Aman Jantan
Aman Jantan
Associate Professor, Computer Sciences, Universiti Sains Malaysia
Verified email at usm.my
Title
Cited by
Cited by
Year
Image encryption using block-based transformation algorithm
MA Bani, A Jantan
IJCSNS International Journal of Computer Science and Network Security 8 (4 …, 2008
2602008
State-of-the-art in artificial neural network applications: A survey
OI Abiodun, A Jantan, AE Omolara, KV Dada, NAE Mohamed, H Arshad
Heliyon 4 (11), e00938, 2018
2052018
A new steganography approach for images encryption exchange by using the least significant bit insertion
MAB Younes, A Jantan
International Journal of Computer Science and Network Security 8 (6), 247-257, 2008
1142008
An image encryption approach using a combination of permutation technique followed by encryption
MAB Younes, A Jantan
IJCSNS International Journal of Computer Science and Network Security 8 (4 …, 2008
962008
An approach for malware behavior identification and classification
MF Zolkipli, A Jantan
2011 3rd International Conference on Computer Research and Development 1 …, 2011
482011
A framework for malware detection using combination technique and signature generation
MF Zolkipli, A Jantan
2010 Second International Conference on Computer Research and Development …, 2010
472010
An intelligent traffic light monitor system using an adaptive associative memory
EIA Kareem, A Jantan
IJIPM: International Journal of Information Processing and Management 2 (2 …, 2011
452011
Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems
WAHM Ghanem, A Jantan
Neural Computing and Applications 30 (1), 163-181, 2018
332018
Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence.
H Arshad, AB Jantan, OI Abiodun
Journal of Information Processing Systems 14 (2), 2018
292018
Malware behavior analysis: Learning and understanding current malware threats
MF Zolkipli, A Jantan
2010 Second International Conference on Network Applications, Protocols and …, 2010
292010
Novel multi-objective artificial bee Colony optimization for wrapper based feature selection in intrusion detection
W Ghanem, A Jantan
International journal of advance soft computing applications 8 (1), 2016
242016
Filtration model for the detection of malicious traffic in large-scale networks
AA Ahmed, A Jantan, TC Wan
Computer Communications 82, 59-70, 2016
222016
Attack intention analysis model for network forensics
M Rasmi, A Jantan
International Conference on Software Engineering and Computer Systems, 403-411, 2011
202011
Using hybrid artificial bee colony algorithm and particle swarm optimization for training feed-forward neural networks.
WAHM Ghanem, A Jantan
Journal of theoretical & applied information technology 67 (3), 2014
192014
SLA-based complementary approach for network intrusion detection
AA Ahmed, A Jantan, TC Wan
Computer Communications 34 (14), 1738-1749, 2011
192011
Real-time detection of intrusive traffic in QoS network domains
AA Ahmed, A Jantan, TC Wan
IEEE Security & Privacy 11 (6), 45-53, 2013
182013
A novel soft computing inference engine model for intrusion detection
M Jazzar, A Jantan
IJCSNS International Journal of Computer Science and Network Security 8 (4), 1-9, 2008
182008
An enhanced Bat algorithm with mutation operator for numerical optimization problems
WAHM Ghanem, A Jantan
Neural Computing and Applications 31 (1), 617-651, 2019
172019
Service violation monitoring model for detecting and tracing bandwidth abuse
AA Ahmed, A Jantan, M Rasmi
Journal of network and systems management 21 (2), 218-237, 2013
172013
A new algorithm to estimate the similarity between the intentions of the cyber crimes for network forensics
M Rasmi, A Jantan
4th International Conference on Electrical Engineering and Informatics …, 2013
172013
The system can't perform the operation now. Try again later.
Articles 1–20