A biometric-based security for data authentication in wireless body area network (wban) SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz Advanced Communication Technology (ICACT), 2013 15th International …, 2013 | 115 | 2013 |
A biometric-based security for data authentication in Wireless Body Area Network (WBAN) SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz Advanced Communication Technology (ICACT), 2013 15th International …, 2013 | 115 | 2013 |
Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof Information Science and Applications (ICISA), 2014 International Conference …, 2014 | 86 | 2014 |
Generic Taxonomy of Social Engineering Attack and Defence Mechanism for Handheld Computer Study CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud | 70* | |
A new generic taxonomy on hybrid malware detection technique Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza arXiv preprint arXiv:0909.4860, 2009 | 52 | 2009 |
Machine Learning for HTTP Botnet Detection Using Classifier Algorithms RFM Dollah, MA Faizal, F Arif, MZ Mas’ud, LK Xin Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018 | 48 | 2018 |
The Rise of Ransomware WZA Zakaria, MF Abdollah, O Mohd, AFM Ariffin Proceedings of the 2017 International Conference on Software and e-Business …, 2017 | 46 | 2017 |
Phishing Detection Taxonomy for Mobile Device CFM Foozy, R Ahmad, MF Abdollah International Journal of Computer Science Issues (IJCSI) 10 (1), 2013 | 38 | 2013 |
Revealing the criterion on Botnet detection technique RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas’ud, SR Selamat, R Yusof, ... IJCSI International Journal of Computer Science Issues 10 (2), 208-215, 2013 | 37 | 2013 |
SDN in the home: a survey of home network solutions using software defined networking AM Alshnta, MF Abdollah, A Al-Haiqi Cogent Engineering, 1469949, 2018 | 30 | 2018 |
Clustering Analysis for Malware Behavior Detection using Registry Data NA Rosli, W Yassin, MA Faizal, SR Selamat | 28* | |
Block Chain: Cryptographic Method in Fourth Industrial Revolution RS Abdullah, MA Faizal International Journal of Computer Network and Information Security 10 (11), 9, 2018 | 27 | 2018 |
Cloud Forensic Challenges and Recommendations: A Review W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020 | 24 | 2020 |
Threshold verification technique for network intrusion detection system MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar Arxiv preprint arXiv:0906.3843, 2009 | 24 | 2009 |
Threshold Verification Technique for Network Intrusion Detection System MF Abdollah, MZ Mas' ud, S Sahib, R Yusof, SR Selamat | 24* | 2009 |
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection. MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy IJ Network Security 19 (5), 727-733, 2017 | 23 | 2017 |
A Forensic Traceability Index in Digital Forensic Investigation SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah Journal of Information Security 4, 19, 2013 | 23 | 2013 |
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network SN Ramli, R Ahmad, MF Abdollah Information Science and Technology (ICIST), 2013 International Conference on …, 2013 | 20 | 2013 |
Dimension of mobile security model: mobile user security threats and awareness M Sheila, MA Faizal, S Shahrin International Journal of Mobile Learning and Organisation 9 (1), 66-85, 2015 | 18 | 2015 |
RENTAKA: A Novel Machine Learning Framework for Crypto-Ransomware Pre-encryption Detection WZA Zakaria, MF Abdollah, O Mohd, SMWMSMM Yassin, A Ariffin International Journal of Advanced Computer Science and Applications 13 (5), 2022 | 16 | 2022 |