Follow
Nor Fazlida Mohd Sani
Nor Fazlida Mohd Sani
Associate Professor, Universiti Putra Malaysia
Verified email at upm.edu.my - Homepage
Title
Cited by
Cited by
Year
A survey about impacts of cloud computing on digital forensics
F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin, ...
International Journal of Cyber-Security and Digital Forensics 2 (2), 77-95, 2013
762013
Digital forensic trends and future
FN Dezfoli, A Dehghantanha, R Mahmoud, NFBM Sani, F Daryabar
International Journal of Cyber-Security and Digital Forensics 2 (2), 48-77, 2013
712013
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah
IEEE Access 8, 70651-70663, 2020
622020
An effective security alert mechanism for real-time phishing tweet detection on Twitter
SW Liew, NFM Sani, MT Abdullah, R Yaakob, MY Sharum
Computers & security 83, 201-207, 2019
602019
MRMR BA: a hybrid gene selection algorithm for cancer classification
OA Alomari, AT Khader, MA Al-Betar, LM Abualigah
J Theor Appl Inf Technol 95 (12), 2610-2618, 2017
562017
Unit testing approaches for BPEL: a systematic review
Z Zakaria, R Atan, AAA Ghani, NFM Sani
2009 16th Asia-Pacific Software Engineering Conference, 316-322, 2009
512009
Volatile memory acquisition using backup for forensic investigation
FN Dezfouli, A Dehghantanha, R Mahmoud, NFBM Sani, ...
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
422012
Towards secure model for SCADA systems
F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
402012
S-scrum: a secure methodology for agile development of web services
D Mougouei, NFM Sani, MM Almasi
World of Computer Science and Information Technology Journal (WCSIT) 3 (1 …, 2013
382013
Enhance Luhn algorithm for validation of credit cards numbers
KW Hussein, NFM Sani, R Mahmod, MT Abdullah
Int. J. Comput. Sci. Mob. Comput 2 (7), 262-272, 2013
202013
A survey on security awareness among social networking users in Malaysia
I Ishak, F Sidi, MA Jabar, NFM Sani, A Mustapha, SR Supian, M Apau
Australian Journal of Basic and Applied Sciences 6 (12), 23-29, 2012
192012
SEMANTIC SCHEMA MATCHING APPROACHES: A REVIEW.
J HOSSAIN, NFM Sani, LS AFFENDEY, I Ishak, KA KASMIRAN
Journal of Theoretical & Applied Information Technology 62 (1), 2014
152014
Mobile plant tagging system for urban forest eco-tourism using QR code
I Ishak, F Sidi, LS Affendey, NFM Sani, AS Hamzah, P Bawon
2013 International Conference on Advanced Computer Science Applications and …, 2013
142013
A survey on malware analysis and detection techniques
FN Dezfouli, A Dehghantanha, R Mahmod, NFBM Sani, SB Shamsuddin, ...
International Journal of Advancements in Computing Technology 5 (14), 42, 2013
142013
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
MAM Isa, MM Ahmad, NFM Sani, H Hashim, R Mahmod
Procedia Computer Science 42, 263-270, 2014
122014
Nonnegative matrix factorization and metamorphic malware detection
YT Ling, NFM Sani, MT Abdullah, NAWA Hamid
Journal of Computer Virology and Hacking Techniques 15, 195-208, 2019
112019
A survey on privacy impacts of digital investigation
F Daryabar, A Dehghantanha, NI Udzir, NFM Sani, S Shamsuddin, ...
Journal of Next Generation Information Technology 4 (8), 2013
112013
An indexed non-probability skyline query processing framework for uncertain data
MM Lawal, H Ibrahim, NF Mohd Sani, R Yaakob
International Conference on Advanced Machine Learning Technologies and …, 2020
102020
Analyses of indexing techniques on uncertain data with high dimensionality
H Ibrahim, NFM Sani, R Yaakob
IEEE Access 8, 74101-74117, 2020
92020
Permission extraction framework for android malware detection
A Ghasempour, NFM Sani, JA Ovye
International Journal of Advanced Computer Science and Applications 11 (11), 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20