Obserwuj
Mohd Faizal Abdollah
Tytuł
Cytowane przez
Cytowane przez
Rok
A biometric-based security for data authentication in wireless body area network (wban)
SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz
Advanced Communication Technology (ICACT), 2013 15th International …, 2013
992013
A biometric-based security for data authentication in Wireless Body Area Network (WBAN)
SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz
Advanced Communication Technology (ICACT), 2013 15th International …, 2013
992013
Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Information Science and Applications (ICISA), 2014 International Conference …, 2014
742014
Generic taxonomy of social engineering attack
FM Foozy, R Ahmad, M Abdollah, R Yusof, M Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
56*2011
Generic Taxonomy of Social Engineering Attack and Defence Mechanism for Handheld Computer Study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
56*
A new generic taxonomy on hybrid malware detection technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
arXiv preprint arXiv:0909.4860, 2009
472009
Revealing the criterion on Botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas’ud, SR Selamat, R Yusof, ...
IJCSI International Journal of Computer Science Issues 10 (2), 208-215, 2013
322013
Phishing Detection Taxonomy for Mobile Device
CFM Foozy, R Ahmad, MF Abdollah
International Journal of Computer Science Issues (IJCSI) 10 (1), 2013
312013
The Rise of Ransomware
WZA Zakaria, MF Abdollah, O Mohd, AFM Ariffin
Proceedings of the 2017 International Conference on Software and e-Business …, 2017
242017
SDN in the home: a survey of home network solutions using software defined networking
AM Alshnta, MF Abdollah, A Al-Haiqi
Cogent Engineering, 1469949, 2018
222018
Machine Learning for HTTP Botnet Detection Using Classifier Algorithms
RFM Dollah, MA Faizal, F Arif, MZ Mas’ud, LK Xin
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
212018
A Forensic Traceability Index in Digital Forensic Investigation
SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah
Journal of Information Security 4, 19, 2013
212013
Threshold verification technique for network intrusion detection system
MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar
Arxiv preprint arXiv:0906.3843, 2009
212009
Threshold Verification Technique for Network Intrusion Detection System
MF Abdollah, MZ Mas' ud, S Sahib, R Yusof, SR Selamat
21*2009
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network
SN Ramli, R Ahmad, MF Abdollah
Information Science and Technology (ICIST), 2013 International Conference on …, 2013
192013
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
Technology, Informatics, Management, Engineering, and Environment (TIME-E …, 2013
162013
Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System
MA Faizal, ZM Mohd, S Sahib, Y Robiah, RS Siti, HY Asrul
Network Applications Protocols and Services (NETAPPS), 2010 Second …, 2010
142010
Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System
MF Abdollah, MZ Mas' ud, S Sahib, R Yusof, SR Selamat, AH Yaacub
14*2010
Block Chain: Cryptographic Method in Fourth Industrial Revolution
RS Abdullah, MA Faizal
International Journal of Computer Network and Information Security 10 (11), 9, 2018
132018
Profiling mobile malware behaviour through hybrid malware analysis approach
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad
Information Assurance and Security (IAS), 2013 9th International Conference …, 2013
132013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20