Items where Author is "Abdullah, Mohd Taufik"
Up a level |
Group by: Item Type | No Grouping
Jump to: Article
Number of items: 14.
Article
Bouke, Mohamed Aly and Abdullah, Azizol and ALshatebi, Sameer Hamoud and Abdullah, Mohd Taufik and Atigh, Hayate El
(2023)
An intelligent DDoS attack detection tree-based model using Gini index feature selection method.
Microprocessors and Microsystems, 98.
art. no. 104823.
pp. 1-10.
ISSN 0141-9331
Bouke, Mohamed Aly and Abdullah, Azizol and ALshatebi, Sameer Hamoud and Abdullah, Mohd Taufik
(2022)
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm.
Journal of Applied Artificial Intelligence, 3 (1).
pp. 1-16.
ISSN 2709-5908
Ling, Yeong Tyng and Mohd Sani, Nor Fazlida and Abdullah, Mohd Taufik and Abdul Hamid, Nor Asilah Wati
(2021)
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model.
Journal of Computer Virology and Hacking Techniques, 18.
pp. 183-203.
ISSN 2263-8733
Ibrahim, Mohammed and Abdullah, Mohd Taufik and Abdullah, Azizol and Perumal, Thinagaran
(2021)
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks.
Turkish Journal of Computer and Mathematics Education, 12 (3).
1957 - 1962.
ISSN 1309-4653
Jamal, Fara and Abdullah, Mohd Taufik and Mohd Hanapi, Zurina and Abdullah, Azizol
(2020)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control.
International Journal of Advanced Research in Engineering and Technology, 11 (12).
1227 - 1237.
ISSN 0976-6480; ESSN : 0976-6499
Jamal, Fara and Abdullah, Mohd Taufik and Mohd Hanapi, Zurina and Abdullah, Azizol
(2019)
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling.
IEEE Access, 7.
pp. 165155-165165.
ISSN 2169-3536
Ibrahim, Mohammed and Jasser, Muhammed Basheer and Abdullah, Mohd Taufik and Abdullah, Azizol
(2019)
Formalization in digital forensic triage for identification of malicious IoT devices.
International Journal of Engineering and Advanced Technology, 9 (1).
pp. 1699-1702.
ISSN 2249-8958
Teing, Yee-Yang and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Muda, Zaiton and Abdullah, Mohd Taufik
(2019)
Greening cloud-enabled big data storage forensics: syncany as a case study.
IEEE Transactions on Sustainable Computing, 4 (2).
pp. 204-216.
ISSN 2377-3782
Ling, Yeong Tyng and Mohd Sani, Nor Fazlida and Abdullah, Mohd Taufik and Abdul Hamid, Nor Asilah Wati
(2019)
Nonnegative matrix factorization and metamorphic malware detection.
Journal of Computer Virology and Hacking Techniques, 15.
pp. 195-208.
ISSN 2274-2042; ESSN: 2263-8733
Sarvari, Samira and Sani, Nor Fazlida Mohd and Hanapi, Zurina Mohd and Abdullah, Mohd Taufik
(2017)
Wireless local area network: a comprehensive review of attacks and metrics.
Journal of Theoretical and Applied Information Technology, 95 (13).
pp. 2913-2934.
ISSN 1992-8645; ESSN: 1817-3195
Abdulkader, Zaid A. and Abdullah, Azizol and Abdullah, Mohd Taufik and Zukarnain, Zuriati Ahmad
(2017)
Vehicular ad hoc networks and security issues: survey.
Modern Applied Science, 11 (5).
30 - 41.
ISSN 1913-1844; ESSN: 1913-1852
Olalere, Morufu and Abdullah, Mohd Taufik and Mahmod, Ramlan and Abdullah, Azizol
(2016)
Bring your own device: security challenges and a theoretical framework for two-factor authentication.
International Journal of Computer Networks and Communications Security, 4 (1).
pp. 21-32.
ISSN 2410-0595; ESSN: 2308-9830
Olalere, Morufu and Abdullah, Mohd Taufik and Mahmod, Ramlan and Abdullah, Azizol
(2015)
A review of bring your own device on security issues.
SAGE Open, 5 (2).
1 - 11.
ISSN 2158-2440
Kakavand, Mohsen and Mustapha, Norwati and Mustapha, Aida and Abdullah, Mohd Taufik and Riahi, Hamed
(2015)
A survey of anomaly detection using data mining methods for hypertext transfer protocol web services.
Journal of Computer Science, 11 (1).
pp. 89-97.
ISSN 1549-3636; ESSN: 1552-6607