BibTeX records: Mohd Taufik Abdullah

download as .bib file

@article{DBLP:journals/mam/BoukeAAAA23,
  author       = {Mohamed Aly Bouke and
                  Azizol Abdullah and
                  Sameer Hamoud Alshatebi and
                  Mohd Taufik Abdullah and
                  Hayate El Atigh},
  title        = {An intelligent DDoS attack detection tree-based model using Gini index
                  feature selection method},
  journal      = {Microprocess. Microsystems},
  volume       = {98},
  pages        = {104823},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.micpro.2023.104823},
  doi          = {10.1016/J.MICPRO.2023.104823},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/BoukeAAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LingSAH22,
  author       = {Yeong Tyng Ling and
                  Nor Fazlida Mohd Sani and
                  Mohd Taufik Abdullah and
                  Nor Asilah Wati Abdul Hamid},
  title        = {Metamorphic malware detection using structural features and nonnegative
                  matrix factorization with hidden markov model},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {18},
  number       = {3},
  pages        = {183--203},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11416-021-00404-z},
  doi          = {10.1007/S11416-021-00404-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/LingSAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LingSAH21,
  author       = {Yeong Tyng Ling and
                  Nor Fazlida Mohd Sani and
                  Mohd Taufik Abdullah and
                  Nor Asilah Wati Abdul Hamid},
  title        = {Structural features with nonnegative matrix factorization for metamorphic
                  malware detection},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102216},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102216},
  doi          = {10.1016/J.COSE.2021.102216},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LingSAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/IbrahimAAP21,
  author       = {Mohammed Ibrahim and
                  Mohd Taufik Abdullah and
                  Azizol Abdullah and
                  Thinagaran Perumal},
  title        = {The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation},
  journal      = {Wirel. Pers. Commun.},
  volume       = {119},
  number       = {3},
  pages        = {2093--2105},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-08320-7},
  doi          = {10.1007/S11277-021-08320-7},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/IbrahimAAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/IbrahimAAP21a,
  author       = {Mohammed Ibrahim and
                  Mohd Taufik Abdullah and
                  Azizol Abdullah and
                  Thinagaran Perumal},
  title        = {Correction to: The Impact of Memory{\unicode{8209}}Efficient Bots
                  on IoT{\unicode{8209}}WSN Botnet Propagation},
  journal      = {Wirel. Pers. Commun.},
  volume       = {119},
  number       = {3},
  pages        = {2107},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-08551-8},
  doi          = {10.1007/S11277-021-08551-8},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/IbrahimAAP21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SarvariSHA20,
  author       = {Samira Sarvari and
                  Nor Fazlida Mohd Sani and
                  Zurina Mohd Hanapi and
                  Mohd Taufik Abdullah},
  title        = {An Efficient Anomaly Intrusion Detection Method With Feature Selection
                  and Evolutionary Neural Network},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {70651--70663},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2986217},
  doi          = {10.1109/ACCESS.2020.2986217},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SarvariSHA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JamalAHA19,
  author       = {Fara Jamal and
                  Mohd Taufik Abdullah and
                  Zurina Mohd Hanapi and
                  Azizol Abdullah},
  title        = {Reliable Access Control for Mobile Cloud Computing {(MCC)} With Cache-Aware
                  Scheduling},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {165155--165165},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2953227},
  doi          = {10.1109/ACCESS.2019.2953227},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JamalAHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiewSAYS19,
  author       = {Seow Wooi Liew and
                  Nor Fazlida Mohd Sani and
                  Mohd Taufik Abdullah and
                  Razali Yaakob and
                  Mohd Yunus Sharum},
  title        = {An effective security alert mechanism for real-time phishing tweet
                  detection on Twitter},
  journal      = {Comput. Secur.},
  volume       = {83},
  pages        = {201--207},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.02.004},
  doi          = {10.1016/J.COSE.2019.02.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiewSAYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/TeingDCMA19,
  author       = {Yee{-}Yang Teing and
                  Ali Dehghantanha and
                  Kim{-}Kwang Raymond Choo and
                  Zaiton Muda and
                  Mohd Taufik Abdullah},
  title        = {Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case
                  Study},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {204--216},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSUSC.2017.2687103},
  doi          = {10.1109/TSUSC.2017.2687103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/TeingDCMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/LingSAH19,
  author       = {Yeong Tyng Ling and
                  Nor Fazlida Mohd Sani and
                  Mohd Taufik Abdullah and
                  Nor Asilah Wati Abdul Hamid},
  title        = {Nonnegative matrix factorization and metamorphic malware detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {15},
  number       = {3},
  pages        = {195--208},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11416-019-00331-0},
  doi          = {10.1007/S11416-019-00331-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/LingSAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnvo/AbdulkaderAAZ18,
  author       = {Zaid A. Abdulkader and
                  Azizol Abdullah and
                  Mohd Taufik Abdullah and
                  Zuriati Ahmad Zukarnain},
  title        = {Malicious node identification routing and protection mechanism for
                  vehicular ad-hoc network against various attacks},
  journal      = {Int. J. Netw. Virtual Organisations},
  volume       = {19},
  number       = {2/3/4},
  pages        = {153--175},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJNVO.2018.10016246},
  doi          = {10.1504/IJNVO.2018.10016246},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnvo/AbdulkaderAAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/KakavandMMA16,
  author       = {Mohsen Kakavand and
                  Norwati Mustapha and
                  Aida Mustapha and
                  Mohd Taufik Abdullah},
  title        = {Effective Dimensionality Reduction of Payload-Based Anomaly Detection
                  in {TMAD} Model for {HTTP} Payload},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {10},
  number       = {8},
  pages        = {3884--3910},
  year         = {2016},
  url          = {https://doi.org/10.3837/tiis.2016.08.025},
  doi          = {10.3837/TIIS.2016.08.025},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/KakavandMMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/TeingDCMAC16,
  author       = {Yee{-}Yang Teing and
                  Ali Dehghantanha and
                  Kim{-}Kwang Raymond Choo and
                  Zaiton Muda and
                  Mohd Taufik Abdullah and
                  Wee{-}Chiat Chai},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jos{\'{e}} M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts},
  booktitle    = {Security, Privacy and Anonymity in Computation, Communication and
                  Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE,
                  DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10067},
  pages        = {342--357},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49145-5\_34},
  doi          = {10.1007/978-3-319-49145-5\_34},
  timestamp    = {Wed, 24 Apr 2024 14:55:54 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/TeingDCMAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsci/KakavandMMAR15,
  author       = {Mohsen Kakavand and
                  Norwati Mustapha and
                  Aida Mustapha and
                  Mohd Taufik Abdullah and
                  Hamed Riahi},
  title        = {A Survey of Anomaly Detection Using Data Mining Methods for Hypertext
                  Transfer Protocol Web Services},
  journal      = {J. Comput. Sci.},
  volume       = {11},
  number       = {1},
  pages        = {89--97},
  year         = {2015},
  url          = {https://doi.org/10.3844/jcssp.2015.89.97},
  doi          = {10.3844/JCSSP.2015.89.97},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsci/KakavandMMAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsci/KakavandMMAR15a,
  author       = {Mohsen Kakavand and
                  Norwati Mustapha and
                  Aida Mustapha and
                  Mohd Taufik Abdullah and
                  Hamed Riahi},
  title        = {Issues and Challenges in Anomaly Intrusion Detection for {HTTP} Web
                  Services},
  journal      = {J. Comput. Sci.},
  volume       = {11},
  number       = {11},
  pages        = {1041--1053},
  year         = {2015},
  url          = {https://doi.org/10.3844/jcssp.2015.1041.1053},
  doi          = {10.3844/JCSSP.2015.1041.1053},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsci/KakavandMMAR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/HalboobMUA15,
  author       = {Waleed Halboob and
                  Ramlan Mahmod and
                  Nur Izura Udzir and
                  Mohd Taufik Abdullah},
  title        = {Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving
                  Investigation},
  booktitle    = {The 10th International Conference on Future Networks and Communications
                  {(FNC} 2015) / The 12th International Conference on Mobile Systems
                  and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, August
                  17-20, 2015, Belfort, France},
  series       = {Procedia Computer Science},
  volume       = {56},
  pages        = {370--375},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.procs.2015.07.222},
  doi          = {10.1016/J.PROCS.2015.07.222},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fnc/HalboobMUA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/YusoffMDA14,
  author       = {Mohd Najwadi Yusoff and
                  Ramlan Mahmod and
                  Ali Dehghantanha and
                  Mohd Taufik Abdullah},
  title        = {An approach for forensic investigation in Firefox {OS}},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {22--26},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913966},
  doi          = {10.1109/CYBERSEC.2014.6913966},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/YusoffMDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/YusoffMAD14,
  author       = {Mohd Najwadi Yusoff and
                  Ramlan Mahmod and
                  Mohd Taufik Abdullah and
                  Ali Dehghantanha},
  title        = {Mobile forensic data acquisition in Firefox {OS}},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {27--31},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913967},
  doi          = {10.1109/CYBERSEC.2014.6913967},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/YusoffMAD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/YassinUAAZM14,
  author       = {Warusia Yassin and
                  Nur Izura Udzir and
                  Azizol Abdullah and
                  Mohd Taufik Abdullah and
                  Hazura Zulzalil and
                  Zaiton Muda},
  title        = {Signature-Based Anomaly intrusion detection using Integrated data
                  mining classifiers},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {232--237},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013127},
  doi          = {10.1109/ISBAST.2014.7013127},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/YassinUAAZM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/softcomp/YassinUAAMZ14,
  author       = {Warusia Yassin and
                  Nur Izura Udzir and
                  Azizol Abdullah and
                  Mohd Taufik Abdullah and
                  Zaiton Muda and
                  Hazura Zulzalil},
  editor       = {Jos{\'{e}} Gaviria de la Puerta and
                  Iv{\'{a}}n Garc{\'{\i}}a{-}Ferreira and
                  Pablo Garc{\'{\i}}a Bringas and
                  Fanny Klett and
                  Ajith Abraham and
                  Andr{\'{e}} C. P. L. F. de Carvalho and
                  {\'{A}}lvaro Herrero and
                  Bruno Baruque and
                  H{\'{e}}ctor Quinti{\'{a}}n and
                  Emilio Corchado},
  title        = {Packet Header Anomaly Detection Using Statistical Analysis},
  booktitle    = {International Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao,
                  Spain, June 25th-27th, 2014, Proceedings},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {299},
  pages        = {473--482},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07995-0\_47},
  doi          = {10.1007/978-3-319-07995-0\_47},
  timestamp    = {Fri, 12 Aug 2022 13:44:55 +0200},
  biburl       = {https://dblp.org/rec/conf/softcomp/YassinUAAMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-2308,
  author       = {Joshua James and
                  Pavel Gladyshev and
                  Mohd Taufik Abdullah and
                  Yuandong Zhu},
  title        = {Analysis of Evidence Using Formal Event Reconstruction},
  journal      = {CoRR},
  volume       = {abs/1302.2308},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.2308},
  eprinttype    = {arXiv},
  eprint       = {1302.2308},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-2308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/IbrahimAD12,
  author       = {Mohammed Ibrahim and
                  Mohd Taufik Abdullah and
                  Ali Dehghantanha},
  title        = {VoIP evidence model: {A} new forensic method for investigating VoIP
                  malicious attacks},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {201--206},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246116},
  doi          = {10.1109/CYBERSEC.2012.6246116},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/IbrahimAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/YassinUMAA12,
  author       = {Warusia Yassin and
                  Nur Izura Udzir and
                  Zaiton Muda and
                  Azizol Abdullah and
                  Mohd Taufik Abdullah},
  title        = {A Cloud-based Intrusion Detection Service framework},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {213--218},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246098},
  doi          = {10.1109/CYBERSEC.2012.6246098},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/YassinUMAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/TanhaTAH12,
  author       = {Maryam Tanha and
                  Seyed Dawood Sajjadi Torshizi and
                  Mohd Taufik Abdullah and
                  Fazirulhisyam Hashim},
  title        = {An overview of attacks against digital watermarking and their respective
                  countermeasures},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {265--270},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246095},
  doi          = {10.1109/CYBERSEC.2012.6246095},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/TanhaTAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JamesGAZ09,
  author       = {Joshua James and
                  Pavel Gladyshev and
                  Mohd Taufik Abdullah and
                  Yuandong Zhu},
  editor       = {Sanjay Goel},
  title        = {Analysis of Evidence Using Formal Event Reconstruction},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {85--98},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_9},
  doi          = {10.1007/978-3-642-11534-9\_9},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JamesGAZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}