Zahri Yunos
Zahri Yunos
CyberSecurity Malaysia
Verified email at - Homepage
Cited by
Cited by
A dynamic cyber terrorism framework
R Ahmad, Z Yunos
International Journal of Computer Science and Information Security 10 (2), 149, 2012
Perception on cyber terrorism: A focus group discussion approach
R Ahmad, Z Yunos, S Sahib, M Yusoff
Scientific Research Publishing, 2012
Understanding cyber terrorism: The grounded theory method applied
R Ahmad, Z Yunos, S Sahib
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
The application of mixed method in developing a cyber terrorism framework
R Ahmad, Z Yunos
Scientific Research Publishing, 2012
Safeguarding malaysia's critical national information infrastructure (cnii) against cyber terrorism: Towards development of a policy framework
Z Yunos, R Ahmad, SH Suid, Z Ismail
2010 Sixth International Conference on Information Assurance and Security, 21-27, 2010
Development of a cyber security awareness strategy using focus group discussion
Z Yunos, RS Ab Hamid, M Ahmad
2016 SAI Computing Conference (SAI), 1063-1067, 2016
A qualitative analysis for evaluating a cyber terrorism framework in Malaysia
Z Yunos, R Ahmad, NA Mohd Sabri
Information Security Journal: A Global Perspective 24 (1-3), 15-23, 2015
The application of qualitative method in developing a cyber terrorism framework
Z Yunos, R Ahmad
Proccedings of the International Conference on Economics, Management and …, 2014
Protection of critical national information infrastructure (cnii) against cyber terrorism: Development of strategy and policy framework
Z Yunos, SH Suid
2010 IEEE International Conference on Intelligence and Security Informatics …, 2010
How to make online banking secure
ANM Zin, Z Yunos
The Star 21, 2005
Forensic readiness: A case study on digital CCTV systems antiforensics
A Ariffin, KKR Choo, Z Yunos
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017
Putting Cyber Terrorism into Context
Z Yunos, CS Malaysia
STAR In-Tech 24 (02), 5, 2009
Grounding the component of cyber terrorism framework using the grounded theory
Z Yunos, R Ahmad, M Yusoff
2014 Science and Information Conference, 523-529, 2014
Illicit activities and terrorism in cyberspace: an exploratory study in the southeast asian region
Z Yunos, R Ahmad, SM Ali, S Shamsuddin
Pacific-Asia Workshop on Intelligence and Security Informatics, 27-35, 2012
Understanding cyber terrorism from motivational perspectives: A qualitative data analysis
Z Yunos, N Mohd, A Ariffin, R Ahmad
European Conference on Cyber Warfare and Security, 550-557, 2017
Definition and Framework of Cyber Terrorism
Z Yunos, R Ahmad, NAA Abd Aziz
Proceeding of Southeast Asia Regional Center for Counter Terrorism’s …, 2013
Keeping kids safe online
Z Yunos, SSSN Mohammad
Retrieved on 28, 2011
Safeguarding Malaysia’s cyberspace against cyber threats: contributions by cybersecurity Malaysia
F Abdullah, NS Mohamad, Z Yunos
OIC-CERT Journal of Cyber Security 1 (1), 22-31, 2018
Understanding cyber terrorism from motivational perspectives
Z Yunos, S Sulaman
Journal of Information Warfare 16 (4), 1-13, 2017
Evaluating cyber terrorism components in Malaysia
Z Yunos, R Ahmad
The 5th International Conference on Information and Communication Technology …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20