Blockchain technology the identity management and authentication service disruptor: a survey SY Lim, PT Fotsing, A Almasri, O Musa, MLM Kiah, TF Ang, R Ismail International Journal on Advanced Science, Engineering and Information …, 2018 | 199 | 2018 |
Scientific workflows: moving across paradigms CS Liew, MP Atkinson, M Galea, TF Ang, P Martin, JIV Hemert ACM Computing Surveys (CSUR) 49 (4), 1-39, 2016 | 134 | 2016 |
A hybrid genetic algorithm for optimization of scheduling workflow applications in heterogeneous computing systems SG Ahmad, CS Liew, EU Munir, TF Ang, SU Khan Journal of Parallel and Distributed Computing 87, 80-90, 2016 | 121 | 2016 |
The impact of play on child development-a literature review NK Lai, TF Ang, LY Por, CS Liew European Early Childhood Education Research Journal 26 (5), 625-643, 2018 | 115 | 2018 |
Whitesteg: a new scheme in information hiding using text steganography LY Por, TF Ang, B Delina WSEAS transactions on computers 7 (6), 735-745, 2008 | 93 | 2008 |
Distributed controller clustering in software defined networks A Abdelaziz, AT Fong, A Gani, U Garba, S Khan, A Akhunzada, ... PloS one 12 (4), e0174715, 2017 | 90 | 2017 |
Scheduling framework for bandwidth-aware job grouping-based scheduling in grid computing NW Keat, AT Fong, LT Chaw, LC Sun Malaysian Journal of Computer Science 19 (2), 117-126, 2006 | 63 | 2006 |
Security issues and future challenges of cloud service authentication SY Lim, MLM Kiah, TF Ang Acta Polytechnica Hungarica 14 (2), 69-89, 2017 | 51 | 2017 |
An enhanced mechanism for image steganography using sequential colour cycle algorithm. LY Por, DB Yin, TF Ang, SY Ong Int. Arab J. Inf. Technol. 10 (1), 51-60, 2013 | 41 | 2013 |
Graphical password: prevent shoulder-surfing attack using digraph substitution rules LY Por, CS Ku, A Islam, TF Ang Frontiers of Computer Science 11, 1098-1108, 2017 | 39 | 2017 |
Learning through intuitive interface: A case study on preschool learning NK Lai, TF Ang, LY Por, CS Liew Computers & Education 126, 443-458, 2018 | 35 | 2018 |
StegCure: a comprehensive steganographic tool using enhanced LSB scheme LY Por, WK Lai, Z Alireza, TF Ang, MT Su, B Delina Delina, Faculty of Computer Science and Information Technology University of …, 2008 | 32 | 2008 |
Using journal use study feedback to improve accessibility AN Zainab, AR Huzaimah, TF Ang The Electronic Library 25 (5), 558-574, 2007 | 27 | 2007 |
Improving the accuracy rate of link quality estimation using fuzzy logic in mobile wireless sensor network Z Huang, LY Por, TF Ang, MH Anisi, MS Adam Advances in Fuzzy Systems 2019 (1), 3478027, 2019 | 21 | 2019 |
Dynamic pricing scheme for resource allocation in multi-cloud environment TF Ang, LY Por, CS Liew Malaysian Journal of Computer Science 30 (1), 1-17, 2017 | 21 | 2017 |
Preventing shoulder-surfing attacks using digraph substitution rules and pass-image output feedback LY Por, CS Ku, TF Ang Symmetry 11 (9), 1087, 2019 | 15 | 2019 |
Mobile phone data: A survey of techniques, features, and applications M Okmi, LY Por, TF Ang, CS Ku Sensors 23 (2), 908, 2023 | 14 | 2023 |
An adaptive wake-up-interval to enhance receiver-based ps-mac protocol for wireless sensor networks MS Adam, LY Por, MR Hussain, N Khan, TF Ang, MH Anisi, Z Huang, I Ali Sensors 19 (17), 3732, 2019 | 12 | 2019 |
Survey on network virtualization using OpenFlow: Taxonomy, opportunities, and open issues A Abdelaziz, TF Ang, M Sookhak, S Khan, A Vasilakos, CS Liew, ... KSII Transactions on Internet and Information Systems (TIIS) 10 (10), 4902-4932, 2016 | 12 | 2016 |
An interactive web-based wedding planner with comparative analysis decision support system RF Boey, TF Ang, CS Liew WSEAS Transactions on Information Science and Applications 5 (3), 211-220, 2008 | 12 | 2008 |