Seuraa
Siti Rahayu Selamat
Siti Rahayu Selamat
Vahvistettu sähköpostiosoite verkkotunnuksessa utem.edu.my
Nimike
Viittaukset
Viittaukset
Vuosi
Mapping process of digital forensic investigation framework
SR Selamat, R Yusof, S Sahib
International Journal of Computer Science and Network Security 8 (10), 163-169, 2008
1942008
Cyber threat intelligence–issue and challenges
MS Abu, SR Selamat, A Ariffin, R Yusof
Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018
1752018
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
852014
Intrusion alert correlation technique analysis for heterogeneous log
R Yusof, SR Selamat, S Sahib
IJCSNS International Journal of Computer Science and Network Security 8 (9 …, 2008
752008
A review study on cloud computing issues
QK Kadhim, R Yusof, HS Mahdi, SS Ali Al-shami, SR Selamat
Journal of Physics: Conference Series 1018, 012006, 2018
542018
A New Generic Taxonomy on Hybrid Malware Detection Technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
Arxiv preprint arXiv:0909.4860, 2009
522009
Analysis of cybersecurity standard and framework components
M Syafrizal, SR Selamat, NA Zakaria
International Journal of Communication Networks and Information Security 12 …, 2020
382020
Revealing the criterion on botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' Ud, SR Selamat, R Yusof
International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013
362013
Identification key scheme to enhance network performance in wireless body area network
I Albaeazanchi, HR Abdulshaheed, SA Shawkat, SRB Selamat
Periodicals of Engineering and Natural Sciences 7 (2), 895-906, 2019
342019
A forensic traceability index in digital forensic investigation
SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah
Scientific Research Publishing, 2013
232013
Threshold verification technique for network intrusion detection system
MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar
arXiv preprint arXiv:0906.3843, 2009
232009
Threshold Verification Technique for Network Intrusion Detection System
A Mohd Faizal, M Mohd Zaki, S Shahrin, Y Robiah, S Siti Rahayu
International Journal of Computer Science and Information Security 2 (1), 2009
23*2009
A new routing protocols for reducing path loss in wireless body area network (WBAN)
I Al_Barazanchi, AS Shibghatullah, SR Selamat
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
222017
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy
Int. J. Netw. Secur. 19 (5), 727-733, 2017
202017
Clustering analysis for malware behavior detection using registry data
NA Rosli, W Yassin, MA Faizal, SR Selamat
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
192019
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
152010
Android malware detection system classification
MZ Masud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
142014
Profiling mobile malware behaviour through hybrid malware analysis approach
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
132013
Traceability in digital forensic investigation process
SR Selamat, R Yusof, S Sahib, NH Hassan, MF Abdollah, ZZ Abidin
2011 IEEE Conference on Open Systems, 101-106, 2011
132011
Security and Privacy Challenges of Big Data Adoption: A Qualitative Study in Telecommunication Industry.
S Anawar, NF Othman, SR Selamat, Z Ayop, N Harum, FA Rahim
International Journal of Interactive Mobile Technologies 16 (19), 2022
102022
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20