Arima based network anomaly detection AH Yaacob, IKT Tan, SF Chien, HK Tan 2010 Second International Conference on Communication Software and Networks …, 2010 | 184 | 2010 |
IPSec over Heterogeneous IPv4 and IPv6 Networks: Issues and Implementation NM Ahmad, AH Yaacob International Journal of Computer Networks Communications 4 (5), 57-72, 2012 | 22 | 2012 |
Time based intrusion detection on fast attack for network intrusion detection system MA Faizal, S Sahib, Y Robiah, S Rahayu 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 16 | 2010 |
Revealing the Influence of Feature Selection for Fast Attack Detection MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MF Iskandar International Journal of Computer Science and Network Security 8 (8), 107-115, 2008 | 13 | 2008 |
Moving Towards Positive Security Model for Web Application Firewall AH Yaacob, NM Ahmad, NN Ahmad, M Roslee World Academy Of Science, Engineering And Technology 72, 1759-1764, 2012 | 6 | 2012 |
Performance analysis of MapReduce on OpenStack-based Hadoop virtual cluster NM Ahmad, AH Yaacob, AHM Amin, S Kannan 2014 IEEE 2nd International Symposium on Telecommunication Technologies …, 2014 | 5 | 2014 |
End to end ipsec support across ipv4/Ipv6 translation gateway NM Ahmad, AH Yaacob 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 5 | 2010 |
An Earlier Detection Framework for Network Intrusion Detection System MA Faizal, HY Asrul, S Shahrin Proceeding of the Second International Conference on Advances in Information …, 2007 | 4 | 2007 |
Host based detection approach using time based module for fast attack detection behavior FM Abdollah, MZ Mas’ ud, S Sahib, AH Yaacob, R Yusof, SR Selamat Recent Progress in Data Engineering and Internet Technology: Volume 2, 163-171, 2012 | 3 | 2012 |
IKE authentication using certificateless signature AH Yaacob, NM Ahmad, R Fauzi, MSAM Shikh The International Conference on Information Networking 2011 (ICOIN2011), 447-452, 2011 | 3 | 2011 |
Performance analysis of certificateless signature for IKE authentication NM Ahmad, AH Yaacob, R Fauzi, A Khorram International Journal of Computer and Information Engineering 5 (2), 211-218, 2011 | 2 | 2011 |
Improved Fast Attack Detection Model for Network Intrusion Detection MF Abdollah, AH Yaacob, S Sahib Proceeding of International Conference on Engineering and ICT, UTeM, 2007 | 2 | 2007 |
Towards Early Detection of Network Intrusion S Shahib, MF Abdollah, AH Yaacob | 2 | 2007 |
Network performance testing on VM based autonomous web server MZ Mas' ud, AH Yaacob, NM Ahmad 2006 International Conference on Computing & Informatics, 1-6, 2006 | 2 | 2006 |
Secure partial secret key issuing in Certificateless Public Key Infrastructure S Mehrasa, NM Ahmad, A Khorram, AH Yaacob 2011 IEEE Student Conference on Research and Development, 79-84, 2011 | 1 | 2011 |
Comparative analysis and implementation of certificateless based authentication scheme NM Ahmad, AH Yaacob, A Khorram, JF Tan, YH Ong, YM Leong Informatics Engineering and Information Science: International Conference …, 2011 | 1 | 2011 |
Feature Selection For Detecting Fast Attack in Network Intrusion Detection MA Faizal, S Shahrin, HY Asrul, MIO Fairuz, Y Robbie Journal of Advanced Manufacturing Technology 2 (2), 39-56, 2008 | 1 | 2008 |
Virtual Machine based Autonomous Web Server MZ Mas’ud, MA Faizal, Y Asrul Hadi, NM Ahmad, H Erman Recent Progress in Data Engineering and Internet Technology 157 (2), 173-182, 2012 | | 2012 |
IPSec Authentication using Certificateless Signature in Heterogeneous IPv4/IPv6 Network NM Ahmad, AH Yaacob, R Fauzi, A Khorram, JAK Lama IEEE Symposium on Computers & Informatics, 668 - 673, 2011 | | 2011 |
A Hybrid Method For K-Anonymization Using Clustering Technique S Sahib, MK Abd Ghani, AH Yaacob International Conference on Aerospace Engineering and Information Technology …, 2011 | | 2011 |