
Cited by
Barriers to Information Technology Governance Adoption: A Preliminary Empirical Investigation
MFI Othman, T Chan, E Foo, KJ Nelson, GT Timbrell
15th International Business Information Management Association Conference …, 2011
Barriers to Formal IT Governance Practice--Insights from a Qualitative Study
MFI Othman, T Chan
46th Hawaii International Conference on System Sciences (HICSS), 4415-4424, 2013
Advanced Computer and Communication Engineering Technology: Proceedings of ICOCOE 2015
Springer 362, 1325, 2016
Clustering methods for cluster-based routing protocols in wireless sensor networks: Comparative study
AA Hassan, WM Shah, MF Iskandar, AAJ Mohammed
International Journal of Applied Engineering Research 12 (21), 11350-11360, 2017
What is the influence of users’ characteristics on their ability to detect phishing emails?
I Alseadoon, MFI Othman, T Chan
Advanced computer and communication engineering technology, 949-962, 2015
IT Governance Adoption in Malaysia: A Preliminary Investigation
MFI Othman, T Chan, E Foo
22nd Australasian Conference on Information Systems (ACIS), 1-10, 2011
Revealing the Influence of Feature Selection for Fast Attack Detection
MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MFI Othman
IJCSNS International Journal of Computer Science and Network Security 8, 107-115, 2008
Typology of Phishing Email Victims Based on their Behavioural Response
IM Alseadoon, MFI Othman, E Foo, T Chan
19th Americas Conference on Information Systems (AMCIS), 19, 2013
Clustering Approach in Wireless Sensor Networks Based on K-means: limitations and Recommendations
MFIO Ali Abdul-hussian Hassan, WahidahMd Shah, Ali Mohamed Husien, Mohammed ...
International Journal of Recent Technology and Engineering (IJRTE) 7 (6S5 …, 2019
Unequal clustering routing algorithms in wireless sensor networks: A comparative study
AAH Hassan, WM Shah, MF Iskandar, MN Al-Mhiqani, ZK Naseer
J. Adv. Res. Dyn. Control Syst 10 (2), 2142-2156, 2018
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to formation balanced clusters in wireless sensor networks.
AA Hassan, WM Shah, MFI Othman, HAH Hassan
International Journal of Electrical & Computer Engineering (2088-8708) 10, 2020
DNS Tunneling: a Review on Features
M Sammour, B Hussin, MFI Othman, M Doheir, B AlShaikhdeeb, MS Talib
International Journal of Engineering & Technology 7 (3.20), 1-5, 2018
K Nearest Neighbor Joins and Mapreduce Process Enforcement for the Cluster of Data Sets in Bigdata
AA Hassan, W Md Shah, MFI Othman, MS Talib, AAJ Mohammed
Journal of Advanced Research in Dynamical and Control Systems (JARDCS), 690-696, 2018
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
M Zulkiflee, MA Faizal, MFI Othman, AN Azman, S Shahrin
International Journal of Computer Science and Information Security (IJCSIS …, 2011
Vehicle Detection and Tracking System IoT based: A Review
MF Alrifaie, N Harum, MFI Othman, I Roslan, MA Shyaa
Int. Res. J. Eng. Technol, 1237-1241, 2018
Barriers to the Adoption of Formal IT Governance Practice: A Malaysian Case
MFI Othman
Queensland University of Technology, 2016
A Structured Literature Review on Applied Neuroscience in Information Systems (NeuroIS)
MH Hazawawi, N. A. M., Othman, M. F. I., Zakaria, M. H., Pee, N. C., & Emran
2nd International Symposium on Technology Management & Emerging Technologies …, 2015
A Novel Approach on Teaching Network Security for ICT Courses
MNM Khambari, MFI Othman, M Radzi Motsidi, M Faizal Abdollah
2009 International Conference on Engineering Education (ICEED), 66-71, 2009
New Curriculum Approach in Teaching Network Security Subjects for ICT Courses in Malaysia
MFI Othman, N Bahaman, Z Muslim, F Abdollah
Proceedings of World Academy of Science, Engineering and Technology, 293-297, 2008
High speed internet development in Africa using 4G-LTE technology-a review
M Njikam, S Nanna, S Shahrin, MFI Othman
Bulletin of Electrical Engineering and Informatics 8 (2), 577-585, 2019
The system can't perform the operation now. Try again later.
Articles 1–20