Követés
Mohd Taufik Abdullah
Mohd Taufik Abdullah
E-mail megerősítve itt: upm.edu.my
Cím
Hivatkozott rá
Hivatkozott rá
Év
Avian feathers as a non-destructive bio-monitoring tool of trace metals signatures: a case study from severely contaminated areas
M Abdullah, M Fasola, A Muhammad, SA Malik, N Bostan, H Bokhari, ...
Chemosphere 119, 553-561, 2015
1962015
A review of bring your own device on security issues
M Olalere, MT Abdullah, R Mahmod, A Abdullah
Sage Open 5 (2), 2158244015580372, 2015
1322015
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
822012
A survey on privacy issues in digital forensics
A Aminnezhad, A Dehghantanha, MT Abdullah
International Journal of Cyber-Security and Digital Forensics 1 (4), 311-324, 2012
792012
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah
IEEE Access 8, 70651-70663, 2020
622020
An effective security alert mechanism for real-time phishing tweet detection on Twitter
SW Liew, NFM Sani, MT Abdullah, R Yaakob, MY Sharum
Computers & security 83, 201-207, 2019
602019
Adaptive feature selection for denial of services (DoS) attack
AR Yusof, NI Udzir, A Selamat, H Hamdan, MT Abdullah
2017 IEEE conference on application, information and network security (AINS …, 2017
562017
Sedimentation and stabilization of nano-fluids with dispersant
M Abdullah, SR Malik, MH Iqbal, MM Sajid, NA Shad, SZ Hussain, ...
Colloids and Surfaces A: Physicochemical and Engineering Aspects 554, 86-92, 2018
532018
Analysis of evidence using formal event reconstruction
J James, P Gladyshev, MT Abdullah, Y Zhu
Digital Forensics and Cyber Crime: First International ICST Conference …, 2010
462010
An overview of attacks against digital watermarking and their respective countermeasures
M Tanha, SDS Torshizi, MT Abdullah, F Hashim
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
372012
Cloud forensics issues and opportunities
A Aminnezhad, A Dehghantanha, MT Abdullah, M Damshenas
International Journal of Information Processing and Management 4 (4), 76, 2013
362013
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks
M Ibrahim, MT Abdullah, A Dehghantanha
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
322012
Greening cloud-enabled big data storage forensics: Syncany as a case study
YY Teing, A Dehghantanha, KKR Choo, Z Muda, MT Abdullah
IEEE Transactions on Sustainable Computing 4 (2), 204-216, 2017
302017
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
272014
Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation
W Halboob, R Mahmod, NI Udzir, MT Abdullah
Procedia Computer Science 56, 370-375, 2015
252015
Research Article A Review on Mobile Device's Digital Forensic Process Models
A Farjamfar, MT Abdullah, R Mahmod, NI Udzir
Research Journal of Applied Sciences, Engineering and Technology 8 (3), 358-366, 2014
242014
Advances in computer forensics
MT Abdullah, R Mahmod, AAA Ghani, MZ Abdullah, ABM Sultan
International Journal of Computer Science and Network Security 8 (2), 215-219, 2008
232008
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
MA Bouke, A Abdullah, SH ALshatebi, MT Abdullah, H El Atigh
Microprocessors and Microsystems 98, 104823, 2023
222023
Identification and evaluation of discriminative lexical features of malware URL for real-time classification
M Olalere, MT Abdullah, R Mahmod, A Abdullah
2016 International Conference on Computer and Communication Engineering …, 2016
212016
Enhance Luhn algorithm for validation of credit cards numbers
KW Hussein, NFM Sani, R Mahmod, MT Abdullah
Int. J. Comput. Sci. Mob. Comput 2 (7), 262-272, 2013
212013
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20