Suivre
Mohd Aizaini Maarof
Mohd Aizaini Maarof
Professor of Information Security, Universiti Teknologi Malaysia (UTM)- Research ID: L-4331-2013
Adresse e-mail validée de utm.my
Titre
Citée par
Citée par
Année
Fraud detection system: A survey
A Abdallah, MA Maarof, A Zainal
Journal of Network and Computer Applications 68, 90-113, 2016
8062016
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
BAS Al-Rimy, MA Maarof, SZM Shaid
Computers & Security 74, 144-166, 2018
4452018
Malware detection based on hybrid signature behaviour application programming interface call graph
AAE Elhadi, MA Maarof, AH Osman
American Journal of Applied Sciences 9 (3), 283, 2012
1322012
Improving the detection of malware behaviour using simplified data dependent API call graph
AAE Elhadi, MA Maarof, B Barry
International Journal of Security and Its Applications 7 (5), 29-42, 2013
1142013
Ensemble classifiers for network intrusion detection system
A Zainal, MA Maarof, SM Shamsuddin
Journal of Information Assurance and Security 4 (3), 217-225, 2009
1112009
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
BAS Al-rimy, MA Maarof, SZM Shaid
Future Generation Computer Systems 101, 476-491, 2019
1082019
Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues
MA Rassam, A Zainal, MA Maarof
Sensors 13 (8), 10087-10122, 2013
932013
A survey of intrusion detection schemes in wireless sensor networks
MA Rassam, MA Maarof, A Zainal
American Journal of Applied Sciences 9 (10), 1636, 2012
912012
Malware behavior image for malware variant identification
SZM Shaid, MA Maarof
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
852014
Zero-day aware decision fusion-based model for crypto-ransomware early detection
BAS Al-rimy, MA Maarof, YA Prasetyo, SZM Shaid, AFM Ariffin
International Journal of Integrated Engineering 10 (6), 2018
762018
Feature selection using Rough-DPSO in anomaly intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
Computational Science and Its Applications–ICCSA 2007: International …, 2007
752007
Enhancing the detection of metamorphic malware using call graphs
AAE Elhadi, MA Maarof, BIA Barry, H Hamza
computers & security 46, 62-78, 2014
742014
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection
BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid, FA Ghaleb, A Almalawi, ...
Future Generation Computer Systems 115, 641-658, 2021
692021
Adaptive and online data anomaly detection for wireless sensor systems
MA Rassam, MA Maarof, A Zainal
Knowledge-Based Systems 60, 44-57, 2014
672014
Feature selection using rough set in intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006
612006
A 0-day aware crypto-ransomware early behavioral detection framework
BAS Al-rimy, MA Maarof, SZM Shaid
Recent Trends in Information and Communication Technology: Proceedings of …, 2018
572018
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency …
FA Ghaleb, MA Maarof, A Zainal, MA Rassam, F Saeed, M Alsaedi
Vehicular Communications 20, 100186, 2019
532019
Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network
FA Ghaleb, MA Maarof, A Zainal, BAS Al-rimy, A Alsaeedi, W Boulila
Remote Sensing 11 (23), 2852, 2019
482019
Hybrid and multifaceted context-aware misbehavior detection model for vehicular ad hoc network
FA Ghaleb, MA Maarof, A Zainal, BAS Al-Rimy, F Saeed, T Al-Hadhrami
IEEE Access 7, 159119-159140, 2019
482019
Ransomware anti-analysis and evasion techniques: A survey and research directions
MN Olaimat, MA Maarof, BAS Al-rimy
2021 3rd international cyber resilience conference (CRC), 1-6, 2021
472021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20