Mohd Fairuz Iskandar Othman
Cited by
Cited by
Barriers to Information Technology Governance Adoption: A Preliminary Empirical Investigation
MFI Othman, T Chan, E Foo, KJ Nelson, GT Timbrell
15th International Business Information Management Association Conference …, 2011
What is the influence of users’ characteristics on their ability to detect phishing emails?
I Alseadoon, MFI Othman, T Chan
Advanced computer and communication engineering technology, 949-962, 2015
Barriers to Formal IT Governance Practice--Insights from a Qualitative Study
MFI Othman, T Chan
46th Hawaii International Conference on System Sciences (HICSS), 4415-4424, 2013
Advanced Computer and Communication Engineering Technology: Proceedings of ICOCOE 2015
Springer 362, 1325, 2016
Clustering methods for cluster-based routing protocols in wireless sensor networks: Comparative study
AA Hassan, WM Shah, MF Iskandar, AAJ Mohammed
Int. J. Appl. Eng. Res 12 (21), 11350-11360, 2017
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to formation balanced clusters in wireless sensor networks.
AA Hassan, WM Shah, MFI Othman, HAH Hassan
International Journal of Electrical & Computer Engineering (2088-8708) 10 (2), 2020
An improved energy-efficient clustering protocol to prolong the lifetime of the WSN-based IoT
AAH Hassan, WM Shah, AHH Habeb, MFI Othman, MN Al-Mhiqani
IEEE Access 8, 200500-200517, 2020
DNS tunneling: a review on features
M Sammour, B Hussin, MFI Othman, M Doheir, B AlShaikhdeeb, MS Talib
International Journal of Engineering and Technology 7 (3.20), 1-5, 2018
Clustering Approach in Wireless Sensor Networks Based on K-means: limitations and Recommendations
MFIO Ali Abdul-hussian Hassan, WahidahMd Shah, Ali Mohamed Husien, Mohammed ...
International Journal of Recent Technology and Engineering (IJRTE) 7 (6S5 …, 2019
IT Governance Adoption in Malaysia: A Preliminary Investigation
MFI Othman, T Chan, E Foo
22nd Australasian Conference on Information Systems (ACIS), 1-10, 2011
Revealing the Influence of Feature Selection for Fast Attack Detection
MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MFI Othman
IJCSNS International Journal of Computer Science and Network Security 8, 107-115, 2008
Typology of Phishing Email Victims Based on their Behavioural Response
IM Alseadoon, MFI Othman, E Foo, T Chan
19th Americas Conference on Information Systems (AMCIS), 19, 2013
Unequal clustering routing algorithms in wireless sensor networks: A comparative study
AA Hassan, WM Shah, MF Iskandar, MN Al-Mhiqani, ZK Naseer
J. Adv. Res. Dyn. Control Syst 10 (2), 2142-2156, 2018
Vehicle detection and tracking system IoT based: a review
MF Alrifaie, N Harum, MFI Othman, I Roslan, MA Shyaa
Int. Res. J. Eng. Technol, 1237-1241, 2018
Comparative analysis for detecting dns tunneling using machine learning techniques
M Sammour, B Hussin, FI Othman
International Journal of Applied Engineering Research 12 (22), 12762-12766, 2017
Users’ Experience In Role-Playing Game: Measuring The Player’s Gameplay Experience
I Ahmad, A Jaafar, MFI Othman, TM Kintakaningrum
Jurnal Teknologi 77 (19), 45-48, 2015
Barriers to the Adoption of Formal IT Governance Practice: A Malaysian Case
MFI Othman
Queensland University of Technology, 2016
K Nearest Neighbor Joins and Mapreduce Process Enforcement for the Cluster of Data Sets in Bigdata
AA Hassan, W Md Shah, MFI Othman, MS Talib, AAJ Mohammed
Journal of Advanced Research in Dynamical and Control Systems (JARDCS), 690-696, 2018
A Structured Literature Review on Applied Neuroscience in Information Systems (NeuroIS)
MH Hazawawi, N. A. M., Othman, M. F. I., Zakaria, M. H., Pee, N. C., & Emran
2nd International Symposium on Technology Management & Emerging Technologies …, 2015
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
M Zulkiflee, MA Faizal, MFI Othman, AN Azman, S Shahrin
International Journal of Computer Science and Information Security (IJCSIS …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20