Showing
1 - 9
results of
9
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Yassin, Warusia
Search Results - Yassin, Warusia
Showing
1 - 9
results of
9
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
by
Al-Mhiqani, Mohammed Nasser
,
Ahmad, Rabiah
,
Zainal Abidin, Z.
,
Yassin, Warusia
,
Hassan, Aslinda
,
Abdulkareem, Karrar Hameed
,
Ali, Nabeel Salih
,
Yunos, Zahri
Published in
Applied sciences
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
RENTAKA: A Novel Machine Learning Framework for Crypto-Ransomware Pre-encryption Detection
by
Zakaria, Wira Z. A.
,
Abdollah, Mohd Faizal
,
Mohd, Othman
,
Yassin, S. M. Warusia Mohamed S. M. M
,
Ariffin, Aswami
Published in
International journal of advanced computer science & applications
Get full text
Article
Save to List
Saved in:
3
Loading…
Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees
by
I, Al-Shanfari
,
Yassin, Warusia
,
Tabook, Nasser
,
Ismail, Roesnita
,
Ismail, Anuar
Published in
International journal of advanced computer science & applications
Get full text
Items that cite this one
Article
Save to List
Saved in:
4
Loading…
Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems
by
Nasser, Mohammed
,
Ahmad, Rabiah
,
Yassin, Warusia
,
Hassan, Aslinda
,
Zainal, Zaheera
,
Salih, Nabeel
,
Hameed, Karrar
Published in
International journal of advanced computer science & applications
Get full text
Items that cite this one
Article
Save to List
Saved in:
5
Loading…
Clustering Analysis for Malware Behavior Detection using Registry Data
by
Rosli, Nur Adibah
,
Yassin, Warusia
,
M.A, Faizal
,
Rahayu, Siti
Published in
International journal of advanced computer science & applications
Get full text
Items that cite this one
Article
Save to List
Saved in:
6
Loading…
Constructing IoT Botnets Attack Pattern for Host-based and Network-based Platform
by
Zaki, Wan Nur Fatihah Wan Mohd
,
Abdullah, Raihana Syahirah
,
Yassin, Warusia
,
M.A, Faizal
,
Rosli, Muhammad Safwan
Published in
International journal of advanced computer science & applications
Get full text
Items that cite this one
Article
Save to List
Saved in:
7
Loading…
An Improved Malicious Behaviour Detection Via k-Means and Decision Tree
by
Yassin, Warusia
,
Rahayu, Siti
,
Abdollah, Faizal
,
Zin, Hazlin
Published in
International journal of advanced computer science & applications
Get full text
Article
Save to List
Saved in:
8
Loading…
Ransomware Behavior Attack Construction via Graph Theory Approach
by
Rosli, Muhammad Safwan
,
Syahirah, Raihana
,
Yassin, Warusia
,
M.A, Faizal
,
Nur, Wan
Published in
International journal of advanced computer science & applications
Get full text
Items that cite this one
Article
Save to List
Saved in:
9
Loading…
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing
by
Baharon, Mohd Rizuan
,
Shi, Qi
,
Abdollah, Mohd Faizal
,
Yassin, S M Warusia Mohamed S M M
,
Idris, Ariff
Published in
International journal of communication networks and information security
Get full text
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
2 results
2
Full Text
9 results
9
Format
Articles
9 results
9
Journal Title
International Journal Of Advanced Computer Science & Applications
7 results
7
International Journal Of Advanced Computer Science And Applications/International Journal Of Advanced Computer Science & Applications
7 results
7
Applied Sciences
1 results
1
International Journal Of Communication Networks And Information Security
1 results
1
Subjects
Science & Technology
8 results
8
Technology
8 results
8
Computer Science
7 results
7
Computer Science, Theory & Methods
7 results
7
Cybersecurity
7 results
7
Algorithms
4 results
4
Machine Learning
4 results
4
Malware
4 results
4
Behavior
3 results
3
Behavior Analysis
2 results
2
Cluster Analysis
2 results
2
Clustering
2 results
2
Cryptography
2 results
2
Feature Extraction
2 results
2
Motivation
2 results
2
Ransomware
2 results
2
Security
2 results
2
Taxonomy
2 results
2
Threats
2 results
2
Vector Quantization
2 results
2
Year of Publication
From:
To:
Source
Ezb Electronic Journals Library
9 results
9
Doaj Directory Of Open Access Journals
8 results
8
Publicly Available Content Database
8 results
8
Road: Directory Of Open Access Scholarly Resources
2 results
2
Freely Accessible Science Journals At Publisher Websites
1 results
1
Ingentaconnect Journals
1 results
1