default search action
BibTeX records: Mohd Taufik Abdullah
@article{DBLP:journals/mam/BoukeAAAA23, author = {Mohamed Aly Bouke and Azizol Abdullah and Sameer Hamoud Alshatebi and Mohd Taufik Abdullah and Hayate El Atigh}, title = {An intelligent DDoS attack detection tree-based model using Gini index feature selection method}, journal = {Microprocess. Microsystems}, volume = {98}, pages = {104823}, year = {2023}, url = {https://doi.org/10.1016/j.micpro.2023.104823}, doi = {10.1016/J.MICPRO.2023.104823}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/BoukeAAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LingSAH22, author = {Yeong Tyng Ling and Nor Fazlida Mohd Sani and Mohd Taufik Abdullah and Nor Asilah Wati Abdul Hamid}, title = {Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {18}, number = {3}, pages = {183--203}, year = {2022}, url = {https://doi.org/10.1007/s11416-021-00404-z}, doi = {10.1007/S11416-021-00404-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/LingSAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LingSAH21, author = {Yeong Tyng Ling and Nor Fazlida Mohd Sani and Mohd Taufik Abdullah and Nor Asilah Wati Abdul Hamid}, title = {Structural features with nonnegative matrix factorization for metamorphic malware detection}, journal = {Comput. Secur.}, volume = {104}, pages = {102216}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102216}, doi = {10.1016/J.COSE.2021.102216}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LingSAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/IbrahimAAP21, author = {Mohammed Ibrahim and Mohd Taufik Abdullah and Azizol Abdullah and Thinagaran Perumal}, title = {The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation}, journal = {Wirel. Pers. Commun.}, volume = {119}, number = {3}, pages = {2093--2105}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-08320-7}, doi = {10.1007/S11277-021-08320-7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/IbrahimAAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/IbrahimAAP21a, author = {Mohammed Ibrahim and Mohd Taufik Abdullah and Azizol Abdullah and Thinagaran Perumal}, title = {Correction to: The Impact of Memory{\unicode{8209}}Efficient Bots on IoT{\unicode{8209}}WSN Botnet Propagation}, journal = {Wirel. Pers. Commun.}, volume = {119}, number = {3}, pages = {2107}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-08551-8}, doi = {10.1007/S11277-021-08551-8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/IbrahimAAP21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SarvariSHA20, author = {Samira Sarvari and Nor Fazlida Mohd Sani and Zurina Mohd Hanapi and Mohd Taufik Abdullah}, title = {An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network}, journal = {{IEEE} Access}, volume = {8}, pages = {70651--70663}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2986217}, doi = {10.1109/ACCESS.2020.2986217}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SarvariSHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JamalAHA19, author = {Fara Jamal and Mohd Taufik Abdullah and Zurina Mohd Hanapi and Azizol Abdullah}, title = {Reliable Access Control for Mobile Cloud Computing {(MCC)} With Cache-Aware Scheduling}, journal = {{IEEE} Access}, volume = {7}, pages = {165155--165165}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2953227}, doi = {10.1109/ACCESS.2019.2953227}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JamalAHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiewSAYS19, author = {Seow Wooi Liew and Nor Fazlida Mohd Sani and Mohd Taufik Abdullah and Razali Yaakob and Mohd Yunus Sharum}, title = {An effective security alert mechanism for real-time phishing tweet detection on Twitter}, journal = {Comput. Secur.}, volume = {83}, pages = {201--207}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.02.004}, doi = {10.1016/J.COSE.2019.02.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiewSAYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/TeingDCMA19, author = {Yee{-}Yang Teing and Ali Dehghantanha and Kim{-}Kwang Raymond Choo and Zaiton Muda and Mohd Taufik Abdullah}, title = {Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {4}, number = {2}, pages = {204--216}, year = {2019}, url = {https://doi.org/10.1109/TSUSC.2017.2687103}, doi = {10.1109/TSUSC.2017.2687103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/TeingDCMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/LingSAH19, author = {Yeong Tyng Ling and Nor Fazlida Mohd Sani and Mohd Taufik Abdullah and Nor Asilah Wati Abdul Hamid}, title = {Nonnegative matrix factorization and metamorphic malware detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {15}, number = {3}, pages = {195--208}, year = {2019}, url = {https://doi.org/10.1007/s11416-019-00331-0}, doi = {10.1007/S11416-019-00331-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/LingSAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnvo/AbdulkaderAAZ18, author = {Zaid A. Abdulkader and Azizol Abdullah and Mohd Taufik Abdullah and Zuriati Ahmad Zukarnain}, title = {Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks}, journal = {Int. J. Netw. Virtual Organisations}, volume = {19}, number = {2/3/4}, pages = {153--175}, year = {2018}, url = {https://doi.org/10.1504/IJNVO.2018.10016246}, doi = {10.1504/IJNVO.2018.10016246}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnvo/AbdulkaderAAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KakavandMMA16, author = {Mohsen Kakavand and Norwati Mustapha and Aida Mustapha and Mohd Taufik Abdullah}, title = {Effective Dimensionality Reduction of Payload-Based Anomaly Detection in {TMAD} Model for {HTTP} Payload}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {10}, number = {8}, pages = {3884--3910}, year = {2016}, url = {https://doi.org/10.3837/tiis.2016.08.025}, doi = {10.3837/TIIS.2016.08.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KakavandMMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/TeingDCMAC16, author = {Yee{-}Yang Teing and Ali Dehghantanha and Kim{-}Kwang Raymond Choo and Zaiton Muda and Mohd Taufik Abdullah and Wee{-}Chiat Chai}, editor = {Guojun Wang and Indrakshi Ray and Jos{\'{e}} M. Alcaraz Calero and Sabu M. Thampi}, title = {A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts}, booktitle = {Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10067}, pages = {342--357}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49145-5\_34}, doi = {10.1007/978-3-319-49145-5\_34}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/TeingDCMAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsci/KakavandMMAR15, author = {Mohsen Kakavand and Norwati Mustapha and Aida Mustapha and Mohd Taufik Abdullah and Hamed Riahi}, title = {A Survey of Anomaly Detection Using Data Mining Methods for Hypertext Transfer Protocol Web Services}, journal = {J. Comput. Sci.}, volume = {11}, number = {1}, pages = {89--97}, year = {2015}, url = {https://doi.org/10.3844/jcssp.2015.89.97}, doi = {10.3844/JCSSP.2015.89.97}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsci/KakavandMMAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsci/KakavandMMAR15a, author = {Mohsen Kakavand and Norwati Mustapha and Aida Mustapha and Mohd Taufik Abdullah and Hamed Riahi}, title = {Issues and Challenges in Anomaly Intrusion Detection for {HTTP} Web Services}, journal = {J. Comput. Sci.}, volume = {11}, number = {11}, pages = {1041--1053}, year = {2015}, url = {https://doi.org/10.3844/jcssp.2015.1041.1053}, doi = {10.3844/JCSSP.2015.1041.1053}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsci/KakavandMMAR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/HalboobMUA15, author = {Waleed Halboob and Ramlan Mahmod and Nur Izura Udzir and Mohd Taufik Abdullah}, title = {Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation}, booktitle = {The 10th International Conference on Future Networks and Communications {(FNC} 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, August 17-20, 2015, Belfort, France}, series = {Procedia Computer Science}, volume = {56}, pages = {370--375}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.procs.2015.07.222}, doi = {10.1016/J.PROCS.2015.07.222}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fnc/HalboobMUA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/YusoffMDA14, author = {Mohd Najwadi Yusoff and Ramlan Mahmod and Ali Dehghantanha and Mohd Taufik Abdullah}, title = {An approach for forensic investigation in Firefox {OS}}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {22--26}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913966}, doi = {10.1109/CYBERSEC.2014.6913966}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/YusoffMDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/YusoffMAD14, author = {Mohd Najwadi Yusoff and Ramlan Mahmod and Mohd Taufik Abdullah and Ali Dehghantanha}, title = {Mobile forensic data acquisition in Firefox {OS}}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {27--31}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913967}, doi = {10.1109/CYBERSEC.2014.6913967}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/YusoffMAD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/YassinUAAZM14, author = {Warusia Yassin and Nur Izura Udzir and Azizol Abdullah and Mohd Taufik Abdullah and Hazura Zulzalil and Zaiton Muda}, title = {Signature-Based Anomaly intrusion detection using Integrated data mining classifiers}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {232--237}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013127}, doi = {10.1109/ISBAST.2014.7013127}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/YassinUAAZM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/softcomp/YassinUAAMZ14, author = {Warusia Yassin and Nur Izura Udzir and Azizol Abdullah and Mohd Taufik Abdullah and Zaiton Muda and Hazura Zulzalil}, editor = {Jos{\'{e}} Gaviria de la Puerta and Iv{\'{a}}n Garc{\'{\i}}a{-}Ferreira and Pablo Garc{\'{\i}}a Bringas and Fanny Klett and Ajith Abraham and Andr{\'{e}} C. P. L. F. de Carvalho and {\'{A}}lvaro Herrero and Bruno Baruque and H{\'{e}}ctor Quinti{\'{a}}n and Emilio Corchado}, title = {Packet Header Anomaly Detection Using Statistical Analysis}, booktitle = {International Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao, Spain, June 25th-27th, 2014, Proceedings}, series = {Advances in Intelligent Systems and Computing}, volume = {299}, pages = {473--482}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07995-0\_47}, doi = {10.1007/978-3-319-07995-0\_47}, timestamp = {Fri, 12 Aug 2022 13:44:55 +0200}, biburl = {https://dblp.org/rec/conf/softcomp/YassinUAAMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-2308, author = {Joshua James and Pavel Gladyshev and Mohd Taufik Abdullah and Yuandong Zhu}, title = {Analysis of Evidence Using Formal Event Reconstruction}, journal = {CoRR}, volume = {abs/1302.2308}, year = {2013}, url = {http://arxiv.org/abs/1302.2308}, eprinttype = {arXiv}, eprint = {1302.2308}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-2308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/IbrahimAD12, author = {Mohammed Ibrahim and Mohd Taufik Abdullah and Ali Dehghantanha}, title = {VoIP evidence model: {A} new forensic method for investigating VoIP malicious attacks}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {201--206}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246116}, doi = {10.1109/CYBERSEC.2012.6246116}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/IbrahimAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/YassinUMAA12, author = {Warusia Yassin and Nur Izura Udzir and Zaiton Muda and Azizol Abdullah and Mohd Taufik Abdullah}, title = {A Cloud-based Intrusion Detection Service framework}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {213--218}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246098}, doi = {10.1109/CYBERSEC.2012.6246098}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/YassinUMAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/TanhaTAH12, author = {Maryam Tanha and Seyed Dawood Sajjadi Torshizi and Mohd Taufik Abdullah and Fazirulhisyam Hashim}, title = {An overview of attacks against digital watermarking and their respective countermeasures}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {265--270}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246095}, doi = {10.1109/CYBERSEC.2012.6246095}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/TanhaTAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JamesGAZ09, author = {Joshua James and Pavel Gladyshev and Mohd Taufik Abdullah and Yuandong Zhu}, editor = {Sanjay Goel}, title = {Analysis of Evidence Using Formal Event Reconstruction}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {85--98}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_9}, doi = {10.1007/978-3-642-11534-9\_9}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JamesGAZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.