Cyber threat intelligence–issue and challenges MS Abu, SR Selamat, A Ariffin, R Yusof Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018 | 234 | 2018 |
Mapping process of digital forensic investigation framework SR Selamat, R Yusof, S Sahib International Journal of Computer Science and Network Security 8 (10), 163-169, 2008 | 201 | 2008 |
Analysis of features selection and machine learning classifier in android malware detection MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof 2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014 | 86 | 2014 |
Analysis of cybersecurity standard and framework components M Syafrizal, SR Selamat, NA Zakaria International Journal of Communication Networks and Information Security 12 …, 2020 | 81 | 2020 |
Intrusion alert correlation technique analysis for heterogeneous log R Yusof, SR Selamat, S Sahib IJCSNS International Journal of Computer Science and Network Security 8 (9 …, 2008 | 74 | 2008 |
A review study on cloud computing issues QK Kadhim, R Yusof, HS Mahdi, SS Ali Al-shami, SR Selamat Journal of Physics: Conference Series 1018, 012006, 2018 | 63 | 2018 |
A New Generic Taxonomy on Hybrid Malware Detection Technique Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza Arxiv preprint arXiv:0909.4860, 2009 | 51 | 2009 |
Identification key scheme to enhance network performance in wireless body area network I Albaeazanchi, HR Abdulshaheed, SA Shawkat, SRB Selamat Periodicals of Engineering and Natural Sciences (PEN) 7 (2), 895-906, 2019 | 37 | 2019 |
Revealing the criterion on botnet detection technique RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' Ud, SR Selamat, R Yusof International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013 | 37 | 2013 |
A new routing protocols for reducing path loss in wireless body area network (WBAN) I Al_Barazanchi, AS Shibghatullah, SR Selamat Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 31 | 2017 |
Clustering analysis for malware behavior detection using registry data NA Rosli, W Yassin, MA Faizal, SR Selamat International Journal of Advanced Computer Science and Applications (IJACSA …, 2019 | 27 | 2019 |
Threshold Verification Technique for Network Intrusion Detection System A Mohd Faizal, M Mohd Zaki, S Shahrin, Y Robiah, S Siti Rahayu International Journal of Computer Science and Information Security 2 (1), 2009 | 24* | 2009 |
A forensic traceability index in digital forensic investigation SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah Journal of Information Security 4 (1), 19-32, 2013 | 23 | 2013 |
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection. MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy Int. J. Netw. Secur. 19 (5), 727-733, 2017 | 22 | 2017 |
Security and Privacy Challenges of Big Data Adoption: A Qualitative Study in Telecommunication Industry. S Anawar, NF Othman, SR Selamat, Z Ayop, N Harum, FA Rahim International Journal of Interactive Mobile Technologies 16 (19), 2022 | 18 | 2022 |
Android malware detection system classification MZ Masud, S Sahib, MF Abdollah, SR Selamat, R Yusof Research Journal of Information Technology 6 (4), 325-341, 2014 | 15 | 2014 |
Profiling mobile malware behaviour through hybrid malware analysis approach MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad 2013 9th International Conference on Information Assurance and Security (IAS …, 2013 | 15 | 2013 |
Time based intrusion detection on fast attack for network intrusion detection system MA Faizal, S Sahib, Y Robiah, S Rahayu 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 15 | 2010 |
Traceability in digital forensic investigation process SR Selamat, R Yusof, S Sahib, NH Hassan, MF Abdollah, ZZ Abidin 2011 IEEE Conference on Open Systems, 101-106, 2011 | 14 | 2011 |
Impact of data balancing and feature selection on machine learning-based network intrusion detection AS Barkah, SR Selamat, ZZ Abidin, R Wahyudi JOIV: International Journal on Informatics Visualization 7 (1), 241-248, 2023 | 13 | 2023 |