BibTeX records: Mohd Aizaini Maarof

download as .bib file

@article{DBLP:journals/fgcs/Al-rimyMASGAAH21,
  author       = {Bander Ali Saleh Al{-}rimy and
                  Mohd Aizaini Maarof and
                  Mamoun Alazab and
                  Syed Zainudeen Mohd Shaid and
                  Fuad A. Ghaleb and
                  Abdulmohsen Almalawi and
                  Abdullah Marish Ali and
                  Tawfik Al Hadhrami},
  title        = {Redundancy Coefficient Gradual Up-weighting-based Mutual Information
                  Feature Selection technique for Crypto-ransomware early detection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {115},
  pages        = {641--658},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2020.10.002},
  doi          = {10.1016/J.FUTURE.2020.10.002},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/Al-rimyMASGAAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/OsmanSGSAM21,
  author       = {Huda Osman and
                  Maheyzah Md Siraj and
                  Fuad A. Ghaleb and
                  Faisal Saeed and
                  Eman H. Alkhammash and
                  Mohd Aizaini Maarof},
  title        = {Quasi-Identifier Recognition Algorithm for Privacy Preservation of
                  Cloud Data Based on Risk Reidentification},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {7154705:1--7154705:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7154705},
  doi          = {10.1155/2021/7154705},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/OsmanSGSAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crc2/AzizMZ21,
  author       = {Noor Azeera Abdul Aziz and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {Hate Speech and Offensive Language Detection: {A} New Feature Set
                  with Filter-Embedded Combining Feature Selection},
  booktitle    = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi
                  Island, Malaysia, January 29-31, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CRC50527.2021.9392486},
  doi          = {10.1109/CRC50527.2021.9392486},
  timestamp    = {Wed, 21 Apr 2021 13:08:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crc2/AzizMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crc2/KhalidZMG21,
  author       = {Adam Khalid and
                  Anazida Zainal and
                  Mohd Aizaini Maarof and
                  Fuad A. Ghaleb},
  title        = {Advanced Persistent Threat Detection: {A} Survey},
  booktitle    = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi
                  Island, Malaysia, January 29-31, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CRC50527.2021.9392626},
  doi          = {10.1109/CRC50527.2021.9392626},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crc2/KhalidZMG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crc2/OlaimatMA21,
  author       = {Mohammad N. Olaimat and
                  Mohd Aizaini Maarof and
                  Bander Ali Saleh Al{-}rimy},
  title        = {Ransomware Anti-Analysis and Evasion Techniques: {A} Survey and Research
                  Directions},
  booktitle    = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi
                  Island, Malaysia, January 29-31, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CRC50527.2021.9392529},
  doi          = {10.1109/CRC50527.2021.9392529},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crc2/OlaimatMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crc2/OsmanSM21,
  author       = {Huda Osman and
                  Maheyzah Md Siraj and
                  Mohd Aizaini Maarof},
  title        = {{HAC:} Model for Privacy-Preserving Outsourced Data Over Cloud},
  booktitle    = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi
                  Island, Malaysia, January 29-31, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CRC50527.2021.9392427},
  doi          = {10.1109/CRC50527.2021.9392427},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crc2/OsmanSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crc2/UroojMA21,
  author       = {Umara Urooj and
                  Mohd. Aizani Bin Maarof and
                  Bander Ali Saleh Al{-}rimy},
  title        = {A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection
                  Model},
  booktitle    = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi
                  Island, Malaysia, January 29-31, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CRC50527.2021.9392548},
  doi          = {10.1109/CRC50527.2021.9392548},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crc2/UroojMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-rimyMAASGHA20,
  author       = {Bander Ali Saleh Al{-}rimy and
                  Mohd Aizaini Maarof and
                  Mamoun Alazab and
                  Fawaz Alsolami and
                  Syed Zainudeen Mohd Shaid and
                  Fuad A. Ghaleb and
                  Tawfik Al Hadhrami and
                  Abdullah Marish Ali},
  title        = {A Pseudo Feedback-Based Annotated {TF-IDF} Technique for Dynamic Crypto-Ransomware
                  Pre-Encryption Boundary Delineation and Features Extraction},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {140586--140598},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3012674},
  doi          = {10.1109/ACCESS.2020.3012674},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Al-rimyMAASGHA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GhalebAAAZRSM20,
  author       = {Fuad A. Ghaleb and
                  Bander Ali Saleh Al{-}rimy and
                  Abdulmohsen Almalawi and
                  Abdullah Marish Ali and
                  Anazida Binti Zainal and
                  Murad A. Rassam and
                  Syed Zainudeen Mohd Shaid and
                  Mohd Aizaini Maarof},
  title        = {Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular
                  Ad Hoc Network: {A} Context-Aware Approach},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {217744--217761},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3040903},
  doi          = {10.1109/ACCESS.2020.3040903},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GhalebAAAZRSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GhalebMZASH19,
  author       = {Fuad A. Ghaleb and
                  Mohd Aizaini Maarof and
                  Anazida Binti Zainal and
                  Bander Ali Saleh Al{-}rimy and
                  Faisal Saeed and
                  Tawfik Al Hadhrami},
  title        = {Hybrid and Multifaceted Context-Aware Misbehavior Detection Model
                  for Vehicular Ad Hoc Network},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {159119--159140},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2950805},
  doi          = {10.1109/ACCESS.2019.2950805},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GhalebMZASH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Al-rimyMS19,
  author       = {Bander Ali Saleh Al{-}rimy and
                  Mohd Aizaini Maarof and
                  Syed Zainudeen Mohd Shaid},
  title        = {Crypto-ransomware early detection model using novel incremental bagging
                  with enhanced semi-random subspace selection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {101},
  pages        = {476--491},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.06.005},
  doi          = {10.1016/J.FUTURE.2019.06.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/Al-rimyMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/OghazMRZS19,
  author       = {Mahdi Maktab Dar Oghaz and
                  Mohd Aizaini Maarof and
                  Mohd. Foad Rohani and
                  Anazida Zainal and
                  Syed Zainudeen Mohd Shaid},
  title        = {An optimized skin texture model using gray-level co-occurrence matrix},
  journal      = {Neural Comput. Appl.},
  volume       = {31},
  number       = {6},
  pages        = {1835--1853},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00521-017-3164-8},
  doi          = {10.1007/S00521-017-3164-8},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/OghazMRZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/GhalebMZAAB19,
  author       = {Fuad A. Ghaleb and
                  Mohd Aizaini Maarof and
                  Anazida Binti Zainal and
                  Bander Ali Saleh Al{-}rimy and
                  Abdullah Alsaeedi and
                  Wadii Boulila},
  title        = {Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for
                  Vehicular Ad Hoc Network},
  journal      = {Remote. Sens.},
  volume       = {11},
  number       = {23},
  pages        = {2852},
  year         = {2019},
  url          = {https://doi.org/10.3390/rs11232852},
  doi          = {10.3390/RS11232852},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/GhalebMZAAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/GhalebMZRSA19,
  author       = {Fuad A. Ghaleb and
                  Mohd Aizaini Maarof and
                  Anazida Zainal and
                  Murad A. Rassam and
                  Faisal Saeed and
                  Mohammed Alsaedi},
  title        = {Context-aware data-centric misbehaviour detection scheme for vehicular
                  ad hoc networks using sequential analysis of the temporal and spatial
                  correlation of the consistency between the cooperative awareness messages},
  journal      = {Veh. Commun.},
  volume       = {20},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.vehcom.2019.100186},
  doi          = {10.1016/J.VEHCOM.2019.100186},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/GhalebMZRSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/irict/OsmanMS19,
  author       = {Huda Osman and
                  Mohd Aizaini Maarof and
                  Maheyzah Md Siraj},
  editor       = {Faisal Saeed and
                  Fathey Mohammed and
                  Nadhmi Gazem},
  title        = {Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing},
  booktitle    = {Emerging Trends in Intelligent Computing and Informatics - Data Science,
                  Intelligent Information Systems and Smart Computing, International
                  Conference of Reliable Information and Communication Technology, {IRICT}
                  2019, Johor, Malaysia, 22-23 September, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1073},
  pages        = {748--758},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33582-3\_70},
  doi          = {10.1007/978-3-030-33582-3\_70},
  timestamp    = {Thu, 16 Jan 2020 19:21:55 +0100},
  biburl       = {https://dblp.org/rec/conf/irict/OsmanMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socpar/ChiamMKZ19,
  author       = {Yoong Jien Chiam and
                  Mohd Aizaini Maarof and
                  Mohamad Nizam Kassim and
                  Anazida Zainal},
  editor       = {Ajith Abraham and
                  M. Akhil Jabbar and
                  Sanju Tiwari and
                  Isabel M. S. Jesus},
  title        = {Malware Behavior Profiling from Unstructured Data},
  booktitle    = {Proceedings of the 11th International Conference on Soft Computing
                  and Pattern Recognition (SoCPaR 2019), Hyderabad, India, December
                  13-15, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1182},
  pages        = {130--140},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49345-5\_14},
  doi          = {10.1007/978-3-030-49345-5\_14},
  timestamp    = {Thu, 20 Jan 2022 09:49:19 +0100},
  biburl       = {https://dblp.org/rec/conf/socpar/ChiamMKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socpar/KhooZAKMB19,
  author       = {Eric Khoo and
                  Anazida Zainal and
                  Nurfadilah Ariffin and
                  Mohd Nizam Kassim and
                  Mohd Aizaini Maarof and
                  Majid Bakhtiari},
  editor       = {Ajith Abraham and
                  M. Akhil Jabbar and
                  Sanju Tiwari and
                  Isabel M. S. Jesus},
  title        = {Fraudulent e-Commerce Website Detection Model Using HTML, Text and
                  Image Features},
  booktitle    = {Proceedings of the 11th International Conference on Soft Computing
                  and Pattern Recognition (SoCPaR 2019), Hyderabad, India, December
                  13-15, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1182},
  pages        = {177--186},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49345-5\_19},
  doi          = {10.1007/978-3-030-49345-5\_19},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socpar/KhooZAKMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Al-rimyMS18,
  author       = {Bander Ali Saleh Al{-}rimy and
                  Mohd Aizaini Maarof and
                  Syed Zainudeen Mohd Shaid},
  title        = {Ransomware threat success factors, taxonomy, and countermeasures:
                  {A} survey and research directions},
  journal      = {Comput. Secur.},
  volume       = {74},
  pages        = {144--166},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.01.001},
  doi          = {10.1016/J.COSE.2018.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Al-rimyMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/RassamMZ18,
  author       = {Murad A. Rassam and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {A distributed anomaly detection model for wireless sensor networks
                  based on the one-class principal component classifier},
  journal      = {Int. J. Sens. Networks},
  volume       = {27},
  number       = {3},
  pages        = {200--214},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSNET.2018.093126},
  doi          = {10.1504/IJSNET.2018.093126},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsnet/RassamMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-09574,
  author       = {Bander Ali Saleh Al{-}rimy and
                  Mohd Aizaini Maarof and
                  Syed Zainudeen Mohd Shaid},
  title        = {Redundancy Coefficient Gradual Up-weighting-based Mutual Information
                  Feature Selection Technique for Crypto-ransomware Early Detection},
  journal      = {CoRR},
  volume       = {abs/1807.09574},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.09574},
  eprinttype    = {arXiv},
  eprint       = {1807.09574},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-09574.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/BarekatainKMAT17,
  author       = {Behrang Barekatain and
                  Dariush Khezrimotlagh and
                  Mohd Aizaini Maarof and
                  Alfonso Ariza{-}Quintana and
                  Alicia Trivi{\~{n}}o{-}Cabrera},
  title        = {{GAZELLE:} An Enhanced Random Network Coding Based Framework for Efficient
                  {P2P} Live Video Streaming Over Hybrid WMNs},
  journal      = {Wirel. Pers. Commun.},
  volume       = {95},
  number       = {3},
  pages        = {2485--2505},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3930-4},
  doi          = {10.1007/S11277-016-3930-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/BarekatainKMAT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/MaktabarZMK17,
  author       = {Mahdi Maktabar and
                  Anazida Zainal and
                  Mohd Aizaini Maarof and
                  Mohamad Nizam Kassim},
  editor       = {Ajith Abraham and
                  Pranab Kumar Muhuri and
                  Azah Kamilah Muda and
                  Niketa Gandhi},
  title        = {Content Based Fraudulent Website Detection Using Supervised Machine
                  Learning Techniques},
  booktitle    = {Hybrid Intelligent Systems - 17th International Conference on Hybrid
                  Intelligent Systems {(HIS} 2017) Held in Delhi, India, December 14-16,
                  2017},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {734},
  pages        = {294--304},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-76351-4\_30},
  doi          = {10.1007/978-3-319-76351-4\_30},
  timestamp    = {Wed, 05 May 2021 12:03:29 +0200},
  biburl       = {https://dblp.org/rec/conf/his/MaktabarZMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AbdallahMZ16,
  author       = {Aisha Abdallah and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {Fraud detection system: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {68},
  pages        = {90--113},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.04.007},
  doi          = {10.1016/J.JNCA.2016.04.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AbdallahMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmbd/KassimMZW16,
  author       = {Mohamad Nizam Kassim and
                  Mohd Aizaini Maarof and
                  Anazida Zainal and
                  Amirudin Abdul Wahab},
  editor       = {Ying Tan and
                  Yuhui Shi},
  title        = {Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social
                  Media},
  booktitle    = {Data Mining and Big Data, First International Conference, {DMBD} 2016,
                  Bali, Indonesia, June 25-30, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9714},
  pages        = {391--400},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40973-3\_39},
  doi          = {10.1007/978-3-319-40973-3\_39},
  timestamp    = {Tue, 11 Jul 2023 08:21:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dmbd/KassimMZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkaw/KassimMZW16,
  author       = {Mohamad Nizam Kassim and
                  Mohd Aizaini Maarof and
                  Anazida Zainal and
                  Amirudin Abdul Wahab},
  editor       = {Hayato Ohwada and
                  Kenichi Yoshida},
  title        = {Enhanced Rules Application Order to Stem Affixation, Reduplication
                  and Compounding Words in Malay Texts},
  booktitle    = {Knowledge Management and Acquisition for Intelligent Systems - 14th
                  Pacific Rim Knowledge Acquisition Workshop, {PKAW} 2016, Phuket, Thailand,
                  August 22-23, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9806},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42706-5\_6},
  doi          = {10.1007/978-3-319-42706-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/pkaw/KassimMZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/RassamZM15,
  author       = {Murad A. Rassam and
                  Anazida Zainal and
                  Mohd Aizaini Maarof},
  title        = {Principal component analysis-based data reduction model for wireless
                  sensor networks},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {18},
  number       = {1/2},
  pages        = {85--101},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJAHUC.2015.067756},
  doi          = {10.1504/IJAHUC.2015.067756},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/RassamZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/BarekatainKMGAT15,
  author       = {Behrang Barekatain and
                  Dariush Khezrimotlagh and
                  Mohd Aizaini Maarof and
                  Hamid Reza Ghaeini and
                  Alfonso Ariza{-}Quintana and
                  Alicia Trivi{\~{n}}o{-}Cabrera},
  title        = {Efficient {P2P} Live Video Streaming Over Hybrid WMNs Using Random
                  Network Coding},
  journal      = {Wirel. Pers. Commun.},
  volume       = {80},
  number       = {4},
  pages        = {1761--1789},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-014-2112-5},
  doi          = {10.1007/S11277-014-2112-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/BarekatainKMGAT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ElhadiMBH14,
  author       = {Ammar Ahmed E. Elhadi and
                  Mohd Aizaini Maarof and
                  Bazara I. A. Barry and
                  Hamza Hentabli},
  title        = {Enhancing the detection of metamorphic malware using call graphs},
  journal      = {Comput. Secur.},
  volume       = {46},
  pages        = {62--78},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.07.004},
  doi          = {10.1016/J.COSE.2014.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ElhadiMBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/RassamMZ14,
  author       = {Murad A. Rassam and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {Adaptive and online data anomaly detection for wireless sensor systems},
  journal      = {Knowl. Based Syst.},
  volume       = {60},
  pages        = {44--57},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.knosys.2014.01.003},
  doi          = {10.1016/J.KNOSYS.2014.01.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/RassamMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/OsmanMR14,
  author       = {Mohd. Zamri Osman and
                  Mohd Aizaini Maarof and
                  Mohd. Foad Rohani},
  title        = {Improved skin detection based on dynamic threshold using multi-colour
                  space},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {29--34},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013089},
  doi          = {10.1109/ISBAST.2014.7013089},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/OsmanMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ShaidM14,
  author       = {Syed Zainudeen Mohd Shaid and
                  Mohd Aizaini Maarof},
  title        = {Malware behavior image for malware variant identification},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {238--243},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013128},
  doi          = {10.1109/ISBAST.2014.7013128},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ShaidM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scdm/KassimMZ14,
  author       = {Mohamad Nizam Kassim and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  editor       = {Tutut Herawan and
                  Rozaida Ghazali and
                  Mustafa Mat Deris},
  title        = {Enhanced Rules Application Order Approach to Stem Reduplication Words
                  in Malay Texts},
  booktitle    = {Recent Advances on Soft Computing and Data Mining - Proceedings of
                  The First International Conference on Soft Computing and Data Mining
                  {(SCDM-2014)} Universiti Tun Hussein Onn Malaysia, Johor, Malaysia,
                  June 16th-18th, 2014},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {287},
  pages        = {657--665},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07692-8\_62},
  doi          = {10.1007/978-3-319-07692-8\_62},
  timestamp    = {Thu, 14 Oct 2021 10:13:24 +0200},
  biburl       = {https://dblp.org/rec/conf/scdm/KassimMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scdm/ZamryMZ14,
  author       = {Nurfazrina Mohd Zamry and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  editor       = {Tutut Herawan and
                  Rozaida Ghazali and
                  Mustafa Mat Deris},
  title        = {Islamic Web Content Filtering and Categorization on Deviant Teaching},
  booktitle    = {Recent Advances on Soft Computing and Data Mining - Proceedings of
                  The First International Conference on Soft Computing and Data Mining
                  {(SCDM-2014)} Universiti Tun Hussein Onn Malaysia, Johor, Malaysia,
                  June 16th-18th, 2014},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {287},
  pages        = {667--678},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07692-8\_63},
  doi          = {10.1007/978-3-319-07692-8\_63},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scdm/ZamryMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/RassamZM13,
  author       = {Murad A. Rassam and
                  Anazida Zainal and
                  Mohd Aizaini Maarof},
  title        = {An adaptive and efficient dimension reduction model for multivariate
                  wireless sensor networks applications},
  journal      = {Appl. Soft Comput.},
  volume       = {13},
  number       = {4},
  pages        = {1978--1996},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.asoc.2012.11.041},
  doi          = {10.1016/J.ASOC.2012.11.041},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/RassamZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SekehMRM13,
  author       = {Mohammad Akbarpour Sekeh and
                  Mohd Aizaini Maarof and
                  Mohd. Foad Rohani and
                  Babak Mahdian},
  title        = {Efficient image duplicated region detection model using sequential
                  block clustering},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {73--84},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.02.007},
  doi          = {10.1016/J.DIIN.2013.02.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SekehMRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/BarekatainMAT13,
  author       = {Behrang Barekatain and
                  Mohd Aizaini Maarof and
                  Alfonso Ariza{-}Quintana and
                  Alicia Trivi{\~{n}}o{-}Cabrera},
  title        = {{GREENIE:} a novel hybrid routing protocol for efficient video streaming
                  over wireless mesh networks},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2013},
  pages        = {168},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-1499-2013-168},
  doi          = {10.1186/1687-1499-2013-168},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/BarekatainMAT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/RassamZM13,
  author       = {Murad A. Rassam and
                  Anazida Zainal and
                  Mohd Aizaini Maarof},
  title        = {Advancements of Data Anomaly Detection Research in Wireless Sensor
                  Networks: {A} Survey and Open Issues},
  journal      = {Sensors},
  volume       = {13},
  number       = {8},
  pages        = {10087--10122},
  year         = {2013},
  url          = {https://doi.org/10.3390/s130810087},
  doi          = {10.3390/S130810087},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/RassamZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AliM13,
  author       = {Mohamed Ahmed Mohamed Ali and
                  Mohd Aizaini Maarof},
  title        = {Dynamic Innate Immune System Model for Malware Detection},
  booktitle    = {2013 International Conference on {IT} Convergence and Security, {ICITCS}
                  2013, Macau, China, December 16-18, 2013},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITCS.2013.6717828},
  doi          = {10.1109/ICITCS.2013.6717828},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AliM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amlta/ZainalMSA12,
  author       = {Anazida Zainal and
                  Mohd Aizaini Maarof and
                  Siti Mariyam Shamsuddin and
                  Ajith Abraham},
  editor       = {Aboul Ella Hassanien and
                  Abdel{-}Badeeh M. Salem and
                  Rabie A. Ramadan and
                  Tai{-}Hoon Kim},
  title        = {Design of Adaptive {IDS} with Regulated Retraining Approach},
  booktitle    = {Advanced Machine Learning Technologies and Applications - First International
                  Conference, {AMLTA} 2012, Cairo, Egypt, December 8-10, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {322},
  pages        = {590--600},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35326-0\_59},
  doi          = {10.1007/978-3-642-35326-0\_59},
  timestamp    = {Tue, 29 Dec 2020 18:42:26 +0100},
  biburl       = {https://dblp.org/rec/conf/amlta/ZainalMSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/RassamZM12,
  author       = {Murad A. Rassam and
                  Anazida Zainal and
                  Mohd Aizaini Maarof},
  title        = {One-Class Principal Component Classifier for anomaly detection in
                  wireless sensor network},
  booktitle    = {Fourth International Conference on Computational Aspects of Social
                  Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012},
  pages        = {271--276},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CASoN.2012.6412414},
  doi          = {10.1109/CASON.2012.6412414},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/RassamZM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AliM12,
  author       = {Mohamed Ahmed Mohamed Ali and
                  Mohd Aizaini Maarof},
  editor       = {Kuinam J. Kim and
                  Kyung{-}Yong Chung},
  title        = {A Novel Malware Detection Framework Based on Innate Immunity and Danger
                  Theory},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {215},
  pages        = {29--34},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-94-007-5860-5\_4},
  doi          = {10.1007/978-94-007-5860-5\_4},
  timestamp    = {Wed, 24 May 2017 08:27:16 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/AliM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uksim/ZabidiMZ12,
  author       = {Muhammad Najmi Ahmad Zabidi and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  editor       = {David Al{-}Dabass and
                  Alessandra Orsoni and
                  Richard J. Cant},
  title        = {Malware Analysis with Multiple Features},
  booktitle    = {14th International Conference on Computer Modelling and Simulation,
                  2012 UKSim, Cambridge, United Kingdom, March 28-30, 2012},
  pages        = {231--235},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/UKSim.2012.40},
  doi          = {10.1109/UKSIM.2012.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uksim/ZabidiMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcia/SelamatLMS11,
  author       = {Ali Selamat and
                  Zhi{-}Sam Lee and
                  Mohd Aizaini Maarof and
                  Siti Mariyam Hj. Shamsuddin},
  title        = {Improved Web Page Identification Method Using Neural Networks},
  journal      = {Int. J. Comput. Intell. Appl.},
  volume       = {10},
  number       = {1},
  pages        = {87--114},
  year         = {2011},
  url          = {https://doi.org/10.1142/S1469026811003008},
  doi          = {10.1142/S1469026811003008},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcia/SelamatLMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZabidiMZ11,
  author       = {Muhammad Najmi Ahmad Zabidi and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {Ensemble based categorization and adaptive model for malware detection},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {80--85},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122799},
  doi          = {10.1109/ISIAS.2011.6122799},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZabidiMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RassamMZ11,
  author       = {Murad A. Rassam and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {A novel intrusion detection framework for Wireless Sensor Networks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {350--353},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122778},
  doi          = {10.1109/ISIAS.2011.6122778},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RassamMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AliM11,
  author       = {Mohamed Ahmed Mohamed Ali and
                  Mohd Aizaini Maarof},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Malware Detection Techniques Using Artificial Immune System},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {575--587},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_55},
  doi          = {10.1007/978-94-007-2911-7\_55},
  timestamp    = {Tue, 01 Feb 2022 08:29:46 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AliM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsecs/BozorgiML11,
  author       = {Mohammadmehdi Bozorgi and
                  Mohd Aizaini Maarof and
                  Zhi{-}Sam Lee},
  editor       = {Jasni Mohamad Zain and
                  Wan Maseri Binti Wan Mohd and
                  Eyas El{-}Qawasmeh},
  title        = {Multi-classifier Scheme with Low-Level Visual Feature for Adult Image
                  Classification},
  booktitle    = {Software Engineering and Computer Systems - Second International Conference,
                  {ICSECS} 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings,
                  Part {III}},
  series       = {Communications in Computer and Information Science},
  volume       = {181},
  pages        = {793--802},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22203-0\_66},
  doi          = {10.1007/978-3-642-22203-0\_66},
  timestamp    = {Sun, 04 Jun 2017 10:06:28 +0200},
  biburl       = {https://dblp.org/rec/conf/icsecs/BozorgiML11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsipa/SekehMRM11,
  author       = {Mohammad Akbarpour Sekeh and
                  Mohd Aizaini Maarof and
                  Mohd. Foad Rohani and
                  Malihe Motiei},
  title        = {Spiral unique sequence: {A} new rotation invariant feature for small-size
                  image block matching},
  booktitle    = {2011 {IEEE} International Conference on Signal and Image Processing
                  Applications, {ICSIPA} 2011, Kuala Lumpur, Malaysia, November 16-18,
                  2011},
  pages        = {535--540},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICSIPA.2011.6144113},
  doi          = {10.1109/ICSIPA.2011.6144113},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icsipa/SekehMRM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KadirM09,
  author       = {Rashidah Kadir and
                  Mohd Aizaini Maarof},
  title        = {A Comparative Statistical Analysis of Pseudorandom Bit Sequences},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {91--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.242},
  doi          = {10.1109/IAS.2009.242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KadirM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SekehM09,
  author       = {Mohammad Akbarpour Sekeh and
                  Mohd. Aizani Bin Maarof},
  title        = {Fuzzy Intrusion Detection System via Data Mining Technique with Sequences
                  of System Calls},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {154--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.32},
  doi          = {10.1109/IAS.2009.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SekehM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SirajMH09,
  author       = {Maheyzah Md Siraj and
                  Mohd Aizaini Maarof and
                  Siti Zaiton Mohd Hashim},
  title        = {Intelligent Clustering with {PCA} and Unsupervised Learning Algorithm
                  in Intrusion Alert Correlation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {679--682},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.261},
  doi          = {10.1109/IAS.2009.261},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SirajMH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZainalSMS09,
  author       = {Anazida Zainal and
                  Den Fairol Samaon and
                  Mohd Aizaini Maarof and
                  Siti Mariyam Hj. Shamsuddin},
  title        = {Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion
                  Detection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {683--686},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.333},
  doi          = {10.1109/IAS.2009.333},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZainalSMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/SelamatMC09,
  author       = {Ali Selamat and
                  Mohd Aizaini Maarof and
                  Tey Yi Chin},
  editor       = {Ge Yu and
                  Mario K{\"{o}}ppen and
                  Shyi{-}Ming Chen and
                  Xiamu Niu},
  title        = {Fuzzy Mamdani Inference System Skin Detection},
  booktitle    = {9th International Conference on Hybrid Intelligent Systems {(HIS}
                  2009), August 12-14, 2009, Shenyang, China},
  pages        = {57--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HIS.2009.224},
  doi          = {10.1109/HIS.2009.224},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/his/SelamatMC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socpar/RasouliMS09,
  author       = {Abdolreza Rasouli and
                  Mohd Aizaini Maarof and
                  Mahboubeh Shamsi},
  editor       = {Ajith Abraham and
                  Azah Kamilah Muda and
                  Nanna Suryana Herman and
                  Siti Mariyam Shamsuddin and
                  Yun{-}Huoy Choo},
  title        = {A New Clustering Method Based on Weighted Kernel K-Means for Non-linear
                  Data},
  booktitle    = {First International Conference of Soft Computing and Pattern Recognition,
                  SoCPaR 2009, Malacca, Malaysia, December 4-7, 2009},
  pages        = {19--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SoCPaR.2009.17},
  doi          = {10.1109/SOCPAR.2009.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socpar/RasouliMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZainalMSA08,
  author       = {Anazida Zainal and
                  Mohd Aizaini Maarof and
                  Siti Mariyam Hj. Shamsuddin and
                  Ajith Abraham},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Ensemble of One-Class Classifiers for Network Intrusion Detection
                  System},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {180--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.35},
  doi          = {10.1109/IAS.2008.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZainalMSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RohaniMSK08,
  author       = {Mohd. Foad Rohani and
                  Mohd Aizaini Maarof and
                  Ali Selamat and
                  Houssain Kettani},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {LoSS Detection Approach Based on {ESOSS} and {ASOSS} Models},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {192--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.37},
  doi          = {10.1109/IAS.2008.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RohaniMSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RazakSM08,
  author       = {Shukor Abd Razak and
                  Normalia Samian and
                  Mohd Aizaini Maarof},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {A Friend Mechanism for Mobile Ad Hoc Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.27},
  doi          = {10.1109/IAS.2008.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RazakSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiams/SamianMR08,
  author       = {Normalia Samian and
                  Mohd Aizaini Maarof and
                  Shukor Abd Razak},
  title        = {Towards Identifying Features of Trust in Mobile Ad Hoc Network},
  booktitle    = {Second Asia International Conference on Modelling and Simulation,
                  {AMS} 2008, Kuala Lumpur, Malaysia, May 13-15, 2008},
  pages        = {271--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/AMS.2008.113},
  doi          = {10.1109/AMS.2008.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiams/SamianMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiams/ZainalMS08,
  author       = {Anazida Zainal and
                  Mohd Aizaini Maarof and
                  Siti Mariyam Hj. Shamsuddin},
  title        = {Data Reduction and Ensemble Classifiers in Intrusion Detection},
  booktitle    = {Second Asia International Conference on Modelling and Simulation,
                  {AMS} 2008, Kuala Lumpur, Malaysia, May 13-15, 2008},
  pages        = {591--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/AMS.2008.146},
  doi          = {10.1109/AMS.2008.146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiams/ZainalMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imtic/IqbalMD08,
  author       = {Anjum Iqbal and
                  Mohd Aizaini Maarof and
                  Safaai Deris},
  editor       = {Dil Muhammad Akbar Hussain and
                  Abdul Qadeer Khan Rajput and
                  Bhawani Shankar Chowdhry and
                  Quintin Gee},
  title        = {The Concept of Bio-fitness in Bio-inspired Computational Metaphor
                  Abstraction},
  booktitle    = {Wireless Networks, Information Processing and Systems, International
                  Multi Topic Conference, {IMTIC} 2008, Jamshoro, Pakistan, April 11-12,
                  2008, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {20},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89853-5\_23},
  doi          = {10.1007/978-3-540-89853-5\_23},
  timestamp    = {Fri, 19 May 2017 01:26:03 +0200},
  biburl       = {https://dblp.org/rec/conf/imtic/IqbalMD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/LeeMSS08,
  author       = {Zhi{-}Sam Lee and
                  Mohd Aizaini Maarof and
                  Ali Selamat and
                  Siti Mariyam Hj. Shamsuddin},
  editor       = {Jeng{-}Shyang Pan and
                  Ajith Abraham and
                  Chin{-}Chen Chang},
  title        = {Enhance Term Weighting Algorithm as Feature Selection Technique for
                  Illicit Web Content Classification},
  booktitle    = {Eighth International Conference on Intelligent Systems Design and
                  Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
                  3 Volumes},
  pages        = {145--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISDA.2008.171},
  doi          = {10.1109/ISDA.2008.171},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isda/LeeMSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ZainalMS07,
  author       = {Anazida Zainal and
                  Mohd Aizaini Maarof and
                  Siti Mariyam Hj. Shamsuddin},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4705},
  pages        = {512--524},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74472-6\_42},
  doi          = {10.1007/978-3-540-74472-6\_42},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ZainalMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaris/IqbalM05,
  author       = {Anjum Iqbal and
                  Mohd Aizaini Maarof},
  editor       = {Christian Jacob and
                  Marcin L. Pilat and
                  Peter J. Bentley and
                  Jonathan Timmis},
  title        = {Polymorphism and Danger Susceptibility of System Call DASTONs},
  booktitle    = {Artificial Immune Systems: 4th International Conference, {ICARIS}
                  2005, Banff, Alberta, Canada, August 14-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3627},
  pages        = {366--374},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11536444\_28},
  doi          = {10.1007/11536444\_28},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icaris/IqbalM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wec/IbrahimM05,
  author       = {Subariah Ibrahim and
                  Mohd Aizaini Maarof},
  editor       = {Cemal Ardil},
  title        = {Diffusion Analysis of a Scalable Fiestel Network},
  booktitle    = {The Third World Enformatika Conference, WEC'05, April 27-29, 2005,
                  Istanbul, Turkey, {CDROM}},
  pages        = {98--101},
  publisher    = {Enformatika, {\c{C}}anakkale, Turkey},
  year         = {2005},
  timestamp    = {Fri, 15 Jul 2005 13:44:26 +0200},
  biburl       = {https://dblp.org/rec/conf/wec/IbrahimM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/OmarMZ04,
  author       = {Mohd Nizam Omar and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {Solving Time Gap Problems through the Optimization of Detecting Stepping
                  Stone Algorithm},
  booktitle    = {2004 International Conference on Computer and Information Technology
                  {(CIT} 2004), 14-16 September 2004, Wuhan, China},
  pages        = {391--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CIT.2004.1357227},
  doi          = {10.1109/CIT.2004.1357227},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/OmarMZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaris/IqbalM04,
  author       = {Anjum Iqbal and
                  Mohd Aizaini Maarof},
  editor       = {Giuseppe Nicosia and
                  Vincenzo Cutello and
                  Peter J. Bentley and
                  Jon Timmis},
  title        = {Towards Danger Theory Based Artificial {APC} Model: Novel Metaphor
                  for Danger Susceptible Data Codons},
  booktitle    = {Artificial Immune Systems, Third International Conference, {ICARIS}
                  2004, Catania, Sicily, Italy, September 13-16, 2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {3239},
  pages        = {161--174},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30220-9\_13},
  doi          = {10.1007/978-3-540-30220-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icaris/IqbalM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/KrishnaM03,
  author       = {Kanagaraj Krishna and
                  Mohd. Aizani Bin Maarof},
  title        = {A Hybrid Trust Management Model for {MAS} Based Trading Society},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {1},
  number       = {0},
  year         = {2003},
  url          = {http://www.iajit.org/ABSTRACTS.htm\#08},
  timestamp    = {Wed, 28 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iajit/KrishnaM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cita/OmarMI03,
  author       = {Mohd Nizam Omar and
                  Mohd Aizaini Maarof and
                  Subariah Ibrahim},
  title        = {Towards Solving Time Gap Problems through the Optimization of Packet
                  Capture Technique},
  booktitle    = {3th International Conference on {IT} in Asia, {CITA} 2003, Kuching,
                  Sarawak, Malaysia, 2003},
  pages        = {76--81},
  year         = {2003},
  timestamp    = {Thu, 17 Dec 2015 14:00:10 +0100},
  biburl       = {https://dblp.org/rec/conf/cita/OmarMI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cita/CrysdianAM03,
  author       = {Cahyo Crysdian and
                  Abdul Hanan Abdullah and
                  Mohd Aizaini Maarof},
  title        = {Enforcing Multilevel Security Policies for Network Firewall},
  booktitle    = {3th International Conference on {IT} in Asia, {CITA} 2003, Kuching,
                  Sarawak, Malaysia, 2003},
  pages        = {244--246},
  year         = {2003},
  timestamp    = {Thu, 17 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cita/CrysdianAM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cita/DaudMKZ03,
  author       = {Aliza Yusny Daud and
                  Mohd Aizaini Maarof and
                  Norliza Katuk and
                  Anazida Zainal},
  title        = {Attack on Intrusion Detection System Host: Simulation and Analysis},
  booktitle    = {3th International Conference on {IT} in Asia, {CITA} 2003, Kuching,
                  Sarawak, Malaysia, 2003},
  pages        = {256--260},
  year         = {2003},
  timestamp    = {Thu, 17 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cita/DaudMKZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Maarof00,
  author       = {Mohd. Aizani Bin Maarof},
  title        = {Integrating security services into computer supported cooperative
                  work},
  school       = {Aston University, Birmingham, {UK}},
  year         = {2000},
  url          = {http://eprints.aston.ac.uk/7989/},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Maarof00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webnet/DohertyM97,
  author       = {Bernard S. Doherty and
                  Mohd Aizaini Maarof},
  editor       = {Suave Lobodzinski and
                  Ivan Tomek},
  title        = {Integrating Security Services Into Collaborative Systems},
  booktitle    = {Proceedings of WebNet 97 - World Conference on the WWW, Internet {\&}
                  Intranet, Toronto, Canada, November 1-5, 1997},
  publisher    = {{AACE}},
  year         = {1997},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/webnet/DohertyM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}