Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset ZK Maseer, R Yusof, N Bahaman, SA Mostafa, CFM Foozy IEEE access 9, 22351-22370, 2021 | 370 | 2021 |
Cyber threat intelligence–issue and challenges MS Abu, SR Selamat, A Ariffin, R Yusof Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018 | 234 | 2018 |
Mapping process of digital forensic investigation framework SR Selamat, R Yusof, S Sahib International Journal of Computer Science and Network Security 8 (10), 163-169, 2008 | 201 | 2008 |
Analysis of features selection and machine learning classifier in android malware detection MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof 2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014 | 86 | 2014 |
Intrusion alert correlation technique analysis for heterogeneous log R Yusof, SR Selamat, S Sahib IJCSNS International Journal of Computer Science and Network Security 8 (9 …, 2008 | 74 | 2008 |
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud Malaysian Technical Universities International Conference on Engineering …, 2011 | 68 | 2011 |
DeepIoT. IDS: hybrid deep learning for enhancing IoT network intrusion detection ZK Maseer, R Yusof, SA Mostafa, N Bahaman, O Musa, BAS Al-Rimy Computers, Materials and Continua 69 (3), 3946-3967, 2021 | 66 | 2021 |
A review study on cloud computing issues QK Kadhim, R Yusof, HS Mahdi, SS Ali Al-shami, SR Selamat Journal of Physics: Conference Series 1018, 012006, 2018 | 63 | 2018 |
A New Generic Taxonomy on Hybrid Malware Detection Technique Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza Arxiv preprint arXiv:0909.4860, 2009 | 51 | 2009 |
Revealing the criterion on botnet detection technique RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' Ud, SR Selamat, R Yusof International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013 | 37 | 2013 |
Threshold verification technique for network intrusion detection system MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar arXiv preprint arXiv:0906.3843, 2009 | 24 | 2009 |
A forensic traceability index in digital forensic investigation SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah Journal of Information Security 4 (1), 19-32, 2013 | 23 | 2013 |
A need for investigating organizational climate and its impact on the performance AH Lafta, N Man, JS Salih, B Samah, N Nawi, R Yusof European journal of business and management 8 (3), 136-142, 2016 | 22 | 2016 |
Preliminary study of host and network-based analysis on P2P Botnet detection RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof 2013 International Conference on Technology, Informatics, Management …, 2013 | 16 | 2013 |
Organisation readiness factors towards IPv6 migration: Expert review A Main, NA Zakaria, R Yusof Procedia-Social and Behavioral Sciences 195, 1882-1889, 2015 | 15 | 2015 |
Android malware detection system classification MZ Masud, S Sahib, MF Abdollah, SR Selamat, R Yusof Research Journal of Information Technology 6 (4), 325-341, 2014 | 15 | 2014 |
Profiling mobile malware behaviour through hybrid malware analysis approach MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad 2013 9th International Conference on Information Assurance and Security (IAS …, 2013 | 15 | 2013 |
Time based intrusion detection on fast attack for network intrusion detection system MA Faizal, S Sahib, Y Robiah, S Rahayu 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 15 | 2010 |
A RSSI-based Rogue Access Point Detection Framework for Wi-Fi Hotspots. NM Ahmad, MF Abdollah, R Yusof, AHM Amin, S Kannan 2nd International Symposium on Telecommunication Technologies (ISTT 2014 …, 2014 | 14 | 2014 |
Traceability in digital forensic investigation process SR Selamat, R Yusof, S Sahib, NH Hassan, MF Abdollah, ZZ Abidin 2011 IEEE Conference on Open Systems, 101-106, 2011 | 14 | 2011 |