Browsing by Author "Shuaibu, BM"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Classification of Students' Performance in Computer Programming Course According to Learning Style(IEEE Computer Soc, 2009) ;Norwawi, NM ;Abdusalam, SF ;Hibadullah, CFShuaibu, BMIn Information Technology related programs, computer programming courses are made compulsory subjects in most institutions of learning. However there are many reports on poor performance among students in such courses. Previous studies examined some of the variables influencing students' performance using statistical data analysis. The critical point of this study is the use of classification algorithm to extract patterns which are examined from the cognitive factor specific learning style. The findings show that that student's good performance in programming courses has a visual, active and sequential learning style. - Some of the metrics are blocked by yourconsent settings
Publication Systematic review of web application security development model(Springer, 2015) ;Shuaibu, BM ;Norwawi, NM ;Selamat, MHAl-Alwani, AIn recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security development models used to secure the web application layer, the security approaches or techniques used in the process, the stages in the development model in which the approaches or techniques are emphasized, and the tools and mechanism used to detect vulnerabilities. The study extracted 499 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Google-Scholar, Science Direct, Scopus, Springer Link and ISI Web. After investigation, only 43 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one development model is referred to as a standard or preferred model for web application development. However, agile development models seem to have gained more attention, probably due to the multiple stakeholders that are involved in discussing security viewpoints, rather than a few members of the development team. It appears also that there is consistency in the use of the threat-modeling technique, probably due to its effectiveness in dealing with different kinds of vulnerabilities.