Intrusion detection based on K-Means clustering and Naïve Bayes classification Z Muda, W Yassin, MN Sulaiman, NI Udzir 2011 7th international conference on information technology in Asia, 1-6, 2011 | 203 | 2011 |
Anomaly-based Intrusion Detection Through K-Means Clustering and Naives Bayes Classification W Yassin, NI Udzir, Z Muda, MN Sulaiman 4th International Conference on Computing and Informatics, ICOCI 2013., 298-303, 2013 | 132 | 2013 |
A K-Means and Naive Bayes learning approach for better intrusion detection Z Muda, W Yassin, MN Sulaiman, NI Udzir Information technology journal 10 (3), 648-655, 2011 | 98 | 2011 |
Windows instant messaging app forensics: Facebook and Skype as case studies TY Yang, A Dehghantanha, KKR Choo, Z Muda PloS one 11 (3), e0150300, 2016 | 94 | 2016 |
A cloud-based intrusion detection service framework W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 82 | 2012 |
Intrusion detection based on k-means clustering and OneR classification Z Muda, W Yassin, MN Sulaiman, NI Udzir 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 74 | 2011 |
Ranking of influencing factors in predicting students’ academic performance LS Affendey, IHM Paris, N Mustapha, MN Sulaiman, Z Muda Information Technology Journal 9 (4), 832-837, 2010 | 66 | 2010 |
Improving intrusion detection using genetic algorithm VM Hashemi, Z Muda, W Yassin Information Technology Journal 12 (11), 2167, 2013 | 40 | 2013 |
K-means clustering and naive bayes classification for intrusion detection Z Muda, W Yassin, MN Sulaiman, NI Udzir Journal of IT in Asia 4 (1), 13-25, 2014 | 39 | 2014 |
Greening cloud-enabled big data storage forensics: Syncany as a case study YY Teing, A Dehghantanha, KKR Choo, Z Muda, MT Abdullah IEEE Transactions on Sustainable Computing 4 (2), 204-216, 2017 | 33 | 2017 |
Security improvement for management frames in IEEE 802.11 wireless networks M Malekzadeh, AAA Ghani, ZA Zulkarnain, Z Muda International Journal of Computer Science and Network Security 7 (6), 276-284, 2007 | 32 | 2007 |
Comparative study of performance in cryptography algorithms (Blowfish and Skipjack) AA Milad, Z Muda, ZABM Noh, MA Algaet Journal of Computer Science 8 (7), 91, 2012 | 31 | 2012 |
MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW. S Juma, Z Muda, MA Mohamed, W Yassin Journal of Theoretical & Applied Information Technology 72 (3), 2015 | 28 | 2015 |
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda 2014 International symposium on biometrics and security technologies (ISBAST …, 2014 | 28 | 2014 |
Improve Cloud Computing Security Using RSA Encryption with Fermat’s Little Theorem BM Shereek, Z Muda, S Yasin IOSR Journal of Engineering (IOSRJEN) 4 (2), 1-8, 2014 | 23* | 2014 |
A Hybrid Framework Based on Neural Network MLP and K-Means Clustering for Intrusion Detection System MM Lisehroodi, Z Muda, W Yassin 4th International Conference on Computing and Informatics, ICOCI 2013., 305-311, 2013 | 19 | 2013 |
The new approach of Rijndael key schedule S Sulaiman, Z Muda, J Juremi Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 19 | 2012 |
Packet header anomaly detection using statistical analysis W Yassin, NI Udzir, A Abdullah, MT Abdullah, Z Muda, H Zulzalil International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain …, 2014 | 16 | 2014 |
Key transformation approach for Rijndael security Z Muda, R Mahmod, MR Sulong Information Technology Journal 9 (2), 290-297, 2010 | 12 | 2010 |
A closer look at syncany Windows and Ubuntu Clients’ residual artefacts YY Teing, A Dehghantanha, KKR Choo, Z Muda, MT Abdullah, WC Chai Security, Privacy and Anonymity in Computation, Communication and Storage …, 2016 | 11 | 2016 |