Items where Author is "Sahib, S."
Up a level |
Article
Selamat, S. R. and Sahib, S. and Hassan, N. H. and Yusof, R. and Abdollah, M. F. (2013) Forensic Traceability Index in Digital Forensic Investigation. Journal of Information Security. pp. 19-32. ISSN 2153-1234
Nahar, H. and Muslim, Z. and Shibghatullah, A. S. and Sahib, S. (2011) Congestive Loss in Wireless Ad hoc Network: Network Performance Analysis. World of Computer Science and Information Technology Journal (WCSIT), 1 (No. 6). pp. 269-273. ISSN 2221-0741
Nahar, H. and Muslim, Z. and Shibghatullah, A. S. and Sahib, S. (2011) Analysis on Differential Router Buffer Size towards Network Congestion: A Simulation-based. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 9 (No. 5). pp. 1-5. ISSN 1947-5500
Muslim, Z. and Abdollah, M. F. and Osman, M. F. I. and Abu, N. A. and Sahib, S. (2011) Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security, 9 (2). 010-015. ISSN 1947-5500
M., Zulkiflee and M.A, Faizal and I.O, Mohd Fairuz and Abu, N. A. and Sahib, S. (2011) Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security, 9 (2). ISSN 1947-5500
M., Zulkiflee and Abdollah, M. F. and Othman, M. F. I. and Abu, Nur Azman and Sahib, S. (2011) Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security. ISSN 1947-5500
Muslim, Z. and Abdollah, M. F. and Sahib, S. and Abu, N. A. (2011) Behavioral analysis on IPV4 Malware in both IPV4 and IPv6 Network Environment. (IJCSIS) International Journal of Computer Science and Information Security, Vol 9,. ISSN 1947-5500
Abdullah, Raihana Syahirah and Mas'ud, M. Z. and Abdollah, M. F. and Sahib, S. and Yusof, R. (2011) Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour. International Journal of Computer Science and Information Security, 9 (12). pp. 7-11. ISSN 1947-5500
Hassan, N. H. and Selamat, S. R. and Sahib, S. and Hussin, B. (2011) Towards Incorporation of Software Security Testing Framework in Software Development. Communications in Computer and Information Science : Software Engineering and Computer System , 179 (1). pp. 16-30. ISSN 1865-0929
Selamat, S. R. and Yusof, R. and Sahib, S. and Mas'ud, Z. and Abdollah, M. F. and Zainal Abidin, Z. (2010) Advanced Trace Pattern For Computer Intrusion Discovery. Journal of Computing, 2 (6). pp. 200-2007. ISSN 2151-9617
Yusof, R. and Selamat, S. R. and Sahib, S. and Mas'ud, Z. and Abdollah, M. F. and Ramly, M. (2010) An Improved Traditional Worm Attack Pattern. International Symposium on Information Technology 2010. pp. 1067-1072. ISSN 978-1-4244-6716-7
Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. and Mas'ud, M. Z. and Ramly, M. (2010) New Multi-step Worm Attack Model. Journal of Computing, 2 (1). pp. 1-7. ISSN 2151-9617
Selamat, S. R. and Yusof, R. and Sahib, S. and Mas'ud, M. Z. and Roslan, I. and Abdollah, M. F. (2010) Scenario Based Worm Trace Pattern Identification Technique. (IJCSIS) International Journal of Computer Science and Information Security, 7 (1). pp. 1-9. ISSN 1947-5500
Yusof, R. and Selamat, S. R. and Mas'ud, M. Z. and Sahib, S. and Abdollah, M. F. and Ramly, M. (2009) A New Generic Taxonomy on Hybrid Malware Detection Technique. International Journal of Computer Science and Information Security, 5 (1). pp. 56-61. ISSN 1947-5500
Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. (2009) Threshold Verification Technique for Network Intrusion Detection System. International Journal of Computer Science and Information Security, 2 (1). pp. 1-8. ISSN 1947-5500
Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Mas'ud, Z. and Roslan, I. (2009) Tracing Technique for Blaster Attack. International Journal of Computer Science and Information Security, 4 (1). pp. 1-8. ISSN 1947-5500
Selamat, S. R. and Yusof, R. and Sahib, S. (2008) Mapping Process of Digital Forensic Investigation Framework. International Journal of Computer Science and Network Security , 8 (10). pp. 163-169. ISSN 1738-7906
Yusof, R. and Selamat, S. R. and Sahib, S. (2008) Intrusion Alert Correlation Technique Analysis for Heterogeneous Log. International Journal of Computer Science and Network Security , 8 (9). pp. 132-138. ISSN 1738-7906
Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. (2008) Alert Correlation Technique Analysis For Diverse Log. Journal of Advanced Manufacturing Technology, 2 (2). pp. 65-76. ISSN 1985-3157 July-December 2008
Abdollah, M. F. and Sahib, S. and Yaacub, A. H. and Othman, M. F. I. and Yusof, R. (2008) Feature Selection for Detecting Fast Attack in Network Intrusion Detection. Journal of Advanced Manufacturing Technology, 2 (2). pp. 39-56. ISSN 1985-3157 July-December 2008
Conference or Workshop Item
Muslim, Z. and Yusof, R. and Abu, N. A. and Sahib, S. (2012) Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment. In: WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY , July 2012, Stockholm, Sweden.
Yusof, R. and Selamat, S. R. and Sahib, S. and Mas'ud, M. Z. and Abdollah, M. F. (2011) Enhanced Alert Correlation Framework for Heterogeneous Log. In: The International Conference on Informatics Engineering & Information Science (ICIEIS2011), Nov. 14-16, 2011, University Technology Malaysia, KL Malaysia. (In Press)
M., Zulkiflee and Asmai, S. A. and Nahar, H. and Ayop, Zakiah and Sahib, S. (2011) Behavioral Analysis on IPv4 Malware on different platforms in IPv6 Network Environment. In: 2011 IEEE Conference on Open Systems (ICOS2011), 25-28 September 2011, Langkawi.
Selamat, S. R. and Yusof, R. and Sahib, S. and Abdollah, M. F. and Hassan, N. H. and Zainal Abidin, Z. (2011) Traceability in Digital Forensic Investigation Process. In: ICOS 2011, IEEE CONFERENCE ON OPEN SYSTEMS, 25-28/9/2011, Langkawi Malaysia.
Fajar, A. and Herman, N. S. and Abu, N. A. and Sahib, S. (2011) Hierarchical Approach in Clustering to Euclidean Traveling Salesman Problem. In: International Conference on Advanced Research on Electronic Commerce, Web Application and Communication (ECWAC 2011), 16-17 April 2011, Guangzhou.
Abdollah, M. F. and Mas’ud, M. Z. and Sahib, S. and Yaacub, A. H. and Yusof, R. and Selamat, S. R. (2011) Host Based Detection Approach using Time Based Module for Fast Attack Detection Behavior. In: 2011 First IRAST International Conference on Data Engineering and Internet Technology, 15-17 March 2011, Bali Dynasty Resort, Bali, Indonesia.
Selamat, S. R. and Yusof, R. and Sahib, S. and Roslan, I. and Abdollah, M. F. and Mas'ud, M. Z. (2011) Adapting Traceability in Digital Forensic Investigation Process. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.
Abd.Rahim, Y and Sahib, S. and Abd Ghani, M. K. and Yaacob, A.H (2011) A Hybrid Method For K-Anonymization Using Clustering Technique. In: International Conference on Aerospace Engineering and Information Technology (AEIT 2011), May 5-6, 2011, Beijing China.
Yusof, R. and Selamat, S. R. and Sahib, S. and Abdollah, M. F. and Mas'ud, M. Z. and Ramly, M. (2011) A New Malware Attack Pattern Generalization. In: Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011), 13-15 November 2011, UTHM, Batu Pahat, Johor.
Abu, N. A. and Sahib, S. (2011) Random ambience using high fidelity images. In: 3rd International Conference on Digital Image Processing (ICDIP 2011), 15-17 April 2011, Chengdu, China.
Selamat, S. R. and Yusof, R. and Sahib, S. and Hassan, N. H. and Abdollah, M. F. and Zaheera, Zainal Abidin (2011) Tracebility in Digital Forensic Investigation Process. In: IEEE Conference on Open Systems (ICOS2011), 25-28 September 2011, Langkawi.
Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. and Yaacub, A. H. (2010) Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System. In: 2010 Second International Conference on Network Applications, Protocols and Services, 22-23 September 2010, Holiday Villa Hotel, Kedah.
Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Selamat, S. R. and Yusof, R. (2010) Collaborative Security Mechanism in Detecting Intrusion Activity. In: International Conference on Engineering and ICT, 18-20 February 2010, Holiday Inn, Melaka, Malaysia.
Md Khambari, M. N. and Sahib, S. and Othman, M. F. I. (2009) DIFS Modifications to Support QoS in IEEE 802.11g DCF Ad-hoc Networks. In: International Conference on Computing and Informatics (ICOCI) 2009, 24-25 June 2009.
Abdollah, M. F. and Mas'ud, M. Z. and Sahib, S. and Yusof, R. and Selamat, S. R. (2009) Threshold verification using Statistical Approach for Fast Attack Detection. In: International Conference on Computing and Informatics (ICOCI) 2009, 24-25 June 2009, Kuala Lumpur, Malaysia.
Md Khambari, M. N. and Sahib, S. and Othman, M. F. I. (2009) Achieving Stable Throughput to Support QoS in IEEE 802.11 Wireless Networks. In: National Postgraduate Conference 2009, 11-12 March 2009, Seri Iskandar, Perak.
Md Khambari, M. N. and Sahib, S. and Othman, M. F. I. (2009) Improving IEEE 802.11g Mac to Support Quality of Service for Multimedia Applications in Wireless Networks. In: Seminar Kebangsaan ICT Dalam Pendidikan, 3-4 February 2009, Ipoh, Perak.
Md Khambari, M. N. and Sahib, S. and Othman, M. F. I. (2007) Improving IEEE 802.11 to Support Quality of Service in Wireless Networks. In: Regional Conference on Computational Science and Technologies 2007, 29-30 November 2007, Kota Kinabalu, Sabah.
Wong, W. and Sahib, S. and Goh, Ong Sing (2005) Evaluation of response quality for heterogeneous question answering systems. In: The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05), 19-22 Sept. 2005, France.
Goh, Ong Sing and Fung, C.C. and Wong, W. and Sahib, S. (2005) Intelligent question answering with natural language understanding and network-based advanced reasoning. In: 6th International Conference on Intelligent Technologies (InTech'05), December 2005, Phuket, Thailand.
Book
Yusof, R. and Abdollah, M. F. and Sahib, S. (2007) Network Administration & Management. Venton Publishing, Kuala Lumpur, Malaysia. ISBN 978-983-3526-44-6