A review of security standards and frameworks for IoT-based smart environments NM Karie, NM Sahri, W Yang, C Valli, VR Kebande IEEE Access 9, 121975-121995, 2021 | 192 | 2021 |
IoT threat detection advances, challenges and future directions NM Karie, NM Sahri, P Haskell-Dowland 2020 workshop on emerging technologies for security in IoT (ETSecIoT), 22-29, 2020 | 121 | 2020 |
Biometrics for internet-of-things security: A review W Yang, S Wang, NM Sahri, NM Karie, M Ahmed, C Valli Sensors 21 (18), 6163, 2021 | 109 | 2021 |
Fast failover mechanism for software defined networking: Openflow based NM Sahri, K Okamura Proceedings of The Ninth International Conference on Future Internet …, 2014 | 36 | 2014 |
Protecting DNS services from IP spoofing: SDN collaborative authentication approach NM Sahri, K Okamura Proceedings of the 11th International Conference on Future Internet …, 2016 | 20 | 2016 |
Collaborative spoofing detection and mitigation--SDN based looping authentication for DNS services NM Sahri, K Okamura 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 10 | 2016 |
SCSAM-Elderly: A New Synergistic Cyber Security Model for the Elderly for IR4. 0 Readiness in Malaysia NA Azam, AG Buja, MY Darus, NM Sahri 2022 IEEE 12th Symposium on Computer Applications & Industrial Electronics …, 2022 | 6 | 2022 |
Network forensics in the era of artificial intelligence W Yang, MN Johnstone, S Wang, NM Karie, NM Sahri, JJ Kang Explainable Artificial Intelligence for Cyber Security: Next Generation …, 2022 | 6 | 2022 |
Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats NM Karie, NM Sahri, W Yang, MN Johnstone Explainable Artificial Intelligence for Cyber Security, 141-169, 2022 | 6 | 2022 |
Adaptive anomaly detection for SDN NM Sahri, K Okamura Proceedings of the Asia-Pacific Advanced Network 40, 57, 2015 | 5 | 2015 |
Openflow path fast failover fast convergence mechanism NM Sahri, K Okamura Proceedings of the Asia-Pacific Advanced Network 38, 23-28, 2014 | 5 | 2014 |
CAuth-Protecting DNS application from spoofing attacks NM Sahri, K Okamura International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016 | 2 | 2016 |
Load Sensitive Forwarding for Software Defined Networking–Openflow Based NM Sahri, K Okamura Advances in Comput. r Sci.: an Int. J 3 (6), 38-43, 2014 | 2 | 2014 |
A Light Review on Cyber Security Awareness Models for the Elderly NA Azam, AG Buja, NM Sahri, R Ahmad, NF Habidin, SFA Latip, ... Journal of Advanced Research in Applied Sciences and Engineering Technology …, 2025 | 1 | 2025 |
Development of a New Synergistic Cyber Security Awareness Model for The Elderly in Malaysia (SCSAM-Elderly) N Alieyah, AG Buja, NM Sahri, R Ahmad, SFA Latip, NF Habidin, ... 2023 IEEE 8th International Conference on Recent Advances and Innovations in …, 2023 | 1 | 2023 |
Adaptive query rate for anomaly detection with SDN NM Sahri, K Okamura IJCSNS 16 (6), 43, 2016 | 1 | 2016 |
An Analysis of the Deployment of Synergistic Cyber Security Awareness Model for the Elderly (SCSAM-Elderly) in Malaysia NA Azam, AG Buja, R Ahmad, SFA Latip, NM Sahri Akademika 94 (3), 90-107, 2024 | | 2024 |
Synergistic Cyber Security Awareness Model for the elderly (SCSAM-Elderly) AG Buja, NA Azam, NM Sahri, R Ahmad, NF Habidin, SF Abdul Latip Faculty of Computer and Mathematical Sciences, 2023 | | 2023 |
Protecting DNS services from IP spoofing K Okamura, NM Sahri Proceedings of the 11th International Conference on Future Internet Technologies, 2016 | | 2016 |
Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats | | |