default search action
BibTeX records: Mohd Aizaini Maarof
@article{DBLP:journals/fgcs/Al-rimyMASGAAH21, author = {Bander Ali Saleh Al{-}rimy and Mohd Aizaini Maarof and Mamoun Alazab and Syed Zainudeen Mohd Shaid and Fuad A. Ghaleb and Abdulmohsen Almalawi and Abdullah Marish Ali and Tawfik Al Hadhrami}, title = {Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection}, journal = {Future Gener. Comput. Syst.}, volume = {115}, pages = {641--658}, year = {2021}, url = {https://doi.org/10.1016/j.future.2020.10.002}, doi = {10.1016/J.FUTURE.2020.10.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/Al-rimyMASGAAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/OsmanSGSAM21, author = {Huda Osman and Maheyzah Md Siraj and Fuad A. Ghaleb and Faisal Saeed and Eman H. Alkhammash and Mohd Aizaini Maarof}, title = {Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {7154705:1--7154705:13}, year = {2021}, url = {https://doi.org/10.1155/2021/7154705}, doi = {10.1155/2021/7154705}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/OsmanSGSAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crc2/AzizMZ21, author = {Noor Azeera Abdul Aziz and Mohd Aizaini Maarof and Anazida Zainal}, title = {Hate Speech and Offensive Language Detection: {A} New Feature Set with Filter-Embedded Combining Feature Selection}, booktitle = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi Island, Malaysia, January 29-31, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CRC50527.2021.9392486}, doi = {10.1109/CRC50527.2021.9392486}, timestamp = {Wed, 21 Apr 2021 13:08:07 +0200}, biburl = {https://dblp.org/rec/conf/crc2/AzizMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crc2/KhalidZMG21, author = {Adam Khalid and Anazida Zainal and Mohd Aizaini Maarof and Fuad A. Ghaleb}, title = {Advanced Persistent Threat Detection: {A} Survey}, booktitle = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi Island, Malaysia, January 29-31, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CRC50527.2021.9392626}, doi = {10.1109/CRC50527.2021.9392626}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crc2/KhalidZMG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crc2/OlaimatMA21, author = {Mohammad N. Olaimat and Mohd Aizaini Maarof and Bander Ali Saleh Al{-}rimy}, title = {Ransomware Anti-Analysis and Evasion Techniques: {A} Survey and Research Directions}, booktitle = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi Island, Malaysia, January 29-31, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CRC50527.2021.9392529}, doi = {10.1109/CRC50527.2021.9392529}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crc2/OlaimatMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crc2/OsmanSM21, author = {Huda Osman and Maheyzah Md Siraj and Mohd Aizaini Maarof}, title = {{HAC:} Model for Privacy-Preserving Outsourced Data Over Cloud}, booktitle = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi Island, Malaysia, January 29-31, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CRC50527.2021.9392427}, doi = {10.1109/CRC50527.2021.9392427}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crc2/OsmanSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crc2/UroojMA21, author = {Umara Urooj and Mohd. Aizani Bin Maarof and Bander Ali Saleh Al{-}rimy}, title = {A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model}, booktitle = {3rd International Cyber Resilience Conference, {CRC} 2021, Langkawi Island, Malaysia, January 29-31, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CRC50527.2021.9392548}, doi = {10.1109/CRC50527.2021.9392548}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crc2/UroojMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-rimyMAASGHA20, author = {Bander Ali Saleh Al{-}rimy and Mohd Aizaini Maarof and Mamoun Alazab and Fawaz Alsolami and Syed Zainudeen Mohd Shaid and Fuad A. Ghaleb and Tawfik Al Hadhrami and Abdullah Marish Ali}, title = {A Pseudo Feedback-Based Annotated {TF-IDF} Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction}, journal = {{IEEE} Access}, volume = {8}, pages = {140586--140598}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3012674}, doi = {10.1109/ACCESS.2020.3012674}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Al-rimyMAASGHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GhalebAAAZRSM20, author = {Fuad A. Ghaleb and Bander Ali Saleh Al{-}rimy and Abdulmohsen Almalawi and Abdullah Marish Ali and Anazida Binti Zainal and Murad A. Rassam and Syed Zainudeen Mohd Shaid and Mohd Aizaini Maarof}, title = {Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: {A} Context-Aware Approach}, journal = {{IEEE} Access}, volume = {8}, pages = {217744--217761}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3040903}, doi = {10.1109/ACCESS.2020.3040903}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GhalebAAAZRSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GhalebMZASH19, author = {Fuad A. Ghaleb and Mohd Aizaini Maarof and Anazida Binti Zainal and Bander Ali Saleh Al{-}rimy and Faisal Saeed and Tawfik Al Hadhrami}, title = {Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network}, journal = {{IEEE} Access}, volume = {7}, pages = {159119--159140}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2950805}, doi = {10.1109/ACCESS.2019.2950805}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GhalebMZASH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Al-rimyMS19, author = {Bander Ali Saleh Al{-}rimy and Mohd Aizaini Maarof and Syed Zainudeen Mohd Shaid}, title = {Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection}, journal = {Future Gener. Comput. Syst.}, volume = {101}, pages = {476--491}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.06.005}, doi = {10.1016/J.FUTURE.2019.06.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/Al-rimyMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/OghazMRZS19, author = {Mahdi Maktab Dar Oghaz and Mohd Aizaini Maarof and Mohd. Foad Rohani and Anazida Zainal and Syed Zainudeen Mohd Shaid}, title = {An optimized skin texture model using gray-level co-occurrence matrix}, journal = {Neural Comput. Appl.}, volume = {31}, number = {6}, pages = {1835--1853}, year = {2019}, url = {https://doi.org/10.1007/s00521-017-3164-8}, doi = {10.1007/S00521-017-3164-8}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/OghazMRZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/GhalebMZAAB19, author = {Fuad A. Ghaleb and Mohd Aizaini Maarof and Anazida Binti Zainal and Bander Ali Saleh Al{-}rimy and Abdullah Alsaeedi and Wadii Boulila}, title = {Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network}, journal = {Remote. Sens.}, volume = {11}, number = {23}, pages = {2852}, year = {2019}, url = {https://doi.org/10.3390/rs11232852}, doi = {10.3390/RS11232852}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/GhalebMZAAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/GhalebMZRSA19, author = {Fuad A. Ghaleb and Mohd Aizaini Maarof and Anazida Zainal and Murad A. Rassam and Faisal Saeed and Mohammed Alsaedi}, title = {Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between the cooperative awareness messages}, journal = {Veh. Commun.}, volume = {20}, year = {2019}, url = {https://doi.org/10.1016/j.vehcom.2019.100186}, doi = {10.1016/J.VEHCOM.2019.100186}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/GhalebMZRSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/irict/OsmanMS19, author = {Huda Osman and Mohd Aizaini Maarof and Maheyzah Md Siraj}, editor = {Faisal Saeed and Fathey Mohammed and Nadhmi Gazem}, title = {Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing}, booktitle = {Emerging Trends in Intelligent Computing and Informatics - Data Science, Intelligent Information Systems and Smart Computing, International Conference of Reliable Information and Communication Technology, {IRICT} 2019, Johor, Malaysia, 22-23 September, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {1073}, pages = {748--758}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33582-3\_70}, doi = {10.1007/978-3-030-33582-3\_70}, timestamp = {Thu, 16 Jan 2020 19:21:55 +0100}, biburl = {https://dblp.org/rec/conf/irict/OsmanMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpar/ChiamMKZ19, author = {Yoong Jien Chiam and Mohd Aizaini Maarof and Mohamad Nizam Kassim and Anazida Zainal}, editor = {Ajith Abraham and M. Akhil Jabbar and Sanju Tiwari and Isabel M. S. Jesus}, title = {Malware Behavior Profiling from Unstructured Data}, booktitle = {Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), Hyderabad, India, December 13-15, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {1182}, pages = {130--140}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49345-5\_14}, doi = {10.1007/978-3-030-49345-5\_14}, timestamp = {Thu, 20 Jan 2022 09:49:19 +0100}, biburl = {https://dblp.org/rec/conf/socpar/ChiamMKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpar/KhooZAKMB19, author = {Eric Khoo and Anazida Zainal and Nurfadilah Ariffin and Mohd Nizam Kassim and Mohd Aizaini Maarof and Majid Bakhtiari}, editor = {Ajith Abraham and M. Akhil Jabbar and Sanju Tiwari and Isabel M. S. Jesus}, title = {Fraudulent e-Commerce Website Detection Model Using HTML, Text and Image Features}, booktitle = {Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), Hyderabad, India, December 13-15, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {1182}, pages = {177--186}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49345-5\_19}, doi = {10.1007/978-3-030-49345-5\_19}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socpar/KhooZAKMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Al-rimyMS18, author = {Bander Ali Saleh Al{-}rimy and Mohd Aizaini Maarof and Syed Zainudeen Mohd Shaid}, title = {Ransomware threat success factors, taxonomy, and countermeasures: {A} survey and research directions}, journal = {Comput. Secur.}, volume = {74}, pages = {144--166}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.01.001}, doi = {10.1016/J.COSE.2018.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Al-rimyMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/RassamMZ18, author = {Murad A. Rassam and Mohd Aizaini Maarof and Anazida Zainal}, title = {A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier}, journal = {Int. J. Sens. Networks}, volume = {27}, number = {3}, pages = {200--214}, year = {2018}, url = {https://doi.org/10.1504/IJSNET.2018.093126}, doi = {10.1504/IJSNET.2018.093126}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsnet/RassamMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-09574, author = {Bander Ali Saleh Al{-}rimy and Mohd Aizaini Maarof and Syed Zainudeen Mohd Shaid}, title = {Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection}, journal = {CoRR}, volume = {abs/1807.09574}, year = {2018}, url = {http://arxiv.org/abs/1807.09574}, eprinttype = {arXiv}, eprint = {1807.09574}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-09574.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/BarekatainKMAT17, author = {Behrang Barekatain and Dariush Khezrimotlagh and Mohd Aizaini Maarof and Alfonso Ariza{-}Quintana and Alicia Trivi{\~{n}}o{-}Cabrera}, title = {{GAZELLE:} An Enhanced Random Network Coding Based Framework for Efficient {P2P} Live Video Streaming Over Hybrid WMNs}, journal = {Wirel. Pers. Commun.}, volume = {95}, number = {3}, pages = {2485--2505}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3930-4}, doi = {10.1007/S11277-016-3930-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/BarekatainKMAT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/MaktabarZMK17, author = {Mahdi Maktabar and Anazida Zainal and Mohd Aizaini Maarof and Mohamad Nizam Kassim}, editor = {Ajith Abraham and Pranab Kumar Muhuri and Azah Kamilah Muda and Niketa Gandhi}, title = {Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques}, booktitle = {Hybrid Intelligent Systems - 17th International Conference on Hybrid Intelligent Systems {(HIS} 2017) Held in Delhi, India, December 14-16, 2017}, series = {Advances in Intelligent Systems and Computing}, volume = {734}, pages = {294--304}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-76351-4\_30}, doi = {10.1007/978-3-319-76351-4\_30}, timestamp = {Wed, 05 May 2021 12:03:29 +0200}, biburl = {https://dblp.org/rec/conf/his/MaktabarZMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbdallahMZ16, author = {Aisha Abdallah and Mohd Aizaini Maarof and Anazida Zainal}, title = {Fraud detection system: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {68}, pages = {90--113}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.04.007}, doi = {10.1016/J.JNCA.2016.04.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AbdallahMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmbd/KassimMZW16, author = {Mohamad Nizam Kassim and Mohd Aizaini Maarof and Anazida Zainal and Amirudin Abdul Wahab}, editor = {Ying Tan and Yuhui Shi}, title = {Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media}, booktitle = {Data Mining and Big Data, First International Conference, {DMBD} 2016, Bali, Indonesia, June 25-30, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9714}, pages = {391--400}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40973-3\_39}, doi = {10.1007/978-3-319-40973-3\_39}, timestamp = {Tue, 11 Jul 2023 08:21:50 +0200}, biburl = {https://dblp.org/rec/conf/dmbd/KassimMZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkaw/KassimMZW16, author = {Mohamad Nizam Kassim and Mohd Aizaini Maarof and Anazida Zainal and Amirudin Abdul Wahab}, editor = {Hayato Ohwada and Kenichi Yoshida}, title = {Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts}, booktitle = {Knowledge Management and Acquisition for Intelligent Systems - 14th Pacific Rim Knowledge Acquisition Workshop, {PKAW} 2016, Phuket, Thailand, August 22-23, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9806}, pages = {71--85}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42706-5\_6}, doi = {10.1007/978-3-319-42706-5\_6}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/pkaw/KassimMZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/RassamZM15, author = {Murad A. Rassam and Anazida Zainal and Mohd Aizaini Maarof}, title = {Principal component analysis-based data reduction model for wireless sensor networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {18}, number = {1/2}, pages = {85--101}, year = {2015}, url = {https://doi.org/10.1504/IJAHUC.2015.067756}, doi = {10.1504/IJAHUC.2015.067756}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/RassamZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/BarekatainKMGAT15, author = {Behrang Barekatain and Dariush Khezrimotlagh and Mohd Aizaini Maarof and Hamid Reza Ghaeini and Alfonso Ariza{-}Quintana and Alicia Trivi{\~{n}}o{-}Cabrera}, title = {Efficient {P2P} Live Video Streaming Over Hybrid WMNs Using Random Network Coding}, journal = {Wirel. Pers. Commun.}, volume = {80}, number = {4}, pages = {1761--1789}, year = {2015}, url = {https://doi.org/10.1007/s11277-014-2112-5}, doi = {10.1007/S11277-014-2112-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/BarekatainKMGAT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ElhadiMBH14, author = {Ammar Ahmed E. Elhadi and Mohd Aizaini Maarof and Bazara I. A. Barry and Hamza Hentabli}, title = {Enhancing the detection of metamorphic malware using call graphs}, journal = {Comput. Secur.}, volume = {46}, pages = {62--78}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.07.004}, doi = {10.1016/J.COSE.2014.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ElhadiMBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/RassamMZ14, author = {Murad A. Rassam and Mohd Aizaini Maarof and Anazida Zainal}, title = {Adaptive and online data anomaly detection for wireless sensor systems}, journal = {Knowl. Based Syst.}, volume = {60}, pages = {44--57}, year = {2014}, url = {https://doi.org/10.1016/j.knosys.2014.01.003}, doi = {10.1016/J.KNOSYS.2014.01.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/RassamMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/OsmanMR14, author = {Mohd. Zamri Osman and Mohd Aizaini Maarof and Mohd. Foad Rohani}, title = {Improved skin detection based on dynamic threshold using multi-colour space}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {29--34}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013089}, doi = {10.1109/ISBAST.2014.7013089}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/isbast/OsmanMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ShaidM14, author = {Syed Zainudeen Mohd Shaid and Mohd Aizaini Maarof}, title = {Malware behavior image for malware variant identification}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {238--243}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013128}, doi = {10.1109/ISBAST.2014.7013128}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ShaidM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scdm/KassimMZ14, author = {Mohamad Nizam Kassim and Mohd Aizaini Maarof and Anazida Zainal}, editor = {Tutut Herawan and Rozaida Ghazali and Mustafa Mat Deris}, title = {Enhanced Rules Application Order Approach to Stem Reduplication Words in Malay Texts}, booktitle = {Recent Advances on Soft Computing and Data Mining - Proceedings of The First International Conference on Soft Computing and Data Mining {(SCDM-2014)} Universiti Tun Hussein Onn Malaysia, Johor, Malaysia, June 16th-18th, 2014}, series = {Advances in Intelligent Systems and Computing}, volume = {287}, pages = {657--665}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07692-8\_62}, doi = {10.1007/978-3-319-07692-8\_62}, timestamp = {Thu, 14 Oct 2021 10:13:24 +0200}, biburl = {https://dblp.org/rec/conf/scdm/KassimMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scdm/ZamryMZ14, author = {Nurfazrina Mohd Zamry and Mohd Aizaini Maarof and Anazida Zainal}, editor = {Tutut Herawan and Rozaida Ghazali and Mustafa Mat Deris}, title = {Islamic Web Content Filtering and Categorization on Deviant Teaching}, booktitle = {Recent Advances on Soft Computing and Data Mining - Proceedings of The First International Conference on Soft Computing and Data Mining {(SCDM-2014)} Universiti Tun Hussein Onn Malaysia, Johor, Malaysia, June 16th-18th, 2014}, series = {Advances in Intelligent Systems and Computing}, volume = {287}, pages = {667--678}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07692-8\_63}, doi = {10.1007/978-3-319-07692-8\_63}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scdm/ZamryMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/RassamZM13, author = {Murad A. Rassam and Anazida Zainal and Mohd Aizaini Maarof}, title = {An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications}, journal = {Appl. Soft Comput.}, volume = {13}, number = {4}, pages = {1978--1996}, year = {2013}, url = {https://doi.org/10.1016/j.asoc.2012.11.041}, doi = {10.1016/J.ASOC.2012.11.041}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/RassamZM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SekehMRM13, author = {Mohammad Akbarpour Sekeh and Mohd Aizaini Maarof and Mohd. Foad Rohani and Babak Mahdian}, title = {Efficient image duplicated region detection model using sequential block clustering}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {73--84}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.02.007}, doi = {10.1016/J.DIIN.2013.02.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SekehMRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/BarekatainMAT13, author = {Behrang Barekatain and Mohd Aizaini Maarof and Alfonso Ariza{-}Quintana and Alicia Trivi{\~{n}}o{-}Cabrera}, title = {{GREENIE:} a novel hybrid routing protocol for efficient video streaming over wireless mesh networks}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2013}, pages = {168}, year = {2013}, url = {https://doi.org/10.1186/1687-1499-2013-168}, doi = {10.1186/1687-1499-2013-168}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/BarekatainMAT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/RassamZM13, author = {Murad A. Rassam and Anazida Zainal and Mohd Aizaini Maarof}, title = {Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: {A} Survey and Open Issues}, journal = {Sensors}, volume = {13}, number = {8}, pages = {10087--10122}, year = {2013}, url = {https://doi.org/10.3390/s130810087}, doi = {10.3390/S130810087}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/RassamZM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AliM13, author = {Mohamed Ahmed Mohamed Ali and Mohd Aizaini Maarof}, title = {Dynamic Innate Immune System Model for Malware Detection}, booktitle = {2013 International Conference on {IT} Convergence and Security, {ICITCS} 2013, Macau, China, December 16-18, 2013}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICITCS.2013.6717828}, doi = {10.1109/ICITCS.2013.6717828}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AliM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amlta/ZainalMSA12, author = {Anazida Zainal and Mohd Aizaini Maarof and Siti Mariyam Shamsuddin and Ajith Abraham}, editor = {Aboul Ella Hassanien and Abdel{-}Badeeh M. Salem and Rabie A. Ramadan and Tai{-}Hoon Kim}, title = {Design of Adaptive {IDS} with Regulated Retraining Approach}, booktitle = {Advanced Machine Learning Technologies and Applications - First International Conference, {AMLTA} 2012, Cairo, Egypt, December 8-10, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {322}, pages = {590--600}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35326-0\_59}, doi = {10.1007/978-3-642-35326-0\_59}, timestamp = {Tue, 29 Dec 2020 18:42:26 +0100}, biburl = {https://dblp.org/rec/conf/amlta/ZainalMSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/RassamZM12, author = {Murad A. Rassam and Anazida Zainal and Mohd Aizaini Maarof}, title = {One-Class Principal Component Classifier for anomaly detection in wireless sensor network}, booktitle = {Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012}, pages = {271--276}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CASoN.2012.6412414}, doi = {10.1109/CASON.2012.6412414}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cason/RassamZM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AliM12, author = {Mohamed Ahmed Mohamed Ali and Mohd Aizaini Maarof}, editor = {Kuinam J. Kim and Kyung{-}Yong Chung}, title = {A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2012, Pyeong Chang, Korea, December 5-7, 2012}, series = {Lecture Notes in Electrical Engineering}, volume = {215}, pages = {29--34}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-94-007-5860-5\_4}, doi = {10.1007/978-94-007-5860-5\_4}, timestamp = {Wed, 24 May 2017 08:27:16 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/AliM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uksim/ZabidiMZ12, author = {Muhammad Najmi Ahmad Zabidi and Mohd Aizaini Maarof and Anazida Zainal}, editor = {David Al{-}Dabass and Alessandra Orsoni and Richard J. Cant}, title = {Malware Analysis with Multiple Features}, booktitle = {14th International Conference on Computer Modelling and Simulation, 2012 UKSim, Cambridge, United Kingdom, March 28-30, 2012}, pages = {231--235}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/UKSim.2012.40}, doi = {10.1109/UKSIM.2012.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uksim/ZabidiMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcia/SelamatLMS11, author = {Ali Selamat and Zhi{-}Sam Lee and Mohd Aizaini Maarof and Siti Mariyam Hj. Shamsuddin}, title = {Improved Web Page Identification Method Using Neural Networks}, journal = {Int. J. Comput. Intell. Appl.}, volume = {10}, number = {1}, pages = {87--114}, year = {2011}, url = {https://doi.org/10.1142/S1469026811003008}, doi = {10.1142/S1469026811003008}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcia/SelamatLMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZabidiMZ11, author = {Muhammad Najmi Ahmad Zabidi and Mohd Aizaini Maarof and Anazida Zainal}, title = {Ensemble based categorization and adaptive model for malware detection}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {80--85}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122799}, doi = {10.1109/ISIAS.2011.6122799}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/ZabidiMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RassamMZ11, author = {Murad A. Rassam and Mohd Aizaini Maarof and Anazida Zainal}, title = {A novel intrusion detection framework for Wireless Sensor Networks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {350--353}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122778}, doi = {10.1109/ISIAS.2011.6122778}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/RassamMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AliM11, author = {Mohamed Ahmed Mohamed Ali and Mohd Aizaini Maarof}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Malware Detection Techniques Using Artificial Immune System}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {575--587}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_55}, doi = {10.1007/978-94-007-2911-7\_55}, timestamp = {Tue, 01 Feb 2022 08:29:46 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AliM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsecs/BozorgiML11, author = {Mohammadmehdi Bozorgi and Mohd Aizaini Maarof and Zhi{-}Sam Lee}, editor = {Jasni Mohamad Zain and Wan Maseri Binti Wan Mohd and Eyas El{-}Qawasmeh}, title = {Multi-classifier Scheme with Low-Level Visual Feature for Adult Image Classification}, booktitle = {Software Engineering and Computer Systems - Second International Conference, {ICSECS} 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part {III}}, series = {Communications in Computer and Information Science}, volume = {181}, pages = {793--802}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22203-0\_66}, doi = {10.1007/978-3-642-22203-0\_66}, timestamp = {Sun, 04 Jun 2017 10:06:28 +0200}, biburl = {https://dblp.org/rec/conf/icsecs/BozorgiML11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsipa/SekehMRM11, author = {Mohammad Akbarpour Sekeh and Mohd Aizaini Maarof and Mohd. Foad Rohani and Malihe Motiei}, title = {Spiral unique sequence: {A} new rotation invariant feature for small-size image block matching}, booktitle = {2011 {IEEE} International Conference on Signal and Image Processing Applications, {ICSIPA} 2011, Kuala Lumpur, Malaysia, November 16-18, 2011}, pages = {535--540}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICSIPA.2011.6144113}, doi = {10.1109/ICSIPA.2011.6144113}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icsipa/SekehMRM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KadirM09, author = {Rashidah Kadir and Mohd Aizaini Maarof}, title = {A Comparative Statistical Analysis of Pseudorandom Bit Sequences}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {91--94}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.242}, doi = {10.1109/IAS.2009.242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/KadirM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SekehM09, author = {Mohammad Akbarpour Sekeh and Mohd. Aizani Bin Maarof}, title = {Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {154--157}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.32}, doi = {10.1109/IAS.2009.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/SekehM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SirajMH09, author = {Maheyzah Md Siraj and Mohd Aizaini Maarof and Siti Zaiton Mohd Hashim}, title = {Intelligent Clustering with {PCA} and Unsupervised Learning Algorithm in Intrusion Alert Correlation}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {679--682}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.261}, doi = {10.1109/IAS.2009.261}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/SirajMH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZainalSMS09, author = {Anazida Zainal and Den Fairol Samaon and Mohd Aizaini Maarof and Siti Mariyam Hj. Shamsuddin}, title = {Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {683--686}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.333}, doi = {10.1109/IAS.2009.333}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ZainalSMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/SelamatMC09, author = {Ali Selamat and Mohd Aizaini Maarof and Tey Yi Chin}, editor = {Ge Yu and Mario K{\"{o}}ppen and Shyi{-}Ming Chen and Xiamu Niu}, title = {Fuzzy Mamdani Inference System Skin Detection}, booktitle = {9th International Conference on Hybrid Intelligent Systems {(HIS} 2009), August 12-14, 2009, Shenyang, China}, pages = {57--62}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HIS.2009.224}, doi = {10.1109/HIS.2009.224}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/his/SelamatMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpar/RasouliMS09, author = {Abdolreza Rasouli and Mohd Aizaini Maarof and Mahboubeh Shamsi}, editor = {Ajith Abraham and Azah Kamilah Muda and Nanna Suryana Herman and Siti Mariyam Shamsuddin and Yun{-}Huoy Choo}, title = {A New Clustering Method Based on Weighted Kernel K-Means for Non-linear Data}, booktitle = {First International Conference of Soft Computing and Pattern Recognition, SoCPaR 2009, Malacca, Malaysia, December 4-7, 2009}, pages = {19--24}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SoCPaR.2009.17}, doi = {10.1109/SOCPAR.2009.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socpar/RasouliMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZainalMSA08, author = {Anazida Zainal and Mohd Aizaini Maarof and Siti Mariyam Hj. Shamsuddin and Ajith Abraham}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Ensemble of One-Class Classifiers for Network Intrusion Detection System}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {180--185}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.35}, doi = {10.1109/IAS.2008.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ZainalMSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RohaniMSK08, author = {Mohd. Foad Rohani and Mohd Aizaini Maarof and Ali Selamat and Houssain Kettani}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {LoSS Detection Approach Based on {ESOSS} and {ASOSS} Models}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {192--197}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.37}, doi = {10.1109/IAS.2008.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/RohaniMSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RazakSM08, author = {Shukor Abd Razak and Normalia Samian and Mohd Aizaini Maarof}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Friend Mechanism for Mobile Ad Hoc Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.27}, doi = {10.1109/IAS.2008.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/RazakSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiams/SamianMR08, author = {Normalia Samian and Mohd Aizaini Maarof and Shukor Abd Razak}, title = {Towards Identifying Features of Trust in Mobile Ad Hoc Network}, booktitle = {Second Asia International Conference on Modelling and Simulation, {AMS} 2008, Kuala Lumpur, Malaysia, May 13-15, 2008}, pages = {271--276}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/AMS.2008.113}, doi = {10.1109/AMS.2008.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiams/SamianMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiams/ZainalMS08, author = {Anazida Zainal and Mohd Aizaini Maarof and Siti Mariyam Hj. Shamsuddin}, title = {Data Reduction and Ensemble Classifiers in Intrusion Detection}, booktitle = {Second Asia International Conference on Modelling and Simulation, {AMS} 2008, Kuala Lumpur, Malaysia, May 13-15, 2008}, pages = {591--596}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/AMS.2008.146}, doi = {10.1109/AMS.2008.146}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiams/ZainalMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imtic/IqbalMD08, author = {Anjum Iqbal and Mohd Aizaini Maarof and Safaai Deris}, editor = {Dil Muhammad Akbar Hussain and Abdul Qadeer Khan Rajput and Bhawani Shankar Chowdhry and Quintin Gee}, title = {The Concept of Bio-fitness in Bio-inspired Computational Metaphor Abstraction}, booktitle = {Wireless Networks, Information Processing and Systems, International Multi Topic Conference, {IMTIC} 2008, Jamshoro, Pakistan, April 11-12, 2008, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {20}, pages = {215--226}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89853-5\_23}, doi = {10.1007/978-3-540-89853-5\_23}, timestamp = {Fri, 19 May 2017 01:26:03 +0200}, biburl = {https://dblp.org/rec/conf/imtic/IqbalMD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/LeeMSS08, author = {Zhi{-}Sam Lee and Mohd Aizaini Maarof and Ali Selamat and Siti Mariyam Hj. Shamsuddin}, editor = {Jeng{-}Shyang Pan and Ajith Abraham and Chin{-}Chen Chang}, title = {Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content Classification}, booktitle = {Eighth International Conference on Intelligent Systems Design and Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes}, pages = {145--150}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISDA.2008.171}, doi = {10.1109/ISDA.2008.171}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isda/LeeMSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ZainalMS07, author = {Anazida Zainal and Mohd Aizaini Maarof and Siti Mariyam Hj. Shamsuddin}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4705}, pages = {512--524}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74472-6\_42}, doi = {10.1007/978-3-540-74472-6\_42}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ZainalMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaris/IqbalM05, author = {Anjum Iqbal and Mohd Aizaini Maarof}, editor = {Christian Jacob and Marcin L. Pilat and Peter J. Bentley and Jonathan Timmis}, title = {Polymorphism and Danger Susceptibility of System Call DASTONs}, booktitle = {Artificial Immune Systems: 4th International Conference, {ICARIS} 2005, Banff, Alberta, Canada, August 14-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3627}, pages = {366--374}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11536444\_28}, doi = {10.1007/11536444\_28}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icaris/IqbalM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wec/IbrahimM05, author = {Subariah Ibrahim and Mohd Aizaini Maarof}, editor = {Cemal Ardil}, title = {Diffusion Analysis of a Scalable Fiestel Network}, booktitle = {The Third World Enformatika Conference, WEC'05, April 27-29, 2005, Istanbul, Turkey, {CDROM}}, pages = {98--101}, publisher = {Enformatika, {\c{C}}anakkale, Turkey}, year = {2005}, timestamp = {Fri, 15 Jul 2005 13:44:26 +0200}, biburl = {https://dblp.org/rec/conf/wec/IbrahimM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/OmarMZ04, author = {Mohd Nizam Omar and Mohd Aizaini Maarof and Anazida Zainal}, title = {Solving Time Gap Problems through the Optimization of Detecting Stepping Stone Algorithm}, booktitle = {2004 International Conference on Computer and Information Technology {(CIT} 2004), 14-16 September 2004, Wuhan, China}, pages = {391--396}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CIT.2004.1357227}, doi = {10.1109/CIT.2004.1357227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/OmarMZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaris/IqbalM04, author = {Anjum Iqbal and Mohd Aizaini Maarof}, editor = {Giuseppe Nicosia and Vincenzo Cutello and Peter J. Bentley and Jon Timmis}, title = {Towards Danger Theory Based Artificial {APC} Model: Novel Metaphor for Danger Susceptible Data Codons}, booktitle = {Artificial Immune Systems, Third International Conference, {ICARIS} 2004, Catania, Sicily, Italy, September 13-16, 2004}, series = {Lecture Notes in Computer Science}, volume = {3239}, pages = {161--174}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30220-9\_13}, doi = {10.1007/978-3-540-30220-9\_13}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icaris/IqbalM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/KrishnaM03, author = {Kanagaraj Krishna and Mohd. Aizani Bin Maarof}, title = {A Hybrid Trust Management Model for {MAS} Based Trading Society}, journal = {Int. Arab J. Inf. Technol.}, volume = {1}, number = {0}, year = {2003}, url = {http://www.iajit.org/ABSTRACTS.htm\#08}, timestamp = {Wed, 28 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/KrishnaM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cita/OmarMI03, author = {Mohd Nizam Omar and Mohd Aizaini Maarof and Subariah Ibrahim}, title = {Towards Solving Time Gap Problems through the Optimization of Packet Capture Technique}, booktitle = {3th International Conference on {IT} in Asia, {CITA} 2003, Kuching, Sarawak, Malaysia, 2003}, pages = {76--81}, year = {2003}, timestamp = {Thu, 17 Dec 2015 14:00:10 +0100}, biburl = {https://dblp.org/rec/conf/cita/OmarMI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cita/CrysdianAM03, author = {Cahyo Crysdian and Abdul Hanan Abdullah and Mohd Aizaini Maarof}, title = {Enforcing Multilevel Security Policies for Network Firewall}, booktitle = {3th International Conference on {IT} in Asia, {CITA} 2003, Kuching, Sarawak, Malaysia, 2003}, pages = {244--246}, year = {2003}, timestamp = {Thu, 17 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cita/CrysdianAM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cita/DaudMKZ03, author = {Aliza Yusny Daud and Mohd Aizaini Maarof and Norliza Katuk and Anazida Zainal}, title = {Attack on Intrusion Detection System Host: Simulation and Analysis}, booktitle = {3th International Conference on {IT} in Asia, {CITA} 2003, Kuching, Sarawak, Malaysia, 2003}, pages = {256--260}, year = {2003}, timestamp = {Thu, 17 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cita/DaudMKZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Maarof00, author = {Mohd. Aizani Bin Maarof}, title = {Integrating security services into computer supported cooperative work}, school = {Aston University, Birmingham, {UK}}, year = {2000}, url = {http://eprints.aston.ac.uk/7989/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Maarof00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webnet/DohertyM97, author = {Bernard S. Doherty and Mohd Aizaini Maarof}, editor = {Suave Lobodzinski and Ivan Tomek}, title = {Integrating Security Services Into Collaborative Systems}, booktitle = {Proceedings of WebNet 97 - World Conference on the WWW, Internet {\&} Intranet, Toronto, Canada, November 1-5, 1997}, publisher = {{AACE}}, year = {1997}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webnet/DohertyM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.