Obserwuj
Asrul Hadi bin Yaacob
Asrul Hadi bin Yaacob
Zweryfikowany adres z mmu.edu.my
Tytuł
Cytowane przez
Cytowane przez
Rok
Arima based network anomaly detection
AH Yaacob, IKT Tan, SF Chien, HK Tan
2010 Second International Conference on Communication Software and Networks …, 2010
1782010
IPSec over Heterogeneous IPv4 and IPv6 Networks: Issues and Implementation
NM Ahmad, AH Yaacob
International Journal of Computer Networks Communications 4 (5), 57-72, 2012
202012
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
152010
Revealing the Influence of Feature Selection for Fast Attack Detection
MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MF Iskandar
International Journal of Computer Science and Network Security 8 (8), 107-115, 2008
132008
Performance analysis of MapReduce on OpenStack-based Hadoop virtual cluster
NM Ahmad, AH Yaacob, AHM Amin, S Kannan
2014 IEEE 2nd International Symposium on Telecommunication Technologies …, 2014
52014
Moving Towards Positive Security Model for Web Application Firewall
AH Yaacob, NM Ahmad, NN Ahmad, M Roslee
World Academy Of Science, Engineering And Technology 72, 1759-1764, 2012
52012
End to end ipsec support across ipv4/Ipv6 translation gateway
NM Ahmad, AH Yaacob
2010 Second International Conference on Network Applications, Protocols and …, 2010
52010
An Earlier Detection Framework for Network Intrusion Detection System
MA Faizal, HY Asrul, S Shahrin
Proceeding of the Second International Conference on Advances in Information …, 2007
42007
Host based detection approach using time based module for fast attack detection behavior
FM Abdollah, MZ Mas’ ud, S Sahib, AH Yaacob, R Yusof, SR Selamat
Recent Progress in Data Engineering and Internet Technology: Volume 2, 163-171, 2012
32012
IKE authentication using certificateless signature
AH Yaacob, NM Ahmad, R Fauzi, MSAM Shikh
The International Conference on Information Networking 2011 (ICOIN2011), 447-452, 2011
32011
Performance analysis of certificateless signature for IKE authentication
NM Ahmad, AH Yaacob, R Fauzi, A Khorram
International Journal of Computer and Information Engineering 5 (2), 211-218, 2011
22011
Improved Fast Attack Detection Model for Network Intrusion Detection
MF Abdollah, AH Yaacob, S Sahib
Proceeding of International Conference on Engineering and ICT, UTeM, 2007
22007
Towards Early Detection of Network Intrusion
S Shahib, MF Abdollah, AH Yaacob
22007
Network performance testing on VM based autonomous web server
MZ Mas' ud, AH Yaacob, NM Ahmad
2006 International Conference on Computing & Informatics, 1-6, 2006
22006
Secure partial secret key issuing in Certificateless Public Key Infrastructure
S Mehrasa, NM Ahmad, A Khorram, AH Yaacob
2011 IEEE Student Conference on Research and Development, 79-84, 2011
12011
Comparative analysis and implementation of certificateless based authentication scheme
NM Ahmad, AH Yaacob, A Khorram, JF Tan, YH Ong, YM Leong
Informatics Engineering and Information Science: International Conference …, 2011
12011
Feature Selection For Detecting Fast Attack in Network Intrusion Detection
MA Faizal, S Shahrin, HY Asrul, MIO Fairuz, Y Robbie
Journal of Advanced Manufacturing Technology 2 (2), 39-56, 2008
12008
Virtual Machine based Autonomous Web Server
MZ Mas’ud, MA Faizal, Y Asrul Hadi, NM Ahmad, H Erman
Recent Progress in Data Engineering and Internet Technology 157 (2), 173-182, 2012
2012
IPSec Authentication using Certificateless Signature in Heterogeneous IPv4/IPv6 Network
NM Ahmad, AH Yaacob, R Fauzi, A Khorram, JAK Lama
IEEE Symposium on Computers & Informatics, 668 - 673, 2011
2011
A Hybrid Method For K-Anonymization Using Clustering Technique
S Sahib, MK Abd Ghani, AH Yaacob
International Conference on Aerospace Engineering and Information Technology …, 2011
2011
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20