Follow
Mohd Najwadi Yusoff
Mohd Najwadi Yusoff
School of Computer Sciences, Universiti Sains Malaysia
Verified email at usm.my - Homepage
Title
Cited by
Cited by
Year
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies
MN Yusoff, A Dehghantanha, R Mahmod
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017
522017
Contemporary digital forensics investigations of cloud and mobile applications
KKR Choo, A Dehghantanha
Contemporary digital forensic investigations of cloud and mobile …, 2017
272017
Advances of mobile forensic procedures in Firefox OS
MN Yusoff, R Mahmod, A Dehghantanha, MT Abdullah
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (4), 2014
182014
Optimizing decision tree in malware classification system by using genetic algorithm
MN Yusoff, A Jantan
computing 10, 14, 2011
182011
Machine learning approach for detection of fileless cryptocurrency mining malware
WBT Handaya, MN Yusoff, A Jantan
Journal of Physics: Conference Series 1450 (1), 012075, 2020
152020
Mobile forensic data acquisition in Firefox OS
MN Yusoff, R Mahmod, MT Abdullah, A Dehghantanha
2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014
152014
A model for android and ios applications risk calculation: Cvss analysis and enhancement using case-control studies
M Petraityte, A Dehghantanha, G Epiphaniou
Cyber Threat Intelligence, 219-237, 2018
142018
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies
MN Yusoff, A Dehghantanha, R Mahmod
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017
142017
Performance measurement for mobile forensic data acquisition in Firefox OS
MN Yusoff, R Mahmod, MT Abdullah, A Dehghantanha
International Journal of Cyber-Security and Digital Forensics 3 (3), 130-140, 2014
132014
An approach for forensic investigation in Firefox OS
MN Yusoff, R Mahmod, A Dehghantanha, MT Abdullah
2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014
132014
Redactable blockchain: Comprehensive review, mechanisms, challenges, open issues and future research directions
SM Abd Ali, MN Yusoff, HF Hasan
Future Internet 15 (1), 35, 2023
112023
A framework for optimizing malware classification by using genetic algorithm
MN Yusoff, A Jantan
Software Engineering and Computer Systems: Second International Conference …, 2011
102011
A survey on privacy issues in digital forensics
A Aminnezhad, A Dehghantanha
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (4), 2014
92014
The effects of feature selection on the classification of encrypted botnet
Z Ismail, A Jantan, MN Yusoff, MU Kiru
Journal of Computer Virology and Hacking Techniques 17, 61-74, 2021
82021
A systematic analysis for botnet detection using genetic algorithm
HA Sukhni, MA Al-Khasawneh, FH Yusoff
2021 2nd International Conference on Smart Computing and Electronic …, 2021
72021
Evidence collection and forensic challenges in cloud environment
AK Abdullahi, J Aman, NY Mohd, M Aminu, KI Mohamad, N RMN
MACE Technical Journal (MTJ) MTJ 1 (01), 8-18, 2019
62019
Proposing Awqaf Alternative Plan (Aap): The Way Forward & Sustainable Higher Education Financial System
AA Pitchay, MNYA Rahman, MAMT Thaker, Z Azhar, AA Mydin, ...
International Journal of Islamic Economics and Finance (IJIEF) 1 (1), 39-58, 2018
52018
Malware classification using ensemble classifiers
MHA Hijazi, TC Beng, J Mountstephens, Y Lim, K Nisar
Advanced Science Letters 24 (2), 1172-1176, 2018
52018
Analysis on Literature Review of Internet of Things Adoption Among the Consumer at the Individual Level
A Mahmud, MH Husin, MN Yusoff
Journal of Information Science Theory and Practice 10 (2), 45-73, 2022
32022
Generation Z’s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator
A Mahmud, MN Yusoff, MH Husin
Journal of Systems and Information Technology 25 (2), 133-159, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20