Browse By Repository:

 
 
 
   

Items where Author is "Abdollah, M. F."

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 36.

Article

Selamat, S. R. and Sahib, S. and Hassan, N. H. and Yusof, R. and Abdollah, M. F. (2013) Forensic Traceability Index in Digital Forensic Investigation. Journal of Information Security. pp. 19-32. ISSN 2153-1234

Nazrulazhar , Bahaman and Abdollah, M. F. and Mas'ud, M. Z. and Anton Satria, Prabuwono (2012) Effectiveness of Security Tools to Anomalies on Tunneled Traffic. Information Technology Journal. pp. 191-199. ISSN 1812-5638

Abdollah, M. F. and Rafrastara, Fauzi Adi (2011) Advanced Virus Monitoring and Analysis System. (IJCSIS) International Journal of Computer Science and Information Security, Vol 9, No.1. ISSN 1947-5500

Muslim, Z. and Abdollah, M. F. and Osman, M. F. I. and Abu, N. A. and Sahib, S. (2011) Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security, 9 (2). 010-015. ISSN 1947-5500

M., Zulkiflee and Abdollah, M. F. and Othman, M. F. I. and Abu, Nur Azman and Sahib, S. (2011) Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security. ISSN 1947-5500

Muslim, Z. and Abdollah, M. F. and Sahib, S. and Abu, N. A. (2011) Behavioral analysis on IPV4 Malware in both IPV4 and IPv6 Network Environment. (IJCSIS) International Journal of Computer Science and Information Security, Vol 9,. ISSN 1947-5500

Abdullah, Raihana Syahirah and Mas'ud, M. Z. and Abdollah, M. F. and Sahib, S. and Yusof, R. (2011) Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour. International Journal of Computer Science and Information Security, 9 (12). pp. 7-11. ISSN 1947-5500

Selamat, S. R. and Yusof, R. and Sahib, S. and Mas'ud, Z. and Abdollah, M. F. and Zainal Abidin, Z. (2010) Advanced Trace Pattern For Computer Intrusion Discovery. Journal of Computing, 2 (6). pp. 200-2007. ISSN 2151-9617

Yusof, R. and Selamat, S. R. and Sahib, S. and Mas'ud, Z. and Abdollah, M. F. and Ramly, M. (2010) An Improved Traditional Worm Attack Pattern. International Symposium on Information Technology 2010. pp. 1067-1072. ISSN 978-1-4244-6716-7

Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. and Mas'ud, M. Z. and Ramly, M. (2010) New Multi-step Worm Attack Model. Journal of Computing, 2 (1). pp. 1-7. ISSN 2151-9617

Selamat, S. R. and Yusof, R. and Sahib, S. and Mas'ud, M. Z. and Roslan, I. and Abdollah, M. F. (2010) SCENARIO BASED WORM TRACE PATTERN IDENTIFICATION TECHNIQUE. (IJCSIS) International Journal of Computer Science and Information Security, 7 (1). pp. 1-9. ISSN 1947-5500

Abdollah, M. F. and Mas'ud, M. Z. and Yusof, R. and Selamat, S. R. (2010) Statistical Approach for Validating Static Threshold in Fast Attack Detection. Journal of Advanced Manufacturing Technology, 4 (1). pp. 53-71. ISSN 1985-3157 Jan-June 2010

Abdollah, M. F. and Mas'ud, M. Z. and Mat Ariff, N. A. and Erman, Hamid and bahaman, Nazrulazhar (2010) Establishment of IPv6 Network on Intranet Environment. International Journal of Network and Mobile Technologies (IJNMT. pp. 67-73. ISSN 1832-6758

Yusof, R. and Selamat, S. R. and Mas'ud, M. Z. and Sahib, S. and Abdollah, M. F. and Ramly, M. (2009) A New Generic Taxonomy on Hybrid Malware Detection Technique. International Journal of Computer Science and Information Security, 5 (1). pp. 56-61. ISSN 1947-5500

Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. (2009) Threshold Verification Technique for Network Intrusion Detection System. International Journal of Computer Science and Information Security, 2 (1). pp. 1-8. ISSN 1947-5500

Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Mas'ud, Z. and Roslan, I. (2009) Tracing Technique for Blaster Attack. International Journal of Computer Science and Information Security, 4 (1). pp. 1-8. ISSN 1947-5500

Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. (2008) ALERT CORRELATION TECHNIQUE ANALYSIS FOR DIVERSE LOG. Journal of Advanced Manufacturing Technology, 2 (2). pp. 65-76. ISSN 1985-3157 July-December 2008

Abdollah, M. F. and Sahib, S. and Yaacub, A. H. and Othman, M. F. I. and Yusof, R. (2008) Feature Selection for Detecting Fast Attack in Network Intrusion Detection. Journal of Advanced Manufacturing Technology, 2 (2). pp. 39-56. ISSN 1985-3157 July-December 2008

Conference or Workshop Item

Yusof, R. and Selamat, S. R. and Sahib, S. and Mas'ud, M. Z. and Abdollah, M. F. (2011) Enhanced Alert Correlation Framework for Heterogeneous Log. In: The International Conference on Informatics Engineering & Information Science (ICIEIS2011), Nov. 14-16, 2011, University Technology Malaysia, KL Malaysia. (In Press)

Mohd Foozy, F and Ahmad, R. and Abdollah, M. F. and Yusof, R. and Mas'ud, M. Z. (2011) Generic Taxonomy of Social Engineering Attack. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.

Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Hassan, N. H. and Zainal Abidin, Z. (2011) Traceability in Digital Forensic Investigation Process. In: ICOS 2011, IEEE CONFERENCE ON OPEN SYSTEMS, 25-28/9/2011, Langkawi Malaysia.

Abdollah, M. F. and Mas’ud, M. Z. and Sahib, S. and Yaacub, A. H. and Yusof, R. and Selamat, S. R. (2011) Host Based Detection Approach using Time Based Module for Fast Attack Detection Behavior. In: 2011 First IRAST International Conference on Data Engineering and Internet Technology, 15-17 March 2011, Bali Dynasty Resort, Bali, Indonesia.

Mas’ud, M. Z. and Abdollah, M. F. and Yaacub, A. H. and Ahmad, N. M. and Abdul Hamid, E. (2011) Virtual Machine based Autonomous Web Server. In: 2011 First IRAST International Conference on Data Engineering and Internet Technology, 15-17 March 2011, Bali Dynasty Resort, Bali, Indonesia .

Selamat, S. R. and Yusof, R. and Sahib, S. and Roslan, I. and Abdollah, M. F. and Mas'ud, M. Z. (2011) Adapting Traceability in Digital Forensic Investigation Process. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.

Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. and Mas'ud, M. Z. and Ramly, M. (2011) A New Malware Attack Pattern Generalization. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.

Selamat, S. R. and Yusof, R. and Sahib, S. and Hassan, N. H. and Abdollah, M. F. and Zaheera, Zainal Abidin (2011) Tracebility in Digital Forensic Investigation Process. In: IEEE Conference on Open Systems (ICOS2011), 25-28 September 2011, Langkawi.

Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. and Yaacub, A. H. (2010) Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System. In: 2010 Second International Conference on Network Applications, Protocols and Services, 22-23 September 2010, Holiday Villa Hotel, Kedah.

Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Selamat, S. R. and Yusof, R. (2010) Collaborative Security Mechanism in Detecting Intrusion Activity. In: International Conference on Engineering and ICT, 18-20 February 2010, Holiday Inn, Melaka, Malaysia.

Abdollah, M. F. (2010) Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique. In: 2010 the International Conference on Intelligent Network and Computing (ICINC 2010), November 26 - 28, 2010, Kuala Lumpur, Malaysia.

Erman, Hamid and Mas'ud, M. Z. and Mat Ariff, N. A. and Abdollah, M. F. and Nazrulazhar , Bahaman (2010) The Significance of IPv6 Research Lab Activity in Enhancing Teaching and Learning of IPv6 Deployment. In: The 3rd Regional Conference on Engineering Education, 7-9 JUne 2010, Kuching.

Mas'ud, M. Z. and Erman, Hamid and Nor Azman, Mat Ariff and Abdollah, M. F. and Selamat, S. R. (2010) Virtualization Technology in Teaching Information Technology Security. In: The 3rd Regional Conference on Engineering Education (RCEE 2010) and Research in Higher Education 2010 , 7 - 9 June 2010, Kuching Sarawak.

Md Khambari, M. N. and Othman, M. F. I. and Motsidi, M. R. and Abdollah, M. F. (2009) A Novel Approach on Teaching Network Security for ICT Courses. In: International Congress on Engineering Education (ICEED) 2009, 7-8 December 2009, Kuala Lumpur.

Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. (2009) Threshold verification using Statistical Approach for Fast Attack Detection. In: International Conference on Computing and Informatics (ICOCI) 2009, 24-25 June 2009, Kuala Lumpur, Malaysia.

Book

Yusof, R. and Abdollah, M. F. and Sahib, S. (2007) Network Administration & Management. Venton Publishing, Kuala Lumpur, Malaysia. ISBN 978-983-3526-44-6

Selamat, S. R. and Yusof, R. and Abdollah, M. F. and Bahaman, N. (2006) BITS 3423-Information Technology Security. Jawatankuasa Penerbitan FTMK, Malaysia.

Selamat, S. R. and Yusof, R. and Abdollah, M. F. and Bahaman, N. (2006) Information Technology Security. Pearson-Prentice Hall, Kuala Lumpur, Malaysia. ISBN 978-983-3655-47-2

This list was generated on Wed Jul 18 15:23:31 2018 MYT.