Warusia
Title
Cited by
Cited by
Year
Intrusion detection based on K-Means clustering and Naïve Bayes classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th international conference on information technology in Asia, 1-6, 2011
1602011
ANOMALY-BASED INTRUSION DETECTION THROUGH K-MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION
W Yassin, NI Udzir, Z Muda, MN Sulaiman
Proceedings of the 4th International Conference on Computing and Informatics …, 2013
972013
A K-Means and Naive Bayes learning approach for better intrusion detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Information technology journal 10 (3), 648-655, 2011
882011
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
742012
Intrusion detection based on k-means clustering and OneR classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
642011
Cyber-security incidents: a review cases in cyber-physical systems
MN Al-Mhiqani, R Ahmad, W Yassin, A Hassan, ZZ Abidin, NS Ali, ...
Int. J. Adv. Comput. Sci. Appl, 499-508, 2018
552018
Improving Intrusion Detection Using Genetic Algorithm
WY Vahid Moraveji Hashemi, Zaiton Muda
Information Technology Journal 12 (11), 2167-2173, 2013
302013
K-Means Clustering and Naive Bayes Classification for Intrusion Detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Journal of IT in Asia 4 (1), 13-25, 2014
282014
MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW.
S Juma, Z Muda, MA Mohamed, W Yassin
Journal of Theoretical & Applied Information Technology 72 (3), 2015
252015
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
182014
A HYBRID FRAMEWORK BASED ON NEURAL NETWORK MLP AND K-MEANS CLUSTERING FOR INTRUSION DETECTION SYSTEM
WY Mazyar Mohammadi Lisehroodi, Zaiton Muda
Proceedings of the 4th International Conference on Computing and Informatics …, 2013
15*2013
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ...
Applied Sciences 10 (15), 5208, 2020
132020
Packet Header Anomaly Detection Using Statistical Analysis
W Yassin, NI Udzir, A Abdullah, MT Abdullah
Springer, 2013
112013
REDUCING FALSE ALARM USING HYBRID INTRUSION DETECTION BASED ON X-MEANS CLUSTERING AND RANDOM FOREST CLASSIFICATION
S JUMA, Z MUDA, W YASSIN
Journal of Theoretical and Applied Information Technology 68 (2), 249-254, 2014
92014
New insider threat detection method based on recurrent neural networks
MN Al-Mhiqani, R Ahmad, ZZ Abidin, W Yassin, A Hassan, ...
Indones. J. Electr. Eng. Comput. Sci 17 (3), 1474-1479, 2020
82020
A new taxonomy of insider threats: an initial step in understanding authorised attack
MN Al-Mhiqani, R Ahmad, ZZ Abidin, WM Yassin, A Hassan, ...
International Journal of Information Systems and Management 1 (4), 343-359, 2018
72018
Cloud Forensic Challenges and Recommendations: A Review
W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin
OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020
52020
Identify of Factors Affecting Information Security Awareness and Weight Analysis Process
RA Issam Al-Shanfari, Warusia Yassin
International Journal of Engineering and Advanced Technology 9 (3), 534-542, 2020
5*2020
Clustering Analysis for Malware Behavior Detection using Registry Data
NA Rosli, W Yassin, MA Faizal, SR Selamat
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
52019
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing
R Baharon, Q Shi, F Abdollah, W Yassin, A Idris
International Journal of Communication Networks and Information Security …, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20