Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nor Effendy Othman is active.

Publication


Featured researches published by Nor Effendy Othman.


international conference on information technology | 2013

Comparison between android and iOS Operating System in terms of security

Mohd Shahdi Ahmad; Nur Emyra Musa; Rathidevi Nadarajah; Rosilah Hassan; Nor Effendy Othman

This paper compares between android and iPhone Operating System (iOS) mobile operating systems (MOS) that available in the market which is more specific on the security issue. These issues are reportedly the concern of not only the mobile customers but also the software developers. In achieving security requirements, the MOS developers need to know how to achieve the criteria. The security requirements for MOS are Application Sandboxing, Memory Randomization, Encryption, Data Storage Format and Built-in Antivirus. Application sandboxing enforces permissions, privileges, directories, entitlements and kernel access for a mobile app. Memory randomization ensures that the memory regions of mobile application as well as system shared libraries are all randomized at device and application start-up. Encryption is performed on disk or filer/folder level and also at the interprocess communication level. It is difficult to speak in favor or against the android or the iOS operating system in terms of better security. The way of using the device plays a major role in determining the security level. In terms of storage, all data are stored in Data Storage Format. Data can be stored at internal storage or external storage. To protect the MOS from virus attacks, antivirus need to be installed for increasing security areas.


symposium on reliable distributed systems | 2011

Towards Tag-based Cooperation for Mobile Ad Hoc Networks

Nor Effendy Othman; Stefan Weber

Cooperation between nodes in packet forwarding is crucial to enable multi-hop communication in mobile ad hoc networks. However, in self-organizing mobile ad hoc networks where each node acts as its own authority, nodes are self-interested and tempted to drop each others packets in order to conserve their limited resources. This selfish behavior can make it impossible to achieve multi-hop communication and high delivery success. A large number of studies have proposed different cooperation enforcement mechanisms for mobile ad hoc networks, however, most of them require each node to maintain memory of past interactions. This requirement can be a significant problem in open and large mobile ad hoc networks. In response, we propose a tag-based cooperation enforcement mechanism which enables cooperation to be enforced in mobile ad hoc networks without the need to maintain such memory.


Journal of theoretical and applied information technology | 2016

A review of mobile IP protocol for the implementation on dual stack mobility management

Farouk Abdul Jalin; Nor Effendy Othman


Journal of theoretical and applied information technology | 2015

Toward IPv4 to IPv6 migration within a campus network

Mohammad Mirwais Yousafzai; Nor Effendy Othman; Rosilah Hassan


International journal of applied engineering research | 2015

Balancing performance and security for IPv6 neighbor discovery

Amjed Sid Ahmed; Nurul Halimatul Asmak Ismail; Rosilah Hassan; Nor Effendy Othman


Journal of theoretical and applied information technology | 2013

A study on cooperation enforcement between nodes in mobile AD HOC networks

Nor Effendy Othman; Stefan Weber; Rosilah Hassan


Asia-Pacific Journal of Information Technology and Multimedia | 2018

An Implementation Study of DMM PMIPV6 Protocol on Dual-Stack Network Environment

Farouk Abd. Jalin; Nor Effendy Othman; Rosilah Hassan; Abdul Hadi Abd Rahman; Dahlila Putri Dahnil Sikumbang; Khairul Azmi Abu Bakar


international conference on electrical engineering and informatics | 2017

Secure neighbor discovery (SeND): Attacks and challenges

Amjed Sid Ahmed; Rosilah Hassan; Nor Effendy Othman


Journal of theoretical and applied information technology | 2017

Agent-based modeling of tag-based cooperation in mobile environment

Nor Effendy Othman; Rosilah Hassan


Advanced Science Letters | 2017

Securing IPv6 link local communication using IPSec: Obstacles and challenges

Amjed Sid Ahmed; Rosilah Hassan; Nor Effendy Othman

Collaboration


Dive into the Nor Effendy Othman's collaboration.

Top Co-Authors

Avatar

Rosilah Hassan

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Amjed Sid Ahmed

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alaa Abdullah Majhool

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Farouk Abdul Jalin

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Samer Sami Hasan

National University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge