default search action
Nor Badrul Anuar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j61]Nik Aqil, Faiz Zaki, Firdaus Afifi, Hazim Hanif, Miss Laiha Mat Kiah, Nor Badrul Anuar:
Improved temporal IoT device identification using robust statistical features. PeerJ Comput. Sci. 10: e2145 (2024) - 2023
- [j60]Mohamad Amar Irsyad Mohd Aminuddin, Zarul Fitri Zaaba, Azman Samsudin, Faiz Zaki, Nor Badrul Anuar:
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions. J. Netw. Comput. Appl. 212: 103582 (2023) - [j59]Mohamed M. Mostafa, Ali Feizollah, Nor Badrul Anuar:
Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics. Multim. Tools Appl. 82(8): 12423-12443 (2023) - [j58]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum:
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things. PeerJ Comput. Sci. 9: e1309 (2023) - [j57]Hamza H. M. Altarturi, Muntadher Saadoon, Nor Badrul Anuar:
Web content topic modeling using LDA and HTML tags. PeerJ Comput. Sci. 9: e1459 (2023) - 2022
- [j56]Faiz Zaki, Firdaus Afifi, Shukor Abd Razak, Abdullah Gani, Nor Badrul Anuar:
GRAIN: Granular multi-label encrypted traffic classification using classifier chain. Comput. Networks 213: 109084 (2022) - [j55]Hamza H. M. Altarturi, Nor Badrul Anuar:
Ground Truth Dataset: Objectionable Web Content. Data 7(11): 153 (2022) - [j54]Nur Nasuha Daud, Siti Hafizah Ab Hamid, Muntadher Saadoon, Chempaka Seri, Zati Hakim Azizul, Nor Badrul Anuar:
Self-Configured Framework for scalable link prediction in twitter: Towards autonomous spark framework. Knowl. Based Syst. 255: 109713 (2022) - [j53]Tapan Karnik, Palaiahnakote Shivakumara, Pinaki Nath Chowdhury, Umapada Pal, Tong Lu, Nor Badrul Anuar:
A new deep model for family and non-family photo identification. Multim. Tools Appl. 81(2): 1765-1785 (2022) - [j52]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum:
A systematic review of routing attacks detection in wireless sensor networks. PeerJ Comput. Sci. 8: e1135 (2022) - [j51]Wael F. Elsersy, Ali Feizollah, Nor Badrul Anuar:
The rise of obfuscated Android malware and impacts on detection methods. PeerJ Comput. Sci. 8: e907 (2022) - [i5]Nur Nasuha Daud, Siti Hafizah Ab Hamid, Chempaka Seri, Muntadher Saadoon, Nor Badrul Anuar:
Scalable link prediction in Twitter using self-configured framework. CoRR abs/2208.09798 (2022) - 2021
- [j50]Faiz Zaki, Abdullah Gani, Hamid Tahaei, Steven Furnell, Nor Badrul Anuar:
Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic. Comput. Networks 184: 107617 (2021) - [j49]Hazim Hanif, Mohd Hairul Nizam Bin Md Nasir, Mohd Faizal Ab Razak, Ahmad Firdaus, Nor Badrul Anuar:
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches. J. Netw. Comput. Appl. 179: 103009 (2021) - [j48]Amin Khaksar Pour, Woo Chaw Seng, Shivakumara Palaiahnakote, Hamid Tahaei, Nor Badrul Anuar:
A survey on video content rating: taxonomy, challenges and open issues. Multim. Tools Appl. 80(16): 24121-24145 (2021) - 2020
- [j47]Fairuz Amalina, Ibrahim Abaker Targio Hashem, Zati Hakim Azizul, Tan Fong Ang, Ahmad Firdaus, Muhammad Imran, Nor Badrul Anuar:
Blending Big Data Analytics: Review on Challenges and a Recent Study. IEEE Access 8: 3629-3645 (2020) - [j46]Ali Hussain, Miss Laiha Mat Kiah, Nor Badrul Anuar, Rafidah Md Noor, Muneer Ahmad:
Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey. J. Medical Imaging Health Informatics 10(10): 2404-2420 (2020) - [j45]Hamid Tahaei, Firdaus Afifi, Adeleh Asemi, Faiz Zaki, Nor Badrul Anuar:
The rise of traffic classification in IoT networks: A survey. J. Netw. Comput. Appl. 154: 102538 (2020) - [j44]Nur Nasuha Daud, Siti Hafizah Ab Hamid, Muntadher Saadoon, Firdaus Sahran, Nor Badrul Anuar:
Applications of link prediction in social networks: A review. J. Netw. Comput. Appl. 166: 102716 (2020) - [j43]Ibrahim Abaker Targio Hashem, Nor Badrul Anuar, Mohsen Marjani, Ejaz Ahmed, Haruna Chiroma, Ahmad Firdaus, Muhamad Taufik Abdullah, Faiz Alotaibi, Waleed Kamaleldin Mahmoud Ali, Ibrar Yaqoob, Abdullah Gani:
MapReduce scheduling algorithms: a review. J. Supercomput. 76(7): 4915-4945 (2020) - [c7]Lokesh Nandanwar, Palaiahnakote Shivakumara, Ramachandra Raghavendra, Tong Lu, Umapada Pal, Daniel Lopresti, Nor Badrul Anuar:
Local Gradient Difference Features for Classification of 2D-3D Natural Scene Text Images. ICPR 2020: 1112-1119
2010 – 2019
- 2019
- [j42]Ali Feizollah, Sulaiman Ainin, Nor Badrul Anuar, Nor Aniza Abdullah, Mohamad Hazim:
Halal Products on Twitter: Data Extraction and Sentiment Analysis Using Stack of Deep Learning Algorithms. IEEE Access 7: 83354-83362 (2019) - [j41]Nor Aniza Abdullah, Ali Feizollah, Ainin Sulaiman, Nor Badrul Anuar:
Challenges and Recommended Solutions in Multi-Source and Multi-Domain Sentiment Analysis. IEEE Access 7: 144957-144971 (2019) - [j40]Kayode Sakariyah Adewole, Nor Badrul Anuar, Amirrudin Kamsin, Arun Kumar Sangaiah:
SMSAD: a framework for spam message and spam account detection. Multim. Tools Appl. 78(4): 3925-3960 (2019) - [j39]Ahmad Firdaus, Mohd Faizal Ab Razak, Ali Feizollah, Ibrahim Abaker Targio Hashem, Mohamad Hazim, Nor Badrul Anuar:
The rise of "blockchain": bibliometric analysis of blockchain study. Scientometrics 120(3): 1289-1331 (2019) - [i4]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Safeeullah Soomro, Mohammad Riyaz Belgaum:
Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics. CoRR abs/1904.09268 (2019) - 2018
- [j38]Hamid Tahaei, Rosli Bin Salleh, Mohd Faizal Ab Razak, Kwangman Ko, Nor Badrul Anuar:
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario. IEEE Access 6: 5182-5198 (2018) - [j37]Ahmad Firdaus, Nor Badrul Anuar, Mohd Faizal Ab Razak, Ibrahim Abaker Targio Hashem, Syafiq Bachok, Arun Kumar Sangaiah:
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management. J. Medical Syst. 42(6): 112:1-112:23 (2018) - [j36]Ahmad Firdaus, Nor Badrul Anuar, Ahmad Karim, Mohd Faizal Ab Razak:
Discovering optimal features using static analysis and a genetic search based method for Android malware detection. Frontiers Inf. Technol. Electron. Eng. 19(6): 712-736 (2018) - [j35]Ibrahim Abaker Targio Hashem, Nor Badrul Anuar, Mohsen Marjani, Abdullah Gani, Arun Kumar Sangaiah, Kayode Sakariyah Adewole:
Multi-objective scheduling of MapReduce jobs in big data processing. Multim. Tools Appl. 77(8): 9979-9994 (2018) - [j34]Ahmad Firdaus, Nor Badrul Anuar, Mohd Faizal Ab Razak, Arun Kumar Sangaiah:
Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics. Multim. Tools Appl. 77(14): 17519-17555 (2018) - [i3]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Safeeullah Soomro, Mohammad Riyaz Belgaum, Mahdi H. Miraz, Jawdat Alshaer:
Challenges of Internet of Things and Big Data Integration. CoRR abs/1806.08953 (2018) - [i2]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum, Jawdat Alshaer, Safeeullah Soomro, Mahdi H. Miraz:
Internet of Things: Infrastructure, Architecture, Security and Privacy. CoRR abs/1807.04087 (2018) - 2017
- [j33]Elham Babaee, Nor Badrul Anuar, Ainuddin Wahid Abdul Wahab, Shahaboddin Shamshirband, Anthony T. Chronopoulos:
An Overview of Audio Event Detection Methods from Feature Extraction to Classification. Appl. Artif. Intell. 31(9-10): 661-714 (2017) - [j32]Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Guillermo Suarez-Tangil, Steven Furnell:
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Comput. Secur. 65: 121-134 (2017) - [j31]Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro:
The Evolution of Android Malware and Android Analysis Techniques. ACM Comput. Surv. 49(4): 76:1-76:41 (2017) - [j30]Muhammad Faiz, Nor Badrul Anuar, Ainuddin Wahid Abdul Wahab, Shahaboddin Shamshirband, Anthony T. Chronopoulos:
Source camera identification: a distributed computing approach using Hadoop. J. Cloud Comput. 6: 18 (2017) - [j29]Kayode Sakariyah Adewole, Nor Badrul Anuar, Amirrudin Kamsin, Kasturi Dewi Varathan, Syed Abdul Razak:
Malicious accounts: Dark of the social networks. J. Netw. Comput. Appl. 79: 41-67 (2017) - [j28]Shahid Anwar, Zakira Inayat, Mohamed Fadli Bin Zolkipli, Jasni Mohamad Zain, Abdullah Gani, Nor Badrul Anuar, Muhammad Khurram Khan, Victor Chang:
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey. J. Netw. Comput. Appl. 93: 259-279 (2017) - 2016
- [j27]Ibrahim Abaker Targio Hashem, Victor Chang, Nor Badrul Anuar, Kayode Sakariyah Adewole, Ibrar Yaqoob, Abdullah Gani, Ejaz Ahmed, Haruna Chiroma:
The role of big data in smart city. Int. J. Inf. Manag. 36(5): 748-758 (2016) - [j26]Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Abdullah Gani, Salimah Mokhtar, Ejaz Ahmed, Nor Badrul Anuar, Athanasios V. Vasilakos:
Big data: From beginning to future. Int. J. Inf. Manag. 36(6): 1231-1247 (2016) - [j25]Adnan Akhunzada, Abdullah Gani, Nor Badrul Anuar, Ahmed Abdelaziz, Muhammad Khurram Khan, Amir Hayat, Samee U. Khan:
Secure and dependable software defined networks. J. Netw. Comput. Appl. 61: 199-221 (2016) - [j24]Zakira Inayat, Abdullah Gani, Nor Badrul Anuar, Muhammad Khurram Khan, Shahid Anwar:
Intrusion response systems: Foundations, design, and challenges. J. Netw. Comput. Appl. 62: 53-74 (2016) - [j23]Mohd Faizal Ab Razak, Nor Badrul Anuar, Rosli Salleh, Ahmad Firdaus:
The rise of "malware": Bibliometric analysis of malware study. J. Netw. Comput. Appl. 75: 58-76 (2016) - [j22]Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, Miss Laiha Mat Kiah, Nor Badrul Anuar, Mohamed Abdulnabi:
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive Mob. Comput. 25: 1-25 (2016) - [j21]Ibrahim Abaker Targio Hashem, Nor Badrul Anuar, Abdullah Gani, Ibrar Yaqoob, Feng Xia, Samee Ullah Khan:
MapReduce: Review and open challenges. Scientometrics 109(1): 389-422 (2016) - [j20]Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab, Suleman Khan:
Service delivery models of cloud computing: security issues and open challenges. Secur. Commun. Networks 9(17): 4726-4750 (2016) - [j19]Fairuz Amalina Narudin, Ali Feizollah, Nor Badrul Anuar, Abdullah Gani:
Evaluation of machine learning classifiers for mobile malware detection. Soft Comput. 20(1): 343-357 (2016) - 2015
- [j18]Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, Miss Laiha Mat Kiah, Nor Badrul Anuar, Mohamed Abdulnabi:
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations. Comput. Methods Programs Biomed. 122(3): 393-408 (2015) - [j17]Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Ainuddin Wahid Abdul Wahab:
A review on feature selection in mobile malware detection. Digit. Investig. 13: 22-37 (2015) - [j16]Ibrahim Abaker Targio Hashem, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar, Abdullah Gani, Samee Ullah Khan:
The rise of "big data" on cloud computing: Review and open research issues. Inf. Syst. 47: 98-115 (2015) - [j15]Shahaboddin Shamshirband, Babak Daghighi, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham:
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network. J. Intell. Fuzzy Syst. 28(3): 1345-1357 (2015) - [j14]Adnan Akhunzada, Mehdi Sookhak, Nor Badrul Anuar, Abdullah Gani, Ejaz Ahmed, Muhammad Shiraz, Steven Furnell, Amir Hayat, Muhammad Khurram Khan:
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. J. Netw. Comput. Appl. 48: 44-57 (2015) - [c6]Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Nor Badrul Anuar, Rosli Salleh, Rafidah Md Noor:
Pixel value differencing steganography techniques: Analysis and open challenge. ICCE-TW 2015: 21-22 - 2014
- [j13]Dalibor Petkovic, Shahaboddin Shamshirband, Javed Iqbal, Nor Badrul Anuar, Nenad D. Pavlovic, Miss Laiha Mat Kiah:
Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper. Appl. Soft Comput. 22: 424-431 (2014) - [j12]Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ajith Abraham:
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Intell. 32: 228-241 (2014) - [j11]Mohammad Reza Jabbarpour, Ali Jalooli, Erfan Shaghaghi, Rafidah Md Noor, Léon J. M. Rothkrantz, Rashid Hafeez Khokhar, Nor Badrul Anuar:
Ant-based vehicle congestion avoidance system using vehicular networks. Eng. Appl. Artif. Intell. 36: 303-319 (2014) - [j10]Mehdi Jahanirad, Ainuddin Wahid Abdul Wahab, Nor Badrul Anuar, Mohd Yamani Idna Bin Idris, Mohamad Nizam Ayub:
Blind source mobile device identification based on recorded call. Eng. Appl. Artif. Intell. 36: 320-331 (2014) - [j9]Mohammad Reza Jabbarpour, Hossein Malakooti, Rafidah Md Noor, Nor Badrul Anuar, Norazlina Khamis:
Ant colony optimisation for vehicle traffic systems: applications and challenges. Int. J. Bio Inspired Comput. 6(1): 32-56 (2014) - [j8]Afshin Jahangirzadeh, Shahaboddin Shamshirband, Saeed Aghabozorgi, Shatirah Akib, Hossein Basser, Nor Badrul Anuar, Miss Laiha Mat Kiah:
A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier. Neurocomputing 140: 172-184 (2014) - [j7]Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah, Al-Sakib Khan Pathan:
Routing protocol design for secure WSN: Review and open research issues. J. Netw. Comput. Appl. 41: 517-530 (2014) - [j6]Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovic, Sanjay Misra, Abdul Nasir Khan:
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Netw. Comput. Appl. 42: 102-117 (2014) - [j5]Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar:
Botnet detection techniques: review, future trends, and issues. J. Zhejiang Univ. Sci. C 15(11): 943-983 (2014) - [j4]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A response selection model for intrusion response systems: Response Strategy Model (RSM). Secur. Commun. Networks 7(11): 1831-1848 (2014) - [c5]Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Fairuz Amalina:
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. ISBAST 2014: 193-197 - 2013
- [j3]Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel:
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng. Appl. Artif. Intell. 26(9): 2105-2127 (2013) - [j2]Dalibor Petkovic, Nenad D. Pavlovic, Shahaboddin Shamshirband, Nor Badrul Anuar:
Development of a new type of passively adaptive compliant gripper. Ind. Robot 40(6): 610-623 (2013) - [j1]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Secur. Commun. Networks 6(9): 1087-1116 (2013) - [c4]Ali Feizollah, Shahaboddin Shamshirband, Nor Badrul Anuar, Rosli Salleh, Miss Laiha Mat Kiah:
Anomaly Detection Using Cooperative Fuzzy Logic Controller. FIRA 2013: 220-231 - [i1]A. N. Zainab, K. W. U. Anyi, Nor Badrul Anuar:
A Single Journal Study : Malaysian Journal of Computer Science. CoRR abs/1301.5375 (2013) - 2012
- [c3]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A Response Strategy Model for Intrusion Response Systems. SEC 2012: 573-578 - 2010
- [c2]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
An investigation and survey of response options for Intrusion Response Systems (IRSs). ISSA 2010
2000 – 2009
- 2003
- [c1]A. N. Zainab, Abdullah Abrizah, Nor Badrul Anuar:
Inculcating ICT Skills through a Collaborative Digital Library Initiative for Educational Use. ICADL 2003: 489-492
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint