Mohd Fairuz Iskandar Othman
TitleCited byYear
Barriers to Information Technology Governance Adoption: A Preliminary Empirical Investigation
MFI Othman, T Chan, E Foo, KJ Nelson, GT Timbrell
15th International Business Information Management Association Conference …, 2011
Barriers to Formal IT Governance Practice--Insights from a Qualitative Study
MFI Othman, T Chan
46th Hawaii International Conference on System Sciences (HICSS), 4415-4424, 2013
Advanced Computer and Communication Engineering Technology: Proceedings of ICOCOE 2015
Springer 362, 1325, 2016
What Is the Influence of Users’ Characteristics on Their Ability to Detect Phishing Emails?
I Alseadoon, MFI Othman, T Chan
Advanced Computer and Communication Engineering Technology, 949-962, 2015
Revealing the Influence of Feature Selection for Fast Attack Detection
MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MFI Othman
IJCSNS International Journal of Computer Science and Network Security 8, 107-115, 2008
Typology of Phishing Email Victims Based on their Behavioural Response
IM Alseadoon, MFI Othman, E Foo, T Chan
19th Americas Conference on Information Systems (AMCIS), 19, 2013
Clustering Methods for Cluster-based Routing Protocols in Wireless Sensor Networks: Comparative Study
AA Hassan, MF Iskandar
Int. J. Appl. Eng. Res 12 (21), 11350-11360, 2017
IT Governance Adoption in Malaysia: A Preliminary Investigation
MFI Othman, T Chan, E Foo
22nd Australasian Conference on Information Systems (ACIS), 1-10, 2011
Unequal clustering routing algorithms in wireless sensor networks: A comparative study
AAH Hassan, WM Shah, MF Iskandar, MN Al-Mhiqani, ZK Naseer
J. Adv. Res. Dyn. Control Syst 10 (2), 2142-2156, 2018
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
M Zulkiflee, MA Faizal, MFI Othman, AN Azman, S Shahrin
International Journal of Computer Science and Information Security (IJCSIS …, 2011
K Nearest Neighbor Joins and Mapreduce Process Enforcement for the Cluster of Data Sets in Bigdata
AA Hassan, W Md Shah, MFI Othman, MS Talib, AAJ Mohammed
Journal of Advanced Research in Dynamical and Control Systems (JARDCS), 690-696, 2018
Barriers to the Adoption of Formal IT Governance Practice: A Malaysian Case
MFI Othman
Queensland University of Technology, 2016
A Structured Literature Review on Applied Neuroscience in Information Systems (NeuroIS)
MH Hazawawi, N. A. M., Othman, M. F. I., Zakaria, M. H., Pee, N. C., & Emran
2nd International Symposium on Technology Management & Emerging Technologies …, 2015
A Novel Approach on Teaching Network Security for ICT Courses
MNM Khambari, MFI Othman, M Radzi Motsidi, M Faizal Abdollah
2009 International Conference on Engineering Education (ICEED), 66-71, 2009
New approach in teaching network security subjects
MR Motsidi, MFI Othman, Y Abd Rahim, MN Khambari
International Conference on Information. Universiti Teknikal Malaysia Melaka …, 2009
New Curriculum Approach in Teaching Network Security Subjects for ICT Courses in Malaysia
MFI Othman, N Bahaman, Z Muslim, F Abdollah
Proceedings of World Academy of Science, Engineering and Technology, 293-297, 2008
DycScreen – Cross-Platform Dyslexia Screening Test For Malaysian Children Through Hybrid Applications
NC Pee, LP Huang, MA Othman, HA Sulaiman, MFI Othman, ...
2nd International Conference on Communication and Computer Engineering …, 2015
Methods of Tumor Detection Using Microwave Technology: A Review
MD Daud, MA Othman, MFI Othman
Journal of Engineering & Applied Sciences 9 (9), 2014
Penggunaan Alat Bantu Simulasi Dalam Pembelajaran Rangkaian Kawasan Setempat Maya (VLAN)
N Bahaman, E Hamid, MFI Othman, EE Hassan
Prosiding Seminar Kebangsaan Aplikasi Sains Dan Matematik 2008, 2008
Feature Selection For Detecting Fast Attack in Network Intrusion Detection
MA Faizal, S Shahrin, HY Asrul, MFI Othman, Y Robbie
Journal of Advanced Manufacturing Technology 2 (2), 39-56, 2008
The system can't perform the operation now. Try again later.
Articles 1–20