UPM Institutional Repository

Items where Author is "Abdullah @ Selimun, Mohd Taufik"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 40.

Article

Torabi, Majid and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik and Yaakob, Razali (2021) A Review on feature selection and ensemble techniques for intrusion detection system. International Journal of Advanced Computer Science and Applications, 12 (5). 538 - 553. ISSN 2158-107X; ESSN: 2156-5570

Sarvari, Samira and Mohd Sani, Nor Fazlida and Mohd Hanapi, Zurina and Abdullah @ Selimun, Mohd Taufik (2020) An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights. Journal of Theoretical and Applied Information Technology, 98 (7). 963 - 976. ISSN 1992-8645; ESSN: 1817-3195

Sarvari, Samira and Mohd Sani, Nor Fazlida and Mohd Hanapi, Zurina and Abdullah @ Selimun, Mohd Taufik (2020) An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access, 8. 70651 - 70663. ISSN 2169-3536

Ibrahim, Mohammed and Abdullah @ Selimun, Mohd Taufik and Abdullah, Azizol and Perumal, Thinagaran (2020) An epidemic based model for the predictions of OOFI in an IoT platform. SSRG International Journal of Engineering Trends and Technology (pt. 2). 52 -56. ISSN 2349-0918; ESSN: 2231-5381

Maziku, Susana Boniphace and Abdul Rahiman, Amir Rizaan and Muhammed, Abdullah and Abdullah @ Selimun, Mohd Taufik (2020) A novel framework for identifying twitter spam data using machine learning algorithms. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 55 (5). pp. 1-20. ISSN 0258-2724

Umar, Kabir and Md Sultan, Abu Bakar and Zulzalil, Hazura and Admodisastro, Novia Indriaty and Abdullah @ Selimun, Mohd Taufik (2018) Defining fitness function for search based assessment of grammar reachability. Advanced Science Letters, 24 (3). pp. 1749-1753. ISSN 1936-6612; ESSN: 1936-7317

Jasim, Hend Muslim and Muda, Zaiton and Abdullah @ Selimun, Mohd Taufik (2017) Image orientation based watermarking technique in copyright protection. Journal of Theoretical and Applied Information Technology, 95 (3). 629 - 644. ISSN 1992-8645; ESSN: 1817-3195

ABDULKADER, ZAID A. and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Ahmad Zukarnain, Zuriati (2017) LI-AODV: lifetime improving AODV routing for detecting and removing black-hole attack from VANET. Journal of Theoretical and Applied Information Technology, 95 (1). 196 - 209. ISSN 1992-8645; ESSN: 1817-3195

Kakavand, Mohsen and Mustapha, Norwati and Mustapha, Aida and Abdullah @ Selimun, Mohd Taufik (2016) Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload. KSII Transactions on Internet and Information Systems, 10 (8). pp. 1-27. ISSN 1976-7277

Umar, Kabir and Md Sultan, Abu Bakar and Zulzalil, Hazura and Admodisastro, Novia Indriaty and Abdullah @ Selimun, Mohd Taufik (2016) Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application. Indian Journal of Science and Technology, 9 (28). pp. 1-10. ISSN 0974-6846; ESSN: 0974-5645

Umar, Kabir and Md Sultan, Abu Bakar and Zulzalil, Hazura and Admodisastro, Novia and Abdullah @ Selimun, Mohd Taufik (2016) SQL Injection attack roadmap and fusion. Indian Journal of Science and Technology, 9 (28). pp. 1-10. ISSN 0974-6846; ESSN: 0974-5645

Aminnezhad, Asou and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik (2016) Survey on economics of information security. International Journal of Computer Science and Network Security, 16 (7). pp. 99-116. ISSN 1738-7906

Halboob, Waleed Abduljabbar Mohammed and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik (2015) Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation. Procedia Computer Science, 56. pp. 370-375. ISSN 1877-0509

Aminnezhad, Asou and Abdullah @ Selimun, Mohd Taufik and Hezave, Pooya Khanmohamadi (2015) An investigation of the secure data communication in medical mobile applications. Journal of Theoretical and Applied Information Technology, 73 (2). 239 - 245. ISSN 1992-8645; ESSN: 1817-3195

Yusoof, Mohd Najwadi and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik and Dehghantanha, Ali (2014) Performance measurement for mobile forensic data acquisition in Firefox OS. International Journal of Cyber-Security and Digital Forensics, 3 (3). pp. 130-140. ISSN 2305-0012

Yusoff, Mohd Najwadi and Mahmod, Ramlan and Dehghantanha, Ali and Abdullah @ Selimun, Mohd Taufik (2014) Advances of mobile forensic procedures in Firefox OS. International Journal of Cyber-Security and Digital Forensics, 3 (4). pp. 183-199. ISSN 2305-0012

Halboob, Waleed and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik and Deghantanha, Ali (2014) An ordered selective imaging and distributed analysis computer forensics model. Journal of Applied Sciences, 14 (21). pp. 2704-2712. ISSN 1812-5654; ESSN: 1812-5662

Farjamfar, Anahita and Abdullah @ Selimun, Mohd Taufik and Mahmod, Ramlan and Udzir, Nur Izura (2014) A review on mobile device's digital forensic process models. Research Journal of Applied Sciences, Engineering and Technology, 8 (3). pp. 358-366. ISSN 2040-7459; ESSN: 2040-7467

Husin, Norzihan and Abdullah @ Selimun, Mohd Taufik and Mahmod, Ramlan (2014) A systematic literature review for topic detection in chat conversation for cyber-­crime investigation. International Journal of Digital Content Technology and its Applications, 8 (3). pp. 22-31. ISSN 1975-9339; ESSN: 2233-9310

Hussein, Khalid Waleed and Mohd. Sani, Nor Fazlida and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik (2013) Enhance luhn algorithm for validation of credit cards numbers. International Journal of Computer Science and Mobile Computing, 2 (7). pp. 262-272. ISSN 2320-088X

Hussein, Khalid Waleed and Mohd Sani, Nor Fazlida and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik (2013) Design and implementation of multi factor mechanism for secure authentication system. International Journal of Computer Science and Information Security, 11 (7). pp. 31-37. ISSN 1947-5500

Hussein, Khalid Waleed and Mohd Sani, Nor Fazlida and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik (2013) Enhance Luhn algorithm for validation of identity card numbers (ID card). International Journal of Research in Information Technology, 1 (8). pp. 1-9. ISSN 2001-5569

Yaakob, Razali and Joozdani, Mohsen and Abdullah @ Selimun, Mohd Taufik and Abdullah, Azizol (2013) Overview of cross site request forgery and client-side protection. International Journal Computer Technology and Applications, 4 (4). pp. 706-709. ISSN 2229-6093

Md Sultan, Abu Bakar and Zainal Abidin, Khairunnisa and Abdullah @ Selimun, Mohd Taufik (2008) The implementation of agent based complaint management system. International Journal of Computer Science and Network Security, 8 (5). pp. 205-207. ISSN 1738-7906

Abdullah @ Selimun, Mohd Taufik and Mahmod, Ramlan and Abd Ghani, Abdul Azim and Abdullah, Mohd Zain and Md Sultan, Abu Bakar (2008) Advances in computer forensics. International Journal of Computer Science and Network Security, 8 (2). pp. 215-219. ISSN 1738-7906

Md Sultan, Abu Bakar and Abdullah, Azizol and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik (2008) Evaluating premature convergence for metaheuristic. International Journal of Computer Science and Engineering System, 2 (3). pp. 187-188. ISSN 0973-4406

Book Section

Halboob, Waleed and Alghathbar, Khaled S. and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik and Deghantanha, Ali (2014) An efficient computer forensics selective imaging model. In: Future Information Technology. Lecture Notes in Electrical Engineering, 276 . Springer, Heidelberg, Germany, pp. 277-284. ISBN 9783642408601; EISBN: 9783642408618

Conference or Workshop Item

Yusof, Ahmad Riza'ain and Udzir, Nur Izura and Selamat, Ali and Hamdan, Hazlina and Abdullah @ Selimun, Mohd Taufik (2017) Adaptive feature selection for denial of services (DoS) attack. In: 2017 IEEE Conference on Application, Information and Network Security (AINS), 13-14 Nov. 2017, Miri Marriott Resort & Spa, Miri, Sarawak. (pp. 81-84).

Nik Abdull Malik, Nik Mariza and Yahya, Saadiah and Abdullah @ Selimun, Mohd Taufik (2014) Critical phases in network forensics - a review. In: Third International Conference on Digital Security and Forensics (DigitalSec 2014), 29 Apr.-1 May 2014, Faculty of Engineering, Lebanese University, Campus of Hadath, Beirut, Lebanon. (pp. 68-75).

Yusoff, Mohd Najwadi and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik and Dehghantanha, Ali (2014) Mobile forensic data acquisition in Firefox OS. In: 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 29 Apr.-1 May 2014, Lebanese University Campus of Hadath, Beirut, Lebanon. (pp. 27-31).

Umar, Kabir and Md Sultan, Abu Bakar and Zulzalil, Hazura and Admodisastro, Novia and Abdullah @ Selimun, Mohd Taufik (2014) On the automation of vulnerabilities fixing for web application. In: The 9th International Conference on Software Engineering Advances (ICSEA 2014), 12-16 Oct. 2014, Nice, France. (pp. 221-226).

Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Muda, Zaiton and Zulzalil, Hazura (2014) Packet header anomaly detection using statistical analysis. In: 7th International Conference on Computational Intelligence in Security for Information Systems (CISIS14), 25-27 June 2014, Bilbao, Spain. (pp. 473-482).

Umar, Kabir and Md. Sultan, Abu Bakar and Zulzalil, Hazura and Admodisastro, Novia and Abdullah @ Selimun, Mohd Taufik (2014) Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach. In: The 5th International Conference on Information and Communication Technology for The Muslims World (ICT4M) 2014, 17-19 Nov. 2014, Kuching, Sarawak, Malaysia. (pp. 1-6).

Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Zulzalil, Hazura and Muda, Zaiton (2014) Signature-based anomaly intrusion detection using integrated data mining classifiers. In: International Symposium on Biometrics and Security Technologies (ISBAST 2014), 26-27 Aug. 2014, Kuala Lumpur, Malaysia. (pp. 232-237).

Yusoff, Mohd Najwadi and Mahmod, Ramlan and Dehghantanha, Ali and Abdullah @ Selimun, Mohd Taufik (2014) An approach for forensic investigation in Firefox OS. In: 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 29 Apr.-1 May 2014, Lebanese University Campus of Hadath, Beirut, Lebanon. (pp. 22-26).

Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Muda, Zaiton and Zulzalil, Hazura (2013) Host-based packet header anomaly detection using statistical analysis. In: International Seminars on Mathematics and Natural Sciences (ISMNS 2013), 15-17 Aug. 2013, Samarkand, Uzbekistan. (pp. 1-8).

Udzir, Nur Izura and Wood, Alan and Muda, Zaiton and Dehghantanha, Ali and Abdullah @ Selimun, Mohd Taufik and Abdullah, Azizol (2012) Access control in open distributed systems. In: Workshop on Information Technology and Applications (WIT-A 2012), 4-5 June 2012, Istanbul, Turkey. (pp. 1-5).

Ibrahim, Mohammed and Abdullah @ Selimun, Mohd Taufik and Dehghantanha, Ali (2012) VoIP evidence model: a new forensic method for investigating VoIP malicious attacks. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 201-206).

Yassin, Warusia and Udzir, Nur Izura and Muda, Zaiton and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik (2012) A cloud-based intrusion detection service framework. In: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012) , 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 213-218).

Tanha, Maryam and Torshizi, Seyed Dawood Sajjadi and Abdullah @ Selimun, Mohd Taufik and Hashim, Fazirulhisyam (2012) An overview of attacks against digital watermarking and their respective countermeasures. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 265-270).

This list was generated on Fri Nov 29 19:15:19 2024 +08.