Showing
1 - 3
results of
3
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Yassin, S M Warusia Mohamed S M M
Search Results - Yassin, S M Warusia Mohamed S M M
Showing
1 - 3
results of
3
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
RENTAKA: A Novel Machine Learning Framework for Crypto-Ransomware Pre-encryption Detection
by
Zakaria, Wira Z. A.
,
Abdollah, Mohd Faizal
,
Mohd, Othman
,
Yassin, S. M. Warusia Mohamed S. M. M
,
Ariffin, Aswami
Published in
International journal of advanced computer science & applications
Get full text
Article
Save to List
Saved in:
2
Loading…
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing
by
Baharon, Mohd Rizuan
,
Shi, Qi
,
Abdollah, Mohd Faizal
,
Yassin, S M Warusia Mohamed S M M
,
Idris, Ariff
Published in
International journal of communication networks and information security
Get full text
Article
Save to List
Saved in:
3
Loading…
Clustering Analysis for Malware Behavior Detection using Registry Data
by
Rosli, Nur Adibah
,
Yassin, Warusia
,
M.A, Faizal
,
Rahayu, Siti
Published in
International journal of advanced computer science & applications
Get full text
Items that cite this one
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
1 results
1
Full Text
3 results
3
Format
Articles
3 results
3
Journal Title
International Journal Of Advanced Computer Science & Applications
2 results
2
International Journal Of Advanced Computer Science And Applications/International Journal Of Advanced Computer Science & Applications
2 results
2
International Journal Of Communication Networks And Information Security
1 results
1
Subjects
Algorithms
3 results
3
Cybersecurity
3 results
3
Computer Science
2 results
2
Computer Science, Theory & Methods
2 results
2
Cryptography
2 results
2
Feature Extraction
2 results
2
Machine Learning
2 results
2
Malware
2 results
2
Science & Technology
2 results
2
Technology
2 results
2
Asymmetric Encryption Scheme
1 results
1
Behavior Analysis
1 results
1
Cloud Computing
1 results
1
Cluster Analysis
1 results
1
Clustering
1 results
1
Crypto-Ransomware
1 results
1
Damage
1 results
1
Data Encryption
1 results
1
Data Registry
1 results
1
Digital Currencies
1 results
1
Year of Publication
From:
To:
Source
Free E-Journal (出版社公開部分のみ)
3 results
3
Doaj Directory Of Open Access Journals
2 results
2
Publicly Available Content (Proquest)
2 results
2
Freely Accessible Journals
1 results
1
Road: Directory Of Open Access Scholarly Resources
1 results
1