Follow
Mohd Fairuz Iskandar Othman
Title
Cited by
Cited by
Year
Barriers to Information Technology Governance Adoption: A Preliminary Empirical Investigation
MFI Othman, T Chan, E Foo, KJ Nelson, GT Timbrell
15th International Business Information Management Association Conference …, 2011
532011
What is the influence of users’ characteristics on their ability to detect phishing emails?
I Alseadoon, MFI Othman, T Chan
Advanced computer and communication engineering technology, 949-962, 2015
372015
Barriers to Formal IT Governance Practice--Insights from a Qualitative Study
MFI Othman, T Chan
46th Hawaii International Conference on System Sciences (HICSS), 4415-4424, 2013
312013
Clustering methods for cluster-based routing protocols in wireless sensor networks: Comparative study
AA Hassan, WM Shah, MF Iskandar, AAJ Mohammed
Int. J. Appl. Eng. Res 12 (21), 11350-11360, 2017
302017
An improved energy-efficient clustering protocol to prolong the lifetime of the WSN-based IoT
AAH Hassan, WM Shah, AHH Habeb, MFI Othman, MN Al-Mhiqani
Ieee Access 8, 200500-200517, 2020
292020
Advanced Computer and Communication Engineering Technology: Proceedings of ICOCOE 2015
Springer 362, 1325, 2016
25*2016
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to formation balanced clusters in wireless sensor networks.
AA Hassan, WM Shah, MFI Othman, HAH Hassan
International Journal of Electrical & Computer Engineering (2088-8708) 10 (2), 2020
212020
DNS tunneling: a review on features
M Sammour, B Hussin, MFI Othman, M Doheir, B AlShaikhdeeb, MS Talib
International Journal of Engineering and Technology 7 (3.20), 1-5, 2018
132018
Clustering Approach in Wireless Sensor Networks Based on K-means: limitations and Recommendations
MFIO Ali Abdul-hussian Hassan, WahidahMd Shah, Ali Mohamed Husien, Mohammed ...
International Journal of Recent Technology and Engineering (IJRTE) 7 (6S5 …, 2019
12*2019
Vehicle detection and tracking system IoT based: a review
MF Alrifaie, N Harum, MFI Othman, I Roslan, MA Shyaa
Int. Res. J. Eng. Technol, 1237-1241, 2018
112018
Typology of Phishing Email Victims Based on their Behavioural Response
IM Alseadoon, MFI Othman, E Foo, T Chan
19th Americas Conference on Information Systems (AMCIS), 19, 2013
112013
Revealing the Influence of Feature Selection for Fast Attack Detection
MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MFI Othman
IJCSNS International Journal of Computer Science and Network Security 8, 107-115, 2008
112008
Unequal clustering routing algorithms in wireless sensor networks: A comparative study
AAH Hassan, WM Shah, MF Iskandar, MN Al-Mhiqani, ZK Naseer
Journal of Advanced Research in Dynamical and Control Systems 10 (2), 2018
102018
Comparative analysis for detecting dns tunneling using machine learning techniques
M Sammour, B Hussin, FI Othman
International Journal of Applied Engineering Research 12 (22), 12762-12766, 2017
102017
Barriers to the Adoption of Formal IT Governance Practice: A Malaysian Case
MFI Othman
Queensland University of Technology, 2016
102016
Users’ Experience In Role-Playing Game: Measuring The Player’s Gameplay Experience
I Ahmad, A Jaafar, MFI Othman, TM Kintakaningrum
Jurnal Teknologi 77 (19), 45-48, 2015
102015
IT Governance Adoption in Malaysia: A Preliminary Investigation
MFI Othman, T Chan, E Foo
22nd Australasian Conference on Information Systems (ACIS), 1-10, 2011
102011
K Nearest Neighbor Joins and Mapreduce Process Enforcement for the Cluster of Data Sets in Bigdata
AA Hassan, W Md Shah, MFI Othman, MS Talib, AAJ Mohammed
Journal of Advanced Research in Dynamical and Control Systems (JARDCS), 690-696, 2018
72018
Using analytical hierarchy process (AHP) to evaluate barriers in adopting formal IT governance practices
MFI Othman, NC Pee, YA Rahim, HA Sulaiman, MA Othman, MZAA Aziz
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
52018
Internet of things based heart rate monitoring and alert system
WM Shah, MH Yaakob, N Harum, A Hassan, MFI Othman, IRA Hamid
JACTA 2 (1), 27-31, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20