Seuraa
Robiah Yusof
Robiah Yusof
Vahvistettu sähköpostiosoite verkkotunnuksessa utem.edu.my
Nimike
Viittaukset
Viittaukset
Vuosi
Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset
ZK Maseer, R Yusof, N Bahaman, SA Mostafa, CFM Foozy
IEEE access 9, 22351-22370, 2021
2382021
Mapping process of digital forensic investigation framework
SR Selamat, R Yusof, S Sahib
International Journal of Computer Science and Network Security 8 (10), 163-169, 2008
1942008
Cyber threat intelligence–issue and challenges
MS Abu, SR Selamat, A Ariffin, R Yusof
Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018
1762018
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
852014
Intrusion alert correlation technique analysis for heterogeneous log
R Yusof, SR Selamat, S Sahib
IJCSNS International Journal of Computer Science and Network Security 8 (9 …, 2008
752008
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
612011
A review study on cloud computing issues
QK Kadhim, R Yusof, HS Mahdi, SS Ali Al-shami, SR Selamat
Journal of Physics: Conference Series 1018, 012006, 2018
542018
A New Generic Taxonomy on Hybrid Malware Detection Technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
Arxiv preprint arXiv:0909.4860, 2009
522009
DeepIoT. IDS: hybrid deep learning for enhancing IoT network intrusion detection
ZK Maseer, R Yusof, SA Mostafa, N Bahaman, O Musa, BAS Al-rimy
Comput. Mater. Contin 69 (3), 3945-3966, 2021
442021
Revealing the criterion on botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' Ud, SR Selamat, R Yusof
International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013
362013
A forensic traceability index in digital forensic investigation
SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah
Scientific Research Publishing, 2013
232013
Threshold verification technique for network intrusion detection system
MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar
arXiv preprint arXiv:0906.3843, 2009
232009
A need for investigating organizational climate and its impact on the performance
AH Lafta, N Man, J Salih, B Samah, N Nawi, R Yusof
European Journal of Business and Management 8 (3), 136-142, 2016
222016
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
2013 International Conference on Technology, Informatics, Management …, 2013
162013
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
152010
Android malware detection system classification
MZ Masud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
142014
Organisation readiness factors towards ipv6 migration: Expert review
A Main, NA Zakaria, R Yusof
Procedia-Social and Behavioral Sciences 195, 1882-1889, 2015
132015
Profiling mobile malware behaviour through hybrid malware analysis approach
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
132013
Traceability in digital forensic investigation process
SR Selamat, R Yusof, S Sahib, NH Hassan, MF Abdollah, ZZ Abidin
2011 IEEE Conference on Open Systems, 101-106, 2011
132011
Android malware classification base on application category using static code analysis
A Aminordin, F MA, R Yusof
J. Theor. Appl. Inf. Technol 96 (11), 2018
122018
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20