A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ... Applied Sciences 10 (15), 5208, 2020 | 133 | 2020 |
A dynamic cyber terrorism framework R Ahmad, Z Yunos International Journal of Computer Science and Information Security 10 (2), 149, 2012 | 62 | 2012 |
Perception on cyber terrorism: A focus group discussion approach R Ahmad, Z Yunos, S Sahib, M Yusoff Journal of Information Security 3 (3), 231-237, 2012 | 39 | 2012 |
Development of a cyber security awareness strategy using focus group discussion Z Yunos, RS Ab Hamid, M Ahmad 2016 SAI Computing Conference (SAI), 1063-1067, 2016 | 30 | 2016 |
Understanding cyber terrorism: The grounded theory method applied R Ahmad, Z Yunos, S Sahib Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 26 | 2012 |
Cloud forensic challenges and recommendations: A review W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020 | 24 | 2020 |
The application of mixed method in developing a cyber terrorism framework R Ahmad, Z Yunos Scientific Research Publishing, 2012 | 24 | 2012 |
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework Z Yunos, R Ahmad, SH Suid, Z Ismail 2010 Sixth International Conference on Information Assurance and Security, 21-27, 2010 | 23 | 2010 |
A systematic literature review on the security and privacy of the blockchain and cryptocurrency A Hassan, MZ Mas' ud, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ... OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020 | 22 | 2020 |
A qualitative analysis for evaluating a cyber terrorism framework in Malaysia Z Yunos, R Ahmad, NA Mohd Sabri Information Security Journal: A Global Perspective 24 (1-3), 15-23, 2015 | 20 | 2015 |
The application of qualitative method in developing a cyber terrorism framework Z Yunos, R Ahmad Proccedings of the International Conference on Economics, Management and …, 2014 | 19 | 2014 |
Safeguarding Malaysia’s cyberspace against cyber threats: contributions by cybersecurity Malaysia F Abdullah, NS Mohamad, Z Yunos OIC-CERT Journal of Cyber Security 1 (1), 22-31, 2018 | 18 | 2018 |
Understanding cyber terrorism from motivational perspectives Z Yunos, S Sulaman Journal of Information Warfare 16 (4), 1-13, 2017 | 15 | 2017 |
Forensic readiness: A case study on digital CCTV systems antiforensics A Ariffin, KKR Choo, Z Yunos Contemporary digital forensic investigations of cloud and mobile …, 2017 | 15 | 2017 |
Putting Cyberterrorism into Context Z Yunos, CS Malaysia STAR In-Tech 24 (02), 5, 2009 | 14 | 2009 |
Protection of critical national information infrastructure (cnii) against cyber terrorism: Development of strategy and policy framework Z Yunos, SH Suid 2010 IEEE International Conference on Intelligence and Security Informatics …, 2010 | 13 | 2010 |
A review of digital forensics framework for blockchain in cryptocurrency technology MZ Mas’ud, A Hassan, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ... 2021 3rd International Cyber Resilience Conference (CRC), 1-6, 2021 | 12 | 2021 |
How to make online banking secure ANM Zin, Z Yunos The Star 21, 2005 | 12 | 2005 |
Instilling digital citizenship skills through education: a Malaysian perspective R Susanty, Z Yunos, M Ahmad, N Razali European Conference on Cyber Warfare and Security, 819-XX, 2019 | 9 | 2019 |
Cyber parenting module development for parents RS Ab Hamid, Z Yunos, M Ahmad INTED2018 Proceedings, 9620-9627, 2018 | 9 | 2018 |