Zahri Yunos
Zahri Yunos
CyberSecurity Malaysia
Vahvistettu sähköpostiosoite verkkotunnuksessa cybersecurity.my - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
A dynamic cyber terrorism framework
R Ahmad, Z Yunos
International Journal of Computer Science and Information Security 10 (2), 149, 2012
402012
Perception on cyber terrorism: A focus group discussion approach
R Ahmad, Z Yunos, S Sahib, M Yusoff
Scientific Research Publishing, 2012
232012
Understanding cyber terrorism: The grounded theory method applied
R Ahmad, Z Yunos, S Sahib
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
232012
The application of mixed method in developing a cyber terrorism framework
R Ahmad, Z Yunos
Scientific Research Publishing, 2012
192012
Safeguarding malaysia's critical national information infrastructure (cnii) against cyber terrorism: Towards development of a policy framework
Z Yunos, R Ahmad, SH Suid, Z Ismail
2010 Sixth International Conference on Information Assurance and Security, 21-27, 2010
172010
Development of a cyber security awareness strategy using focus group discussion
Z Yunos, RS Ab Hamid, M Ahmad
2016 SAI Computing Conference (SAI), 1063-1067, 2016
162016
A qualitative analysis for evaluating a cyber terrorism framework in Malaysia
Z Yunos, R Ahmad, NA Mohd Sabri
Information Security Journal: A Global Perspective 24 (1-3), 15-23, 2015
132015
The application of qualitative method in developing a cyber terrorism framework
Z Yunos, R Ahmad
Proccedings of the International Conference on Economics, Management and …, 2014
112014
Protection of critical national information infrastructure (cnii) against cyber terrorism: Development of strategy and policy framework
Z Yunos, SH Suid
2010 IEEE International Conference on Intelligence and Security Informatics …, 2010
102010
How to make online banking secure
ANM Zin, Z Yunos
The Star 21, 2005
102005
Forensic readiness: A case study on digital CCTV systems antiforensics
A Ariffin, KKR Choo, Z Yunos
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017
82017
Putting Cyber Terrorism into Context
Z Yunos, CS Malaysia
STAR In-Tech 24 (02), 5, 2009
82009
Illicit activities and terrorism in cyberspace: an exploratory study in the southeast asian region
Z Yunos, R Ahmad, SM Ali, S Shamsuddin
Pacific-Asia Workshop on Intelligence and Security Informatics, 27-35, 2012
72012
Grounding the component of cyber terrorism framework using the grounded theory
Z Yunos, R Ahmad, M Yusoff
2014 Science and Information Conference, 523-529, 2014
62014
Definition and Framework of Cyber Terrorism
Z Yunos, R Ahmad, NAA Abd Aziz
Proceeding of Southeast Asia Regional Center for Counter Terrorism’s …, 2013
42013
Keeping kids safe online
Z Yunos, SSSN Mohammad
Retrieved on 28, 2011
42011
Safeguarding Malaysia’s cyberspace against cyber threats: contributions by cybersecurity Malaysia
F Abdullah, NS Mohamad, Z Yunos
OIC-CERT Journal of Cyber Security 1 (1), 22-31, 2018
32018
Understanding cyber terrorism from motivational perspectives: A qualitative data analysis
Z Yunos, N Mohd, A Ariffin, R Ahmad
European Conference on Cyber Warfare and Security, 550-557, 2017
32017
Evaluating cyber terrorism components in Malaysia
Z Yunos, R Ahmad
The 5th International Conference on Information and Communication Technology …, 2014
32014
Ethics in information security
Y Yassin, Z Yunos
NST Tech & U, 1-4, 2006
32006
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20