Mohd Aizaini Maarof
Mohd Aizaini Maarof
Professor of Information Security, Universiti Teknologi Malaysia (UTM)- Research ID: L-4331-2013
E-mail confirmado em utm.my
Título
Citado por
Citado por
Ano
Fraud detection system: A survey
A Abdallah, MA Maarof, A Zainal
Journal of Network and Computer Applications 68, 90-113, 2016
1892016
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
BAS Al-rimy, MA Maarof, SZM Shaid
Computers & Security 74, 144-166, 2018
892018
Malware detection based on hybrid signature behaviour application programming interface call graph
AAE Elhadi, MA Maarof, AH Osman
American Journal of Applied Sciences 9 (3), 283, 2012
832012
Ensemble classifiers for network intrusion detection system
A Zainal, MA Maarof, SM Shamsuddin
Journal of Information Assurance and Security 4 (3), 217-225, 2009
812009
Feature selection using Rough-DPSO in anomaly intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
International Conference on Computational Science and Its Applications, 512-524, 2007
622007
Improving the detection of malware behaviour using simplified data dependent api call graph
AAE Elhadi, MA Maarof, B Barry
International Journal of Security and Its Applications 7 (5), 29-42, 2013
602013
A survey of intrusion detection schemes in wireless sensor networks
MA Rassam, MA Maarof, A Zainal
American Journal of Applied Sciences 9 (10), 1636, 2012
592012
Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues
MA Rassam, A Zainal, MA Maarof
Sensors 13 (8), 10087-10122, 2013
572013
Feature selection using rough set in intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006
522006
Shelf-life evaluation of bilayered human skin equivalent, MyDerm™
WT Seet, M Maarof, KK Anuar, KH Chua, AWA Irfan, MH Ng, ...
PloS one 7 (8), e40978, 2012
462012
Malware behavior image for malware variant identification
SZM Shaid, MA Maarof
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
432014
Enhancing the detection of metamorphic malware using call graphs
AAE Elhadi, MA Maarof, BIA Barry, H Hamza
computers & security 46, 62-78, 2014
402014
Adaptive and online data anomaly detection for wireless sensor systems
MA Rassam, MA Maarof, A Zainal
Knowledge-Based Systems 60, 44-57, 2014
382014
Intelligent alert clustering model for network intrusion analysis
MM Siraj, MA Maarof, SZM Hashim
Int. J. Advance. Soft Comput. Appl 1 (1), 1-16, 2009
342009
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications
MA Rassam, A Zainal, MA Maarof
Applied Soft Computing 13 (4), 1978-1996, 2013
322013
Ensemble of one-class classifiers for network intrusion detection system
A Zainal, MA Maarof, SM Shamsuddin, A Abraham
2008 The Fourth International Conference on Information Assurance and …, 2008
312008
Efficient image duplicated region detection model using sequential block clustering
MA Sekeh, MA Maarof, MF Rohani, B Mahdian
Digital Investigation 10 (1), 73-84, 2013
262013
A modified image encryption scheme based on 2D chaotic map
R Kadir, R Shahril, MA Maarof
International Conference on Computer and Communication Engineering (ICCCE'10 …, 2010
252010
Towards danger theory based artificial APC model: Novel metaphor for danger susceptible data codons
A Iqbal, MA Maarof
International Conference on Artificial Immune Systems, 161-174, 2004
252004
A sinkhole attack detection scheme in mintroute wireless sensor networks
MA Rassam, A Zainal, MA Maarof, M Al-Shaboti
2012 International Symposium on Telecommunication Technologies, 71-75, 2012
242012
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20