Mohd Faizal Abdollah
Mohd Faizal Abdollah
Vahvistettu sähköpostiosoite verkkotunnuksessa utem.edu.my - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
A biometric-based security for data authentication in wireless body area network (wban)
SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz
Advanced Communication Technology (ICACT), 2013 15th International …, 2013
892013
A biometric-based security for data authentication in Wireless Body Area Network (WBAN)
SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz
Advanced Communication Technology (ICACT), 2013 15th International …, 2013
892013
Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Information Science and Applications (ICISA), 2014 International Conference …, 2014
642014
Generic taxonomy of social engineering attack
FM Foozy, R Ahmad, M Abdollah, R Yusof, M Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
44*2011
Generic Taxonomy of Social Engineering Attack and Defence Mechanism for Handheld Computer Study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
44*
A new generic taxonomy on hybrid malware detection technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
arXiv preprint arXiv:0909.4860, 2009
422009
Revealing the criterion on Botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas’ud, SR Selamat, R Yusof, ...
IJCSI International Journal of Computer Science Issues 10 (2), 208-215, 2013
322013
Phishing Detection Taxonomy for Mobile Device
CFM Foozy, R Ahmad, MF Abdollah
International Journal of Computer Science Issues (IJCSI) 10 (1), 2013
262013
SDN in the home: a survey of home network solutions using software defined networking
AM Alshnta, MF Abdollah, A Al-Haiqi
Cogent Engineering, 1469949, 2018
192018
A Forensic Traceability Index in Digital Forensic Investigation
SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah
Journal of Information Security 4, 19, 2013
192013
Threshold verification technique for network intrusion detection system
MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar
Arxiv preprint arXiv:0906.3843, 2009
192009
Threshold Verification Technique for Network Intrusion Detection System
MF Abdollah, MZ Mas' ud, S Sahib, R Yusof, SR Selamat
19*2009
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network
SN Ramli, R Ahmad, MF Abdollah
Information Science and Technology (ICIST), 2013 International Conference on …, 2013
182013
Machine Learning for HTTP Botnet Detection Using Classifier Algorithms
RFM Dollah, MA Faizal, F Arif, MZ Mas’ud, LK Xin
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
162018
The Rise of Ransomware
WZA Zakaria, MF Abdollah, O Mohd, AFM Ariffin
Proceedings of the 2017 International Conference on Software and e-Business …, 2017
152017
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
Technology, Informatics, Management, Engineering, and Environment (TIME-E …, 2013
142013
Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System
MA Faizal, ZM Mohd, S Sahib, Y Robiah, RS Siti, HY Asrul
Network Applications Protocols and Services (NETAPPS), 2010 Second …, 2010
132010
Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System
MF Abdollah, MZ Mas' ud, S Sahib, R Yusof, SR Selamat, AH Yaacub
13*2010
Android I\/Ialware Detection System Classification
MZ Mas’ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
122014
Implementation of IPv6 network testbed: Intrusion detection system on transition mechanism.
N Bahaman, AS Prabuwono, MZ Masud, MF Abdollah, R Al-Jaafreh, ...
Information Technology Journal 11 (2), pp: 8-10, 2008
122008
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20