Intrusion detection system for the internet of things based on blockchain and multi-agent systems C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ... Electronics 9 (7), 1120, 2020 | 143 | 2020 |
Security risk assessment framework for cloud computing environments SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed Security and Communication Networks 7 (11), 2114-2124, 2014 | 107 | 2014 |
Artificial intelligence techniques applied to intrusion detection NB Idris, B Shanmugam 2005 Annual IEEE India Conference-Indicon, 52-55, 2005 | 86 | 2005 |
Hybrid intelligent intrusion detection system N Bashah, IB Shanmugam, AM Ahmed World Academy of Science, Engineering and Technology 11, 23-26, 2005 | 68 | 2005 |
Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks B Shanmugam, NB Idris 2009 International Conference of Soft Computing and Pattern Recognition, 212-217, 2009 | 67 | 2009 |
A parallel technique for improving the performance of signature-based network intrusion detection system FI Shiri, B Shanmugam, NB Idris 2011 IEEE 3rd International Conference on Communication Software and …, 2011 | 45 | 2011 |
A requirements traceability to support change impact analysis S Ibrahim, NB Idris, M Munro, A Deraman Asian Journal of Information Tech 4 (4), 345-355, 2005 | 43 | 2005 |
A brief introduction to intrusion detection system AB Mohamed, NB Idris, B Shanmugum Trends in Intelligent Robotics, Automation, and Manufacturing: First …, 2012 | 30 | 2012 |
Hybrid intrusion detection systems (HIDS) using Fuzzy logic B Shanmugam, NB Idris Intrusion Detection Systems, 1-21, 2011 | 25 | 2011 |
Novel attack detection using fuzzy logic and data mining NBIB Shanmugam Proc. Security and Management, 26-31, 2006 | 24 | 2006 |
Integrating Software Traceability for Change Impact Analysis. S Ibrahim, NB Idris, M Munro, A Deraman Int. Arab J. Inf. Technol. 2 (4), 301-308, 2005 | 24 | 2005 |
Implementing a Document-based Requirements Traceability: A Case Study. S Ibrahim, NB Idris, M Munro, A Deraman IASTED Conf. on Software Engineering, 124-131, 2005 | 24 | 2005 |
A Software Traceability Validation For Change Impact Analysis of Object Oriented Software. S Ibrahim, NB Idris, M Munro, A Deraman Software Engineering Research and Practice, 453-459, 2006 | 22 | 2006 |
Signature-based hybrid Intrusion detection system (HIDS) for android devices M Ghorbanian, B Shanmugam, G Narayansamy, NB Idris 2013 IEEE Business Engineering and Industrial Applications Colloquium (BEIAC …, 2013 | 20 | 2013 |
Cloudids: Cloud intrusion detection model inspired by dendritic cell mechanism A Ahmad, NB Idris, MN Kama International Journal of Communication Networks and Information Security …, 2017 | 19 | 2017 |
Alert correlation using a novel clustering approach AB Mohamed, NB Idris, B Shanmugum 2012 International Conference on Communication Systems and Network …, 2012 | 18 | 2012 |
A systematic mapping study on cloud-based mobile application testing BI Yaâ, N Salleh, A Nordin, NB Idris, H Abas, AA Alwan Journal of Information and Communication Technology 18 (4), 485-527, 2019 | 15 | 2019 |
Contemporary semantic web service frameworks: An overview and comparisons K Mohebbi, S Ibrahim, NB Idris arXiv preprint arXiv:1210.3320, 2012 | 13 | 2012 |
Analysis and detection of P2P botnet connections based on node behaviour MR Rostami, B Shanmugam, NB Idris 2011 World Congress on Information and Communication Technologies, 928-933, 2011 | 13 | 2011 |
Production and maintenance of system documentation: what, why, when and how tools should support the practice S Sulaiman, NB Idris, S Sahibuddin Ninth Asia-Pacific Software Engineering Conference, 2002., 558-567, 2002 | 13 | 2002 |