Items where Author is "Abdollah, M. F."

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 30.

Selamat, S. R. and Sahib, S. and Hassan, N. H. and Yusof, R. and Abdollah, M. F. (2013) Forensic Traceability Index in Digital Forensic Investigation. Journal of Information Security. pp. 19-32. ISSN 2153-1234

Yusof, R. and Selamat, S. R. and Sahib, S. and Mas'ud, M. Z. and Abdollah, M. F. (2011) Enhanced Alert Correlation Framework for Heterogeneous Log. In: The International Conference on Informatics Engineering & Information Science (ICIEIS2011), Nov. 14-16, 2011, University Technology Malaysia, KL Malaysia. (In Press)

Mohd Foozy, F and Ahmad, R. and Abdollah, M. F. and Yusof, R. and Mas'ud, M. Z. (2011) Generic Taxonomy of Social Engineering Attack. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.

Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Hassan, N. H. and Zainal Abidin, Z. (2011) Traceability in Digital Forensic Investigation Process. In: ICOS 2011, IEEE CONFERENCE ON OPEN SYSTEMS, 25-28/9/2011, Langkawi Malaysia.

Abdollah, M. F. and Mas’ud, M. Z. and Sahib, S. and Yaacub, A. H. and Yusof, R. and Selamat, S. R. (2011) Host Based Detection Approach using Time Based Module for Fast Attack Detection Behavior. In: 2011 First IRAST International Conference on Data Engineering and Internet Technology, 15-17 March 2011, Bali Dynasty Resort, Bali, Indonesia.

Mas’ud, M. Z. and Abdollah, M. F. and Yaacub, A. H. and Ahmad, N. M. and Abdul Hamid, E. (2011) Virtual Machine based Autonomous Web Server. In: 2011 First IRAST International Conference on Data Engineering and Internet Technology, 15-17 March 2011, Bali Dynasty Resort, Bali, Indonesia .

Abdollah, M. F. and Rafrastara, Fauzi Adi (2011) Advanced Virus Monitoring and Analysis System. (IJCSIS) International Journal of Computer Science and Information Security, Vol 9, No.1. ISSN 1947-5500

Muslim, Z. and Abdollah, M. F. and Osman, M. F. I. and Abu, N. A. and Sahib, S. (2011) Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security, 9 (2). 010-015. ISSN 1947-5500

M., Zulkiflee and Abdollah, M. F. and Othman, M. F. I. and Abu, Nur Azman and Sahib, S. (2011) Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security. ISSN 1947-5500

Muslim, Z. and Abdollah, M. F. and Sahib, S. and Abu, N. A. (2011) Behavioral analysis on IPV4 Malware in both IPV4 and IPv6 Network Environment. (IJCSIS) International Journal of Computer Science and Information Security, Vol 9,. ISSN 1947-5500

Selamat, S. R. and Yusof, R. and Sahib, S. and Roslan, I. and Abdollah, M. F. and Mas'ud, M. Z. (2011) Adapting Traceability in Digital Forensic Investigation Process. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.

Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. and Mas'ud, M. Z. and Ramly, M. (2011) A New Malware Attack Pattern Generalization. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.

Abdullah, Raihana Syahirah and Mas'ud, M. Z. and Abdollah, M. F. and Sahib, S. and Yusof, R. (2011) Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour. International Journal of Computer Science and Information Security, 9 (12). pp. 7-11. ISSN 1947-5500

Selamat, S. R. and Yusof, R. and Sahib, S. and Hassan, N. H. and Abdollah, M. F. and Zaheera, Zainal Abidin (2011) Tracebility in Digital Forensic Investigation Process. In: IEEE Conference on Open Systems (ICOS2011), 25-28 September 2011, Langkawi.

Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. and Yaacub, A. H. (2010) Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System. In: 2010 Second International Conference on Network Applications, Protocols and Services, 22-23 September 2010, Holiday Villa Hotel, Kedah.

Selamat, S. R. and Yusof, R. and Sahib, S. and Mas'ud, Z. and Abdollah, M. F. and Zainal Abidin, Z. (2010) Advanced Trace Pattern For Computer Intrusion Discovery. Journal of Computing, 2 (6). pp. 200-2007. ISSN 2151-9617

Yusof, R. and Selamat, S. R. and Sahib, S. and Mas'ud, Z. and Abdollah, M. F. and Ramly, M. (2010) An Improved Traditional Worm Attack Pattern. International Symposium on Information Technology 2010. pp. 1067-1072. ISSN 978-1-4244-6716-7

Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Selamat, S. R. and Yusof, R. (2010) Collaborative Security Mechanism in Detecting Intrusion Activity. In: International Conference on Engineering and ICT, 18-20 February 2010, Holiday Inn, Melaka, Malaysia.

Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. and Mas'ud, M. Z. and Ramly, M. (2010) New Multi-step Worm Attack Model. Journal of Computing, 2 (1). pp. 1-7. ISSN 2151-9617

Selamat, S. R. and Yusof, R. and Sahib, S. and Mas'ud, M. Z. and Roslan, I. and Abdollah, M. F. (2010) Scenario Based Worm Trace Pattern Identification Technique. (IJCSIS) International Journal of Computer Science and Information Security, 7 (1). pp. 1-9. ISSN 1947-5500

Abdollah, M. F. and Mas'ud, M. Z. and Yusof, R. and Selamat, S. R. (2010) Statistical Approach for Validating Static Threshold in Fast Attack Detection. Journal of Advanced Manufacturing Technology, 4 (1). pp. 53-71. ISSN 1985-3157 Jan-June 2010

Abdollah, M. F. (2010) Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique. In: 2010 the International Conference on Intelligent Network and Computing (ICINC 2010), November 26 - 28, 2010, Kuala Lumpur, Malaysia.

Md Khambari, M. N. and Othman, M. F. I. and Motsidi, M. R. and Abdollah, M. F. (2009) A Novel Approach on Teaching Network Security for ICT Courses. In: International Congress on Engineering Education (ICEED) 2009, 7-8 December 2009, Kuala Lumpur.

Yusof, R. and Selamat, S. R. and Mas'ud, M. Z. and Sahib, S. and Abdollah, M. F. and Ramly, M. (2009) A New Generic Taxonomy on Hybrid Malware Detection Technique. International Journal of Computer Science and Information Security, 5 (1). pp. 56-61. ISSN 1947-5500

Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. (2009) Threshold Verification Technique for Network Intrusion Detection System. International Journal of Computer Science and Information Security, 2 (1). pp. 1-8. ISSN 1947-5500

Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. (2009) Threshold verification using Statistical Approach for Fast Attack Detection. In: International Conference on Computing and Informatics (ICOCI) 2009, 24-25 June 2009, Kuala Lumpur, Malaysia.

Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Mas'ud, Z. and Roslan, I. (2009) Tracing Technique for Blaster Attack. International Journal of Computer Science and Information Security, 4 (1). pp. 1-8. ISSN 1947-5500

Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. (2008) Alert Correlation Technique Analysis For Diverse Log. Journal of Advanced Manufacturing Technology, 2 (2). pp. 65-76. ISSN 1985-3157 July-December 2008

Abdollah, M. F. and Sahib, S. and Yaacub, A. H. and Othman, M. F. I. and Yusof, R. (2008) Feature Selection for Detecting Fast Attack in Network Intrusion Detection. Journal of Advanced Manufacturing Technology, 2 (2). pp. 39-56. ISSN 1985-3157 July-December 2008

Yusof, R. and Abdollah, M. F. and Sahib, S. (2007) Network Administration & Management. Venton Publishing, Kuala Lumpur, Malaysia. ISBN 978-983-3526-44-6

This list was generated on Mon Dec 23 13:47:38 2024 +08.