关注
Norbik Bashah Idris
Norbik Bashah Idris
在 utm.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ...
Electronics 9 (7), 1120, 2020
1432020
Security risk assessment framework for cloud computing environments
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Security and Communication Networks 7 (11), 2114-2124, 2014
1072014
Artificial intelligence techniques applied to intrusion detection
NB Idris, B Shanmugam
2005 Annual IEEE India Conference-Indicon, 52-55, 2005
862005
Hybrid intelligent intrusion detection system
N Bashah, IB Shanmugam, AM Ahmed
World Academy of Science, Engineering and Technology 11, 23-26, 2005
682005
Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks
B Shanmugam, NB Idris
2009 International Conference of Soft Computing and Pattern Recognition, 212-217, 2009
672009
A parallel technique for improving the performance of signature-based network intrusion detection system
FI Shiri, B Shanmugam, NB Idris
2011 IEEE 3rd International Conference on Communication Software and …, 2011
452011
A requirements traceability to support change impact analysis
S Ibrahim, NB Idris, M Munro, A Deraman
Asian Journal of Information Tech 4 (4), 345-355, 2005
432005
A brief introduction to intrusion detection system
AB Mohamed, NB Idris, B Shanmugum
Trends in Intelligent Robotics, Automation, and Manufacturing: First …, 2012
302012
Hybrid intrusion detection systems (HIDS) using Fuzzy logic
B Shanmugam, NB Idris
Intrusion Detection Systems, 1-21, 2011
252011
Novel attack detection using fuzzy logic and data mining
NBIB Shanmugam
Proc. Security and Management, 26-31, 2006
242006
Integrating Software Traceability for Change Impact Analysis.
S Ibrahim, NB Idris, M Munro, A Deraman
Int. Arab J. Inf. Technol. 2 (4), 301-308, 2005
242005
Implementing a Document-based Requirements Traceability: A Case Study.
S Ibrahim, NB Idris, M Munro, A Deraman
IASTED Conf. on Software Engineering, 124-131, 2005
242005
A Software Traceability Validation For Change Impact Analysis of Object Oriented Software.
S Ibrahim, NB Idris, M Munro, A Deraman
Software Engineering Research and Practice, 453-459, 2006
222006
Signature-based hybrid Intrusion detection system (HIDS) for android devices
M Ghorbanian, B Shanmugam, G Narayansamy, NB Idris
2013 IEEE Business Engineering and Industrial Applications Colloquium (BEIAC …, 2013
202013
Cloudids: Cloud intrusion detection model inspired by dendritic cell mechanism
A Ahmad, NB Idris, MN Kama
International Journal of Communication Networks and Information Security …, 2017
192017
Alert correlation using a novel clustering approach
AB Mohamed, NB Idris, B Shanmugum
2012 International Conference on Communication Systems and Network …, 2012
182012
A systematic mapping study on cloud-based mobile application testing
BI Yaâ, N Salleh, A Nordin, NB Idris, H Abas, AA Alwan
Journal of Information and Communication Technology 18 (4), 485-527, 2019
152019
Contemporary semantic web service frameworks: An overview and comparisons
K Mohebbi, S Ibrahim, NB Idris
arXiv preprint arXiv:1210.3320, 2012
132012
Analysis and detection of P2P botnet connections based on node behaviour
MR Rostami, B Shanmugam, NB Idris
2011 World Congress on Information and Communication Technologies, 928-933, 2011
132011
Production and maintenance of system documentation: what, why, when and how tools should support the practice
S Sulaiman, NB Idris, S Sahibuddin
Ninth Asia-Pacific Software Engineering Conference, 2002., 558-567, 2002
132002
系统目前无法执行此操作,请稍后再试。
文章 1–20