The evolution of android malware and android analysis techniques K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro ACM Computing Surveys (CSUR) 49 (4), 1-41, 2017 | 469 | 2017 |
A review on feature selection in mobile malware detection A Feizollah, NB Anuar, R Salleh, AWA Wahab Digital investigation 13, 22-37, 2015 | 290 | 2015 |
Androdialysis: Analysis of android intent effectiveness in malware detection A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell computers & security 65, 121-134, 2017 | 286 | 2017 |
Copy-move forgery detection: survey, challenges and future directions NB Abd Warif, AWA Wahab, MYI Idris, R Ramli, R Salleh, ... Journal of Network and Computer Applications 75, 259-278, 2016 | 242 | 2016 |
Overview of security issues in wireless sensor networks H Modares, R Salleh, A Moravejosharieh 2011 third international conference on computational intelligence, modelling …, 2011 | 212 | 2011 |
Botnet detection techniques: review, future trends, and issues A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar Journal of Zhejiang University SCIENCE C 15, 943-983, 2014 | 196 | 2014 |
The future of mobile wireless communication networks X Li, A Gani, R Salleh, O Zakaria 2009 International Conference on Communication Software and Networks, 554-557, 2009 | 186 | 2009 |
The rise of “malware”: Bibliometric analysis of malware study MF Ab Razak, NB Anuar, R Salleh, A Firdaus Journal of Network and Computer Applications 75, 58-76, 2016 | 141 | 2016 |
A study of machine learning classifiers for anomaly-based mobile botnet detection A Feizollah, NB Anuar, R Salleh, F Amalina, S Shamshirband Malaysian Journal of Computer Science 26 (4), 251-265, 2013 | 133 | 2013 |
Off-line handwriting text line segmentation: A review Z Razak, K Zulkiflee, MYI Idris, EM Tamil, MNM Noor, R Salleh, M Yaakob, ... International journal of computer science and network security 8 (7), 12-20, 2008 | 120 | 2008 |
Bots and botnets: An overview of characteristics, detection and challenges M Eslahi, R Salleh, NB Anuar 2012 IEEE International Conference on Control System, Computing and …, 2012 | 114 | 2012 |
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis A Feizollah, NB Anuar, R Salleh, F Amalina 2014 international symposium on biometrics and security technologies (ISBAST …, 2014 | 97 | 2014 |
Heterogeneous energy and traffic aware sleep-awake cluster-based routing protocol for wireless sensor network NM Shagari, MYI Idris, RB Salleh, I Ahmedy, G Murtaza, HA Shehadeh IEEE Access 8, 12232-12252, 2020 | 85 | 2020 |
SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack NBA Warif, AWA Wahab, MYI Idris, R Salleh, F Othman Journal of Visual Communication and Image Representation 46, 219-232, 2017 | 75 | 2017 |
SMARTbot: A behavioral analysis framework augmented with machine learning to identify mobile botnet applications A Karim, R Salleh, MK Khan PloS one 11 (3), e0150077, 2016 | 75 | 2016 |
MoBots: A new generation of botnets on mobile devices and networks M Eslahi, R Salleh, NB Anuar 2012 International Symposium on Computer Applications and Industrial …, 2012 | 65 | 2012 |
Bio-inspired for features optimization and malware detection MFA Razak, NB Anuar, F Othman, A Firdaus, F Afifi, R Salleh Arabian Journal for Science and Engineering 43, 6963-6979, 2018 | 62 | 2018 |
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications A Bello Tambawal, R Md Noor, R Salleh, C Chembe, M Oche PloS one 14 (4), e0214664, 2019 | 58 | 2019 |
Performance analysis of aodv, aomdv, dsr, dsdv routing protocols in vehicular ad hoc network A Moravejosharieh, H Modares, R Salleh, E Mostajeran Research Journal of Recent Sciences ISSN 2277, 2502, 2013 | 55 | 2013 |
Mobile botnet attacks-an emerging threat: Classification, review and open issues A Karim, SA Ali Shah, RB Salleh, M Arif, RM Noor, S Shamshirband KSII Transactions on Internet and Information Systems (TIIS) 9 (4), 1471-1492, 2015 | 54 | 2015 |