Nor Badrul Anuar
Tytuł
Cytowane przez
Cytowane przez
Rok
The rise of “big data” on cloud computing: Review and open research issues
IAT Hashem, I Yaqoob, NB Anuar, S Mokhtar, A Gani, SU Khan
Information systems 47, 98-115, 2015
25802015
The role of big data in smart city
IAT Hashem, V Chang, NB Anuar, K Adewole, I Yaqoob, A Gani, E Ahmed, ...
International Journal of Information Management 36 (5), 748-758, 2016
7262016
Evaluation of machine learning classifiers for mobile malware detection
FA Narudin, A Feizollah, NB Anuar, A Gani
Soft Computing 20 (1), 343-357, 2016
2932016
Big data: From beginning to future
I Yaqoob, IAT Hashem, A Gani, S Mokhtar, E Ahmed, NB Anuar, ...
International Journal of Information Management 36 (6), 1231-1247, 2016
2822016
The evolution of android malware and android analysis techniques
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro
ACM Computing Surveys (CSUR) 49 (4), 1-41, 2017
2572017
A review on feature selection in mobile malware detection
A Feizollah, NB Anuar, R Salleh, AWA Wahab
Digital investigation 13, 22-37, 2015
2002015
Cloud Service Selection using Multi-Criteria Decision Analysis
M Whaiduzzaman, A Gani, NB Anuar, M Shiraz, MN Haque, IT Haque
The Scientific World Journal, 2014
1842014
Androdialysis: Analysis of android intent effectiveness in malware detection
A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell
computers & security 65, 121-134, 2017
1482017
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham
Engineering Applications of Artificial Intelligence 32, 228-241, 2014
1432014
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
S Shamshirband, NB Anuar, MLM Kiah, A Patel
Engineering Applications of Artificial Intelligence 26 (9), 2105–2127, 2013
1422013
Bibliometric studies on single journals: A review.
WUA Kevin, AN Zainab, NB Anuar
Malaysian journal of library & information science 14 (1), 17-55, 2009
1382009
Botnet detection techniques: review, future trends and issues
A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar
1242014
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations
M Hussain, A Al-Haiqi, AA Zaidan, BB Zaidan, MLM Kiah, NB Anuar, ...
Computer methods and programs in biomedicine 122 (3), 393-408, 2015
1192015
Malicious accounts: Dark of the social networks
KS Adewole, NB Anuar, A Kamsin, KD Varathan, SA Razak
Journal of Network and Computer Applications 79, 41-67, 2017
1172017
D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
S Shamshirband, A Amini, NB Anuar, MLM Kiah, YW Teh, S Furnell
Measurement 55, 212-226, 2014
1062014
Secure and dependable software defined networks
A Akhunzada, A Gani, NB Anuar, A Abdelaziz, MK Khan, A Hayat, ...
Journal of Network and Computer Applications 61, 199-221, 2016
1012016
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ...
Journal of Network and Computer Applications 42, 102-117, 2014
1012014
A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection
A Feizollah, NB Anuar, R Salleh, F Amalina, RR Ma’arof, S Shamshirband
Malaysian Journal of Computer Science 26 (4), 251-265, 2013
1002013
Intrusion response systems: Foundations, design, and challenges
Z Inayat, A Gani, NB Anuar, MK Khan, S Anwar
Journal of Network and Computer Applications 62, 53-74, 2016
882016
Routing protocol design for secure WSN: Review and open research issues
SM Zin, NB Anuar, MLM Kiah, ASK Pathan
Journal of Network and Computer Applications 41, 517-530, 2014
882014
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20