search
  • Home
  • Current
  • Archives
  • Announcements
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Search
  • Register
  • Login
Skip to main content Skip to main navigation menu Skip to site footer
  • Home
  • Current
  • Archives
  • Announcements
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
Online ISSN : 2600-7304
  1. Home /
  2. Search

Search

Advanced filters
1 - 19 of 19 items

Towards Inclusive Cybersecurity Learning: A Novice-Friendly Capture-the-Flag Onboarding Platform

DOI : 10.65136/jati.v7i1.147
Lik Ken Chen (1), Mohd Hanis Jenalis (2), Julia Juremi (3)
(1) Forensics and Cyber Security Research Centre Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(2) School of Technology Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(3) Forensics and Cyber Security Research Centre Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia
Abstract : 17
PDF : 13
DOI : 10.65136/jati.v7i1.147

Enhance Public Cybersecurity Awareness By Understanding Cybersecurity And Cyberthreats

DOI : 10.65136/jati.v6i1.174
Ng Qi Xuan (1), Dr. Intan Farahana Binti Kamsin (2)
(1) School of Computing Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia ,
(2) School of Computing Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia
Abstract : 20
PDF : 8
DOI : 10.65136/jati.v6i1.174

Review on the Enhancement of Cyber Security Policies That Impacts the Employment System

DOI : 10.65136/jati.v7i1.120
Geevitha Batumalai (1), Mohamad Fadli Zolkipli (2)
(1) School of Computing Universiti Utara Malaysia Kedah, Malaysia ,
(2) School of Computing Universitu Utara Malaysia Kedah, Malaysia
Abstract : 23
PDF : 12
DOI : 10.65136/jati.v7i1.120

VSDC-NFC Hacking and Skull Penetration Testing Framework

DOI : 10.65136/jati.v6i1.190
Mahmoud Akram Mahmoud Fahmy Abdulghany (1), Nor Azlina Abd Rahman (2), Julia Juremi (3), Kuruvikulam Chandrasekaran Arun (4)
(1) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia ,
(2) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia ,
(3) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia ,
(4) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia
Abstract : 15
PDF : 8
DOI : 10.65136/jati.v6i1.190
Comprehensive ZTA architecture illustrating components and how they work together

Zero Trust Architecture in Cloud Security: Enhancing Security Posture in the Cloud Era

DOI : 10.65136/jati.v9i1.3
Julia Juremi (1), Nishat Tabassum Tonny (2), Kazi Farhan Ishraq (3)
(1) Forensics & Cybersecurity Research Center, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia ,
(2) Forensics & Cybersecurity Research Center, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia ,
(3) Forensics & Cybersecurity Research Center, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia
51-56
Abstract : 141
PDF : 14
DOI : 10.65136/jati.v9i1.3

Authentication and Data Protection Mechanism in IoT Devices

DOI : 10.65136/jati.v9i1.2
Zhang Yule (1), Dr. Julia Juremi (2), Kazi Farhan Ishraq (3)
(1) Forensics & Cybersecurity Research Center, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia ,
(2) Forensics & Cybersecurity Research Center, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia ,
(3) Forensics & Cybersecurity Research Center, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia
1-4
Abstract : 344
PDF : 82
DOI : 10.65136/jati.v9i1.2

Web Application Common Vulnerabilities and Preventions

DOI : 10.65136/jati.v9i2.29
Julia Juremi (1), Ali Allouche (2), Kazi Farhan Ishraq (3)
(1) Forensics & Cybersecurity Research Centre, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia ,
(2) Forensics & Cybersecurity Research Centre, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia ,
(3) Forensics & Cybersecurity Research Centre, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia
49-54
Abstract : 31
PDF : 16
DOI : 10.65136/jati.v9i2.29

Simulation, Investigation and Response Towards Log4J Vulnerability (Log4Shell)

DOI : 10.65136/jati.v6i1.175
Seif Elsallamy (1), Julia Juremi (2)
(1) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(2) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia
Abstract : 21
PDF : 14
DOI : 10.65136/jati.v6i1.175

OSINT Toolkit for Reconnaissance phase of Penetration Testing

DOI : 10.65136/jati.v8i1.63
Indrasena Reddy Devireddy (1), Joshua Samual (2), Kamalakannan Machap (3)
(1) Asia Pacific University of Innovation and Technology Kuala Lumpur, Malaysia ,
(2) Asia Pacific University of Innovation and Technology Kuala Lumpur, Malaysia ,
(3) Asia Pacific University of Innovation and Technology Kuala Lumpur, Malaysia
40-44
Abstract : 25
PDF : 15
DOI : 10.65136/jati.v8i1.63

EnNos Mobile Application for Automated Malware Tracking on Android

DOI : 10.65136/jati.v6i1.176
Martin Loh Zhuan Jie (1), Julia Juremi (2)
(1) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(2) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia
Abstract : 17
PDF : 11
DOI : 10.65136/jati.v6i1.176

Acrypt: Minimizing Data Leakage in Cloud Storage with Cryptography Encryption

DOI : 10.65136/jati.v6i1.168
Ayshwarya Raj (1), Julia Juremi (2), Salasiah Sulaiman (3)
(1) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(2) Forensics & Cybersecurity Research Center (FSEC) Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(3) School of Computing Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia
Abstract : 17
PDF : 7
DOI : 10.65136/jati.v6i1.168

Cloud Testing: Requirements, Tools and Challenges

DOI : 10.65136/jati.v1i2.310
Ahmad Dahari Bin Jarno (1), Shahrin Bin Baharom (2), Maryam Shahpasand (3)
(1) CyberSecurity Malaysia Mines Resort City, 43300, Seri Kembangan, Selangor, Malaysia ,
(2) CyberSecurity Malaysia Mines Resort City, 43300, Seri Kembangan, Selangor, Malaysia ,
(3) FSec research centre Faculty of Computing, Engineering & Technology Asia Pacific University of Technology & Innovation Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia
Abstract : 6
PDF : 4
DOI : 10.65136/jati.v1i2.310

Food Donation Application to Improve the Distribution and Verification Process Within Selangor: Feedback

DOI : 10.65136/jati.v7i1.128
Veenoth A/L Shankarvelu (1), Halimaton Hakimi (2), Zety Marlia (3), Dewi Octaviani (4)
(1) School of Computing Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(2) School of Computing Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(3) School of Computing Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(4) School of Computing Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia
Abstract : 25
PDF : 12
DOI : 10.65136/jati.v7i1.128

Blockchain E-Certificate System with Ethereum Network and IPFS

DOI : 10.65136/jati.v9i1.23
Joshua Samual (1), Wong Yi Xing (2)
(1) Faculty of Computing and Technology, Asia Pacific University of Innovation and Technology, Kuala Lumpur, Malaysia ,
(2) Faculty of Computing and Technology, Asia Pacific University of Innovation and Technology, Kuala Lumpur, Malaysia
5-9
Abstract : 35
PDF : 18
DOI : 10.65136/jati.v9i1.23

IoT Challenges and Opportunities in Malaysia’s Digital Economy

DOI : 10.65136/jati.v9i4.34
Kamalanathan Shanmugam (1), Naresh Kumar Appadurai (2), Lau Yong Zheng (3), Subasree Ramish (4), Ramana Sarathy (5), Tulasi Appalasamy (6)
(1) Asia Pacific University of Technology & Innovation Technology, Kuala Lumpur, Malaysia ,
(2) Asia Pacific University of Technology & Innovation Technology, Kuala Lumpur, Malaysia ,
(3) KG College of Arts and Science, Coimbatore, Tamil Nadu, India ,
(4) KG College of Arts and Science, Coimbatore, Tamil Nadu, India ,
(5) KG College of Arts and Science, Coimbatore, Tamil Nadu, India ,
(6) Asia Pacific University of Technology & Innovation Technology, Kuala Lumpur, Malaysia
44-52
Abstract : 96
PDF : 48
DOI : 10.65136/jati.v9i4.34

Millennial Psychology Towards Hacking Activities

DOI : 10.65136/jati.v6i1.164
Nor Azlina Abd Rahman (1), Ibiwani Alisa Hussain (2), Noris Ismail (3), Hains Jojo (4), Yusra Khan (5)
(1) Forensic and Cyber Security Reseach Centre Asia Pacific University of Technology & Innovation Bukit Jalil, Kuala Lumpur, Malaysia ,
(2) School of Business Asia Pacific University of Technology & Innovation Bukit Jalil, Kuala Lumpur, Malaysia ,
(3) School of Technology Asia Pacific University of Technology & Innovation Bukit Jalil, Kuala Lumpur, Malaysia ,
(4) School of Technology Asia Pacific University of Technology & Innovation Bukit Jalil, Kuala Lumpur, Malaysia ,
(5) School of Technology Asia Pacific University of Technology & Innovation Bukit Jalil, Kuala Lumpur, Malaysia
Abstract : 18
PDF : 6
DOI : 10.65136/jati.v6i1.164

A Study on Mule Fraud and Defense Techniques: School Infrastructure

DOI : 10.65136/jati.v6i1.161
Quentin Jean Marie Grau (1), Nor Azlina Abd Rahman (2)
(1) Forensic and Cyber Security Research Centre Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia ,
(2) Forensic and Cyber Security Research Centre Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia
Abstract : 18
PDF : 9
DOI : 10.65136/jati.v6i1.161

The impact of data analytics in cyber security

DOI : 10.65136/jati.v5i1.219
Reshiwaran Jegatheswarn (1), Julia Juremi (2)
(1) School of Computing, Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(2) School of Computing, Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia
Abstract : 20
PDF : 11
DOI : 10.65136/jati.v5i1.219

Anti-phishing Email Detection Framework for New-Age Phishing Attacks

DOI : 10.65136/jati.v7i1.105
Muningandu Tjingaete (1), Julia Juremi (2)
(1) School of Computing Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia ,
(2) School of Computing Asia Pacific University of Technology and Innovation (APU) Kuala Lumpur, Malaysia
Abstract : 23
PDF : 8
DOI : 10.65136/jati.v7i1.105
1 - 19 of 19 items

Login

Register

SidebarMenu

Focus & Scope Author Guidelines Review Process Manuscript Template Publication Ethics Publication Frequency Open Access Policy Plagiarism Policy Editorial Board Processing Charge

IndexedBy

Indexing and Membership

ArticleTemplate

Article Template

StatCounter

Visitors

Flag Counter
StatCounter Logo View My Stats

Editorial Pick

State-of-the-Art Review and Future Directions in Artificial Intelligence-Based Detection of Brain Tumors Using MRI Datasets

December 21, 2025
Kohinur Parvin et al.
Vol. 9 No. 4 (2025)

Mitigation Technique Using a Hybrid Energy Storage and Time of Use (TOU) Approach in Solar Grid Connection

December 22, 2025
Mohammad Reza Maghami et al.
Vol. 9 No. 4 (2025)

Information

  • For Readers
  • For Authors
  • For Librarians

Address

  • Asia Pacific University of Technology & Innovation

    Technology Park Malaysia, Bukit Jalil, 57000 Kuala Lumpur, Malaysia.

Contact Info

  • Phone : +603 8996 1000 / +603 8992 5191

    Fax : +603 8996 1001

    Email : jati.editor@apu.edu.my

Jurnal Cakrawala Pendidikan Logo
Copyright © 2025 The Journal of Applied Technology and Innovation, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License. Licensed under Creative Commons License a Creative Commons Attribution-ShareAlike 4.0 International License. Site using Noble OJS 3 Theme
Themes by Openjournaltheme.com Themes by Openjournaltheme.com