Obserwuj
Mohd Zaki Mas'ud
Mohd Zaki Mas'ud
Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka
Zweryfikowany adres z utem.edu.my - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
742014
Generic taxonomy of social engineering attack
F Mohd Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas' ud
56*2011
A New Generic Taxonomy on Hybrid Malware Detection Technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
Arxiv preprint arXiv:0909.4860, 2009
472009
Revealing the criterion on botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, SR Selamat, R Yusof
International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013
322013
Machine Learning for HTTP Botnet Detection Using Classifier Algorithms
RFM Dollah, MA Faizal, F Arif, MZ Mas’ud, LK Xin
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
212018
Threshold Verification Technique for Network Intrusion Detection System
A Mohd Faizal, M Mohd Zaki, S Shahrin, Y Robiah, S Siti Rahayu
International Journal of Computer Science and Information Security 2 (1), 2009
21*2009
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
2013 International Conference on Technology, Informatics, Management …, 2013
162013
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, M Zaki, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
142010
Profiling mobile malware behaviour through hybrid malware analysis approach
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
132013
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy
IJ Network Security 19 (5), 727-733, 2017
122017
Android Malware Detection System Classification
MZ Mas’ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
122014
Recognizing API Features for Malware Detection Using Static Analysis
SMA Ghani, MF Abdollah, R Yusof, M Zaki
Journal of Wireless Networking and Communications 5 (2A), 6-12, 2015
112015
Implementation of IPv6 network testbed: Intrusion detection system on transition mechanism
N Bahaman, P Anton Satria, Z Mas' ud
Journal of Applied Sciences 11 (1), 118-124, 2011
112011
ANALYSIS OF PHISHING SUSCEPTIBILITY IN A WORKPLACE: A BIG-FIVE PERSONALITY PERSPECTIVES
S ANAWAR, DL KUNASEGARAN, MZ MAS’UD, NA ZAKARIA
Journal of Engineering Science and Technology 14 (5), 2865-2882, 2019
92019
An improved traditional worm attack pattern
Y Robiah, SS Rahayu, S Sahib, MM Zaki, MA Faizal, R Marliza
Information Technology (ITSim), 2010 International Symposium in 2, 1067-1072, 2010
92010
A Systematic Literature Review on the Security and Privacy of the Blockchain and Cryptocurrency
A Hassan, MZ Mas' ud, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin
OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020
82020
New Multi-step Worm Attack Model
Y Robiah, SS Rahayu, S Shahrin, MA Faizal, MM Zaki, R Marliza
Arxiv preprint arXiv:1001.3477, 2010
82010
Advanced Trace Pattern For Computer Intrusion Discovery
SS Rahayu, Y Robiah, S Shahrin, MM Zaki, MA Faizal, ZA Zaheera
Arxiv preprint arXiv:1006.4569, 2010
72010
Statistical Approach for Validating Static Threshold in Fast Attack Detection
MF Abdollah, MZ Mas' ud, R Yusof, SR Selamat
Journal of Advanced Manufacturing Technology 4 (1), 53-71, 2010
72010
Detection on Straight Line Problem in Triangle Geometry Features for Digit Recognition
NA Arbain, MS Azmi, SSS Ahmad, R Nordin, MZ Mas' ud, MA Lateh
International Journal on Advanced Science, Engineering and Information …, 2016
62016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20