Robiah Yusof
Robiah Yusof
Vahvistettu sähköpostiosoite verkkotunnuksessa utem.edu.my
Nimike
Viittaukset
Viittaukset
Vuosi
Mapping process of digital forensic investigation framework
SR Selamat, R Yusof, S Sahib
International Journal of Computer Science and Network Security 8 (10), 163-169, 2008
1542008
Intrusion alert correlation technique analysis for heterogeneous log
R Yusof, SR Selamat, S Sahib
IJCSNS International Journal of Computer Science and Network Security 8 (9 …, 2008
722008
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
662014
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
442011
A New Generic Taxonomy on Hybrid Malware Detection Technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
Arxiv preprint arXiv:0909.4860, 2009
422009
Cyber threat intelligence–issue and challenges
MS Abu, SR Selamat, A Ariffin, R Yusof
Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018
412018
Revealing the criterion on botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, SR Selamat, R Yusof
International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013
332013
A review study on cloud computing issues
QK Kadhim, R Yusof, HS Mahdi, SSA Al-Shami, SR Selamat
Journal of Physics: Conference Series 1018 (1), 012006, 2018
232018
A forensic traceability index in digital forensic investigation
SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah
Scientific Research Publishing, 2013
192013
Threshold verification technique for network intrusion detection system
MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar
arXiv preprint arXiv:0906.3843, 2009
192009
A need for investigating organizational climate and its impact on the performance
AH Lafta, N Man, J Salih, B Samah, N Nawi, R Yusof
European Journal of Business and Management 8 (3), 136-142, 2016
142016
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
2013 International Conference on Technology, Informatics, Management …, 2013
142013
Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset
ZK Maseer, R Yusof, N Bahaman, SA Mostafa, CFM Foozy
IEEE Access 9, 22351-22370, 2021
132021
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
132010
Android malware detection system classification
MZ Masud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
122014
Recognizing API features for malware detection using static analysis
SMA Ghani, MF Abdollah, R Yusof, MZ Mas’ud
Journal of Wireless Networking and Communications 5 (2A), 6-12, 2015
112015
Profiling mobile malware behaviour through hybrid malware analysis approach
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
102013
Traceability in digital forensic investigation process
SR Selamat, R Yusof, S Sahib, NH Hassan, MF Abdollah, ZZ Abidin
2011 IEEE Conference on Open Systems, 101-106, 2011
102011
An improved traditional worm attack pattern
Y Robiah, SS Rahayu, S Sahib, MM Zaki, MA Faizal, R Marliza
2010 International Symposium on Information Technology 2, 1067-1072, 2010
92010
Effective environmental factors to performance of electronic information sharing in iraqi intelligence
T Abbas, AS Shibghatullah, R Yusof, MM Jaber
Journal of Engineering and Applied Sciences 11 (3), 452-461, 2016
82016
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20