Rosli Salleh
Rosli Salleh
Associate Professor
Verified email at
Cited by
Cited by
The evolution of android malware and android analysis techniques
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro
ACM Computing Surveys (CSUR) 49 (4), 1-41, 2017
A review on feature selection in mobile malware detection
A Feizollah, NB Anuar, R Salleh, AWA Wahab
Digital investigation 13, 22-37, 2015
Androdialysis: Analysis of android intent effectiveness in malware detection
A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell
computers & security 65, 121-134, 2017
Copy-move forgery detection: survey, challenges and future directions
NB Abd Warif, AWA Wahab, MYI Idris, R Ramli, R Salleh, ...
Journal of Network and Computer Applications 75, 259-278, 2016
Overview of security issues in wireless sensor networks
H Modares, R Salleh, A Moravejosharieh
2011 third international conference on computational intelligence, modelling …, 2011
The future of mobile wireless communication networks
X Li, A Gani, R Salleh, O Zakaria
2009 International Conference on Communication Software and Networks, 554-557, 2009
Botnet detection techniques: review, future trends, and issues
A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar
Journal of Zhejiang University SCIENCE C 15, 943-983, 2014
A study of machine learning classifiers for anomaly-based mobile botnet detection
A Feizollah, NB Anuar, R Salleh, F Amalina, S Shamshirband
Malaysian Journal of Computer Science 26 (4), 251-265, 2013
The rise of “malware”: Bibliometric analysis of malware study
MF Ab Razak, NB Anuar, R Salleh, A Firdaus
Journal of Network and Computer Applications 75, 58-76, 2016
Off-line handwriting text line segmentation: A review
Z Razak, K Zulkiflee, MYI Idris, EM Tamil, MNM Noor, R Salleh, M Yaakob, ...
International journal of computer science and network security 8 (7), 12-20, 2008
Bots and botnets: An overview of characteristics, detection and challenges
M Eslahi, R Salleh, NB Anuar
2012 IEEE International Conference on Control System, Computing and …, 2012
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis
A Feizollah, NB Anuar, R Salleh, F Amalina
2014 international symposium on biometrics and security technologies (ISBAST …, 2014
SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack
NBA Warif, AWA Wahab, MYI Idris, R Salleh, F Othman
Journal of Visual Communication and Image Representation 46, 219-232, 2017
Heterogeneous energy and traffic aware sleep-awake cluster-based routing protocol for wireless sensor network
NM Shagari, MYI Idris, RB Salleh, I Ahmedy, G Murtaza, HA Shehadeh
IEEE Access 8, 12232-12252, 2020
SMARTbot: A behavioral analysis framework augmented with machine learning to identify mobile botnet applications
A Karim, R Salleh, MK Khan
PloS one 11 (3), e0150077, 2016
MoBots: A new generation of botnets on mobile devices and networks
M Eslahi, R Salleh, NB Anuar
2012 International Symposium on Computer Applications and Industrial …, 2012
Bio-inspired for features optimization and malware detection
MFA Razak, NB Anuar, F Othman, A Firdaus, F Afifi, R Salleh
Arabian Journal for Science and Engineering 43, 6963-6979, 2018
Performance analysis of aodv, aomdv, dsr, dsdv routing protocols in vehicular ad hoc network
A Moravejosharieh, H Modares, R Salleh, E Mostajeran
Research Journal of Recent Sciences ISSN 2277, 2502, 2013
Mobile botnet attacks-an emerging threat: Classification, review and open issues
A Karim, SA Ali Shah, RB Salleh, M Arif, RM Noor, S Shamshirband
KSII Transactions on Internet and Information Systems (TIIS) 9 (4), 1471-1492, 2015
Cost effective network flow measurement for software defined networks: A distributed controller scenario
H Tahaei, RB Salleh, MF Ab Razak, K Ko, NB Anuar
IEEE Access 6, 5182-5198, 2018
The system can't perform the operation now. Try again later.
Articles 1–20