Ransomware, threat and detection techniques: A review S Kok, A Abdullah, N Jhanjhi, M Supramaniam Int. J. Comput. Sci. Netw. Secur 19 (2), 136, 2019 | 191 | 2019 |
Phishing website detection: An improved accuracy through feature selection and ensemble learning AA Ubing, SKB Jasmi, A Abdullah, NZ Jhanjhi, M Supramaniam International Journal of Advanced Computer Science and Applications 10 (1), 2019 | 147 | 2019 |
Prevention of crypto-ransomware using a pre-encryption detection algorithm SH Kok, A Abdullah, NZ Jhanjhi, M Supramaniam Computers 8 (4), 79, 2019 | 116 | 2019 |
Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study VE Adeyemo, A Abdullah, NZ JhanJhi, M Supramaniam, AO Balogun International Journal of Advanced Computer Science and Applications 10 (9), 2019 | 107 | 2019 |
A new model for predicting component-based software reliability using soft computing C Diwaker, P Tomar, A Solanki, A Nayyar, NZ Jhanjhi, A Abdullah, ... IEEE Access 7, 147191-147203, 2019 | 92 | 2019 |
Hidden link prediction in criminal networks using the deep reinforcement learning technique M Lim, A Abdullah, NZ Jhanjhi, M Supramaniam Computers 8 (1), 8, 2019 | 90 | 2019 |
Link prediction in time-evolving criminal network with deep reinforcement learning technique M Lim, A Abdullah, NZ Jhanjhi, MK Khan, M Supramaniam IEEE Access 7, 184797-184807, 2019 | 83 | 2019 |
A review of intrusion detection system using machine learning approach SH Kok, A Abdullah, NZ Jhanjhi, M Supramaniam International Journal of Engineering Research and Technology 12 (1), 8-15, 2019 | 81 | 2019 |
Employee productivity in Malaysian private higher educational institutions M Selvanathan, N Jayabalan, GK Saini, M Supramaniam, N Hussin PalArch's Journal of Archaeology of Egypt/Egyptology 17 (3), 66-79, 2020 | 71 | 2020 |
ERP system implementation: A Malaysian perspective M Supramaniam, M Kuppusamy Journal of Information Technology Management 21 (1), 35-48, 2010 | 37 | 2010 |
Hybridized machine learning based fractal analysis techniques for breast cancer classification M Swain, S Kisan, JM Chatterjee, M Supramaniam, SN Mohanty, ... International Journal of Advanced Computer Science and Applications 11 (10 …, 2020 | 28 | 2020 |
The impact of cost, customer experience, ease of use, and trust towards adoption of online banking M Selvanathan, PJ Tan, TF Bow, M Supramaniam International Business Research 9 (11), 235-241, 2016 | 27 | 2016 |
Cost analysis on ERP system implementation amongst Malaysian SMEs M Supramaniam, A Abdullah, R Ponnan International Journal of Trade, Economics and Finance 5 (1), 72, 2014 | 26 | 2014 |
The coin passcode: A shoulder-surfing proof graphical password authentication model for mobile devices T joo Fong, A Abdullah, NZ Jhanjhi, M Supramaniam International Journal of Advanced Computer Science and Applications 10 (1), 2019 | 21 | 2019 |
Analysis of critical success factors in implementing enterprise resource planning systems in Malaysian business firms M Supramaniam, M Kuppusamy The Electronic Journal of Information Systems in Developing Countries 46 (1 …, 2011 | 18 | 2011 |
Using extended TPB models to predict dishonest academic behaviors of undergraduates in a Chinese public university LX Juan, WY Tao, PK Veloo, M Supramaniam Sage Open 12 (4), 21582440221140391, 2022 | 17 | 2022 |
Balogun Abdullateef O,“Ensemble and Deep-Learning Methods for Two-Class and Multi-Attack Anomaly Intrusion Detection: An Empirical Study” International Journal of Advanced … AV Elijah, A Abdullah, NZ JhanJhi, M Supramaniam | 17 | 2019 |
Investigating the critical factors in implementing enterprise resource planning system in Malaysian business firms M Supramaniam, M Kuppusamy International Journal of Industrial and Systems Engineering 3 (9), 1764-1773, 2009 | 17 | 2009 |
Determinants of job hopping factors among lecturers in private universities, Malaysia M Selvanathan, MM Buga, TH Arumugam, M Supramaniam, N Jayabalan Utopía y Praxis Latinoamericana 24 (6), 234-242, 2019 | 15 | 2019 |
A comparison of various machine learning algorithms in a distributed denial of service intrusion SH Kok, A Abdullah, M Supramaniam, TR Pillai, IAT Hashem Int. J. Eng. Res. Technol 12 (1), 1-7, 2019 | 13 | 2019 |