A review of bring your own device on security issues M Olalere, MT Abdullah, R Mahmod, A Abdullah Sage Open 5 (2), 2158244015580372, 2015 | 133 | 2015 |
A cloud-based intrusion detection service framework W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 82 | 2012 |
A survey on privacy issues in digital forensics A Aminnezhad, A Dehghantanha, MT Abdullah International Journal of Cyber-Security and Digital Forensics 1 (4), 311-324, 2012 | 81 | 2012 |
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah IEEE Access 8, 70651-70663, 2020 | 70 | 2020 |
An effective security alert mechanism for real-time phishing tweet detection on Twitter SW Liew, NFM Sani, MT Abdullah, R Yaakob, MY Sharum Computers & security 83, 201-207, 2019 | 60 | 2019 |
Adaptive feature selection for denial of services (DoS) attack AR Yusof, NI Udzir, A Selamat, H Hamdan, MT Abdullah 2017 IEEE conference on application, information and network security (AINS …, 2017 | 59 | 2017 |
Analysis of evidence using formal event reconstruction J James, P Gladyshev, MT Abdullah, Y Zhu Digital Forensics and Cyber Crime: First International ICST Conference …, 2010 | 45 | 2010 |
Cloud forensics issues and opportunities A Aminnezhad, A Dehghantanha, MT Abdullah, M Damshenas International Journal of Information Processing and Management 4 (4), 76, 2013 | 38 | 2013 |
An overview of attacks against digital watermarking and their respective countermeasures M Tanha, SDS Torshizi, MT Abdullah, F Hashim Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 38 | 2012 |
An intelligent DDoS attack detection tree-based model using Gini index feature selection method MA Bouke, A Abdullah, SH ALshatebi, MT Abdullah, H El Atigh Microprocessors and Microsystems 98, 104823, 2023 | 35 | 2023 |
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks M Ibrahim, MT Abdullah, A Dehghantanha Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 34 | 2012 |
Greening cloud-enabled big data storage forensics: Syncany as a case study YY Teing, A Dehghantanha, KKR Choo, Z Muda, MT Abdullah IEEE Transactions on Sustainable Computing 4 (2), 204-216, 2017 | 33 | 2017 |
A review on feature selection and ensemble techniques for intrusion detection system M Torabi, NI Udzir, MT Abdullah, R Yaakob International Journal of Advanced Computer Science and Applications 12 (5), 2021 | 30 | 2021 |
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda 2014 International symposium on biometrics and security technologies (ISBAST …, 2014 | 28 | 2014 |
Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation W Halboob, R Mahmod, NI Udzir, MT Abdullah Procedia Computer Science 56, 370-375, 2015 | 26 | 2015 |
Research Article A Review on Mobile Device's Digital Forensic Process Models A Farjamfar, MT Abdullah, R Mahmod, NI Udzir Research Journal of Applied Sciences, Engineering and Technology 8 (3), 358-366, 2014 | 25 | 2014 |
Advances in computer forensics MT Abdullah, R Mahmod, AAA Ghani, MZ Abdullah, ABM Sultan International Journal of Computer Science and Network Security 8 (2), 215-219, 2008 | 23 | 2008 |
Enhance Luhn algorithm for validation of credit cards numbers KW Hussein, NFM Sani, R Mahmod, MT Abdullah Int. J. Comput. Sci. Mob. Comput 2 (7), 262-272, 2013 | 22 | 2013 |
A survey on sybil attack detection in vehicular ad hoc networks (VANET) ZA Abdulkader, A Abdullah, MT Abdullah, ZA Zukarnain Journal of Computers 29 (2), 1-6, 2018 | 21 | 2018 |
Identification and evaluation of discriminative lexical features of malware URL for real-time classification M Olalere, MT Abdullah, R Mahmod, A Abdullah 2016 International Conference on Computer and Communication Engineering …, 2016 | 21 | 2016 |