Mapping process of digital forensic investigation framework SR Selamat, R Yusof, S Sahib International Journal of Computer Science and Network Security 8 (10), 163-169, 2008 | 199 | 2008 |
An introduction to image steganography techniques AAJ Altaay, SB Sahib, M Zamani 2012 international conference on advanced computer science applications and …, 2012 | 144 | 2012 |
Analysis of features selection and machine learning classifier in android malware detection MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof 2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014 | 85 | 2014 |
Intrusion alert correlation technique analysis for heterogeneous log R Yusof, SR Selamat, S Sahib IJCSNS International Journal of Computer Science and Network Security 8 (9 …, 2008 | 73 | 2008 |
A new generic taxonomy on hybrid malware detection technique Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza arXiv preprint arXiv:0909.4860, 2009 | 51 | 2009 |
Technical security metrics model in compliance with ISO/IEC 27001 standard M Azuwa, R Ahmad, S Sahib, S Shamsuddin International Journal of Cyber-Security and Digital Forensics 1 (4), 280-288, 2012 | 37 | 2012 |
Perception on cyber terrorism: A focus group discussion approach R Ahmad, Z Yunos, S Sahib, M Yusoff Scientific Research Publishing, 2012 | 37 | 2012 |
Drone tracking modelling ontology for tourist behavior JF Rusdi, S Salam, NA Abu, S Sahib, M Naseer, AA Abdullah Journal of Physics: Conference Series 1201 (1), 012032, 2019 | 33 | 2019 |
A framework of features selection for ipv6 network attacks detection M Zulkiflee, M Azmi, S Ahmad, S Sahib, M Ghani WSEAS Trans Commun 14 (46), 399-408, 2015 | 30 | 2015 |
On the choice of the wavelets for ECG data compression R Besar, C Eswaran, S Sahib, RJ Simpson 2000 IEEE International Conference on Acoustics, Speech, and Signal …, 2000 | 29 | 2000 |
Mapping the Futures of Malaysian Higher Education: A Meta-Analysis of Futures Studies in the Malaysian Higher Education Scenario. F Ithnin, S Sahib, CK Eng, S Sidek, RNSR Harun Journal of Futures Studies 22 (3), 2018 | 28 | 2018 |
Understanding cyber terrorism: The grounded theory method applied R Ahmad, Z Yunos, S Sahib Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 26 | 2012 |
Image watermarking using psychovisual threshold over the edge NA Abu, F Ernawan, N Suryana, S Sahib Information and Communication Technology: International Conference, ICT …, 2013 | 24 | 2013 |
Threshold verification technique for network intrusion detection system MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar arXiv preprint arXiv:0906.3843, 2009 | 24 | 2009 |
Collective information structure model for information security risk assessment (ISRA) P Shamala, R Ahmad, AH Zolait, S bin Sahib Journal of Systems and Information Technology 17 (2), 193-219, 2015 | 23 | 2015 |
A forensic traceability index in digital forensic investigation SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah Scientific Research Publishing, 2013 | 23 | 2013 |
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection. MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy Int. J. Netw. Secur. 19 (5), 727-733, 2017 | 20 | 2017 |
Response quality evaluation in heterogeneous question answering system: a black-box approach GO Sing, C Ardil, W Wong, S Sahib Proceedings of World Academy of Science, Engineering and Technology 9, 2006 | 17 | 2006 |
Dimension of mobile security model: Mobile user security threats and awareness M Sheila, MA Faizal, S Shahrin International Journal of Mobile Learning and Organisation 9 (1), 66-85, 2015 | 16 | 2015 |
Preliminary study of host and network-based analysis on P2P Botnet detection RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof 2013 International Conference on Technology, Informatics, Management …, 2013 | 16 | 2013 |