Nor Effendy Othman
Trinity College, Dublin
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nor Effendy Othman.
international conference on information technology | 2013
Mohd Shahdi Ahmad; Nur Emyra Musa; Rathidevi Nadarajah; Rosilah Hassan; Nor Effendy Othman
This paper compares between android and iPhone Operating System (iOS) mobile operating systems (MOS) that available in the market which is more specific on the security issue. These issues are reportedly the concern of not only the mobile customers but also the software developers. In achieving security requirements, the MOS developers need to know how to achieve the criteria. The security requirements for MOS are Application Sandboxing, Memory Randomization, Encryption, Data Storage Format and Built-in Antivirus. Application sandboxing enforces permissions, privileges, directories, entitlements and kernel access for a mobile app. Memory randomization ensures that the memory regions of mobile application as well as system shared libraries are all randomized at device and application start-up. Encryption is performed on disk or filer/folder level and also at the interprocess communication level. It is difficult to speak in favor or against the android or the iOS operating system in terms of better security. The way of using the device plays a major role in determining the security level. In terms of storage, all data are stored in Data Storage Format. Data can be stored at internal storage or external storage. To protect the MOS from virus attacks, antivirus need to be installed for increasing security areas.
symposium on reliable distributed systems | 2011
Nor Effendy Othman; Stefan Weber
Cooperation between nodes in packet forwarding is crucial to enable multi-hop communication in mobile ad hoc networks. However, in self-organizing mobile ad hoc networks where each node acts as its own authority, nodes are self-interested and tempted to drop each others packets in order to conserve their limited resources. This selfish behavior can make it impossible to achieve multi-hop communication and high delivery success. A large number of studies have proposed different cooperation enforcement mechanisms for mobile ad hoc networks, however, most of them require each node to maintain memory of past interactions. This requirement can be a significant problem in open and large mobile ad hoc networks. In response, we propose a tag-based cooperation enforcement mechanism which enables cooperation to be enforced in mobile ad hoc networks without the need to maintain such memory.
Journal of theoretical and applied information technology | 2016
Farouk Abdul Jalin; Nor Effendy Othman
Journal of theoretical and applied information technology | 2015
Mohammad Mirwais Yousafzai; Nor Effendy Othman; Rosilah Hassan
International journal of applied engineering research | 2015
Amjed Sid Ahmed; Nurul Halimatul Asmak Ismail; Rosilah Hassan; Nor Effendy Othman
Journal of theoretical and applied information technology | 2013
Nor Effendy Othman; Stefan Weber; Rosilah Hassan
Asia-Pacific Journal of Information Technology and Multimedia | 2018
Farouk Abd. Jalin; Nor Effendy Othman; Rosilah Hassan; Abdul Hadi Abd Rahman; Dahlila Putri Dahnil Sikumbang; Khairul Azmi Abu Bakar
international conference on electrical engineering and informatics | 2017
Amjed Sid Ahmed; Rosilah Hassan; Nor Effendy Othman
Journal of theoretical and applied information technology | 2017
Nor Effendy Othman; Rosilah Hassan
Advanced Science Letters | 2017
Amjed Sid Ahmed; Rosilah Hassan; Nor Effendy Othman