Follow
Mohd Taufik Abdullah
Title
Cited by
Cited by
Year
A review of bring your own device on security issues
M Olalere, MT Abdullah, R Mahmod, A Abdullah
Sage Open 5 (2), 2158244015580372, 2015
1332015
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
822012
A survey on privacy issues in digital forensics
A Aminnezhad, A Dehghantanha, MT Abdullah
International Journal of Cyber-Security and Digital Forensics 1 (4), 311-324, 2012
812012
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah
IEEE Access 8, 70651-70663, 2020
702020
An effective security alert mechanism for real-time phishing tweet detection on Twitter
SW Liew, NFM Sani, MT Abdullah, R Yaakob, MY Sharum
Computers & security 83, 201-207, 2019
602019
Adaptive feature selection for denial of services (DoS) attack
AR Yusof, NI Udzir, A Selamat, H Hamdan, MT Abdullah
2017 IEEE conference on application, information and network security (AINS …, 2017
592017
Analysis of evidence using formal event reconstruction
J James, P Gladyshev, MT Abdullah, Y Zhu
Digital Forensics and Cyber Crime: First International ICST Conference …, 2010
452010
Cloud forensics issues and opportunities
A Aminnezhad, A Dehghantanha, MT Abdullah, M Damshenas
International Journal of Information Processing and Management 4 (4), 76, 2013
382013
An overview of attacks against digital watermarking and their respective countermeasures
M Tanha, SDS Torshizi, MT Abdullah, F Hashim
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
382012
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
MA Bouke, A Abdullah, SH ALshatebi, MT Abdullah, H El Atigh
Microprocessors and Microsystems 98, 104823, 2023
352023
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks
M Ibrahim, MT Abdullah, A Dehghantanha
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
342012
Greening cloud-enabled big data storage forensics: Syncany as a case study
YY Teing, A Dehghantanha, KKR Choo, Z Muda, MT Abdullah
IEEE Transactions on Sustainable Computing 4 (2), 204-216, 2017
332017
A review on feature selection and ensemble techniques for intrusion detection system
M Torabi, NI Udzir, MT Abdullah, R Yaakob
International Journal of Advanced Computer Science and Applications 12 (5), 2021
302021
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
282014
Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation
W Halboob, R Mahmod, NI Udzir, MT Abdullah
Procedia Computer Science 56, 370-375, 2015
262015
Research Article A Review on Mobile Device's Digital Forensic Process Models
A Farjamfar, MT Abdullah, R Mahmod, NI Udzir
Research Journal of Applied Sciences, Engineering and Technology 8 (3), 358-366, 2014
252014
Advances in computer forensics
MT Abdullah, R Mahmod, AAA Ghani, MZ Abdullah, ABM Sultan
International Journal of Computer Science and Network Security 8 (2), 215-219, 2008
232008
Enhance Luhn algorithm for validation of credit cards numbers
KW Hussein, NFM Sani, R Mahmod, MT Abdullah
Int. J. Comput. Sci. Mob. Comput 2 (7), 262-272, 2013
222013
A survey on sybil attack detection in vehicular ad hoc networks (VANET)
ZA Abdulkader, A Abdullah, MT Abdullah, ZA Zukarnain
Journal of Computers 29 (2), 1-6, 2018
212018
Identification and evaluation of discriminative lexical features of malware URL for real-time classification
M Olalere, MT Abdullah, R Mahmod, A Abdullah
2016 International Conference on Computer and Communication Engineering …, 2016
212016
The system can't perform the operation now. Try again later.
Articles 1–20