Zahri Yunos
Zahri Yunos
No verified email - Homepage
Cited by
Cited by
A dynamic cyber terrorism framework
R Ahmad, Z Yunos
International Journal of Computer Science and Information Security 10 (2), 149, 2012
Perception on cyber terrorism: A focus group discussion approach
R Ahmad, Z Yunos, S Sahib, M Yusoff
Scientific Research Publishing, 2012
Understanding cyber terrorism: The grounded theory method applied
R Ahmad, Z Yunos, S Sahib
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
The application of mixed method in developing a cyber terrorism framework
R Ahmad, Z Yunos
Scientific Research Publishing, 2012
Development of a cyber security awareness strategy using focus group discussion
Z Yunos, RS Ab Hamid, M Ahmad
2016 SAI Computing Conference (SAI), 1063-1067, 2016
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework
Z Yunos, R Ahmad, SH Suid, Z Ismail
2010 Sixth International Conference on Information Assurance and Security, 21-27, 2010
A qualitative analysis for evaluating a cyber terrorism framework in Malaysia
Z Yunos, R Ahmad, NA Mohd Sabri
Information Security Journal: A Global Perspective 24 (1-3), 15-23, 2015
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ...
Applied Sciences 10 (15), 5208, 2020
The application of qualitative method in developing a cyber terrorism framework
Z Yunos, R Ahmad
Proccedings of the International Conference on Economics, Management and …, 2014
How to make online banking secure
ANM Zin, Z Yunos
The Star 21, 2005
Protection of critical national information infrastructure (cnii) against cyber terrorism: Development of strategy and policy framework
Z Yunos, SH Suid
2010 IEEE International Conference on Intelligence and Security Informatics …, 2010
Forensic readiness: A case study on digital CCTV systems antiforensics
A Ariffin, KKR Choo, Z Yunos
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017
Putting Cyberterrorism into Context
Z Yunos, CS Malaysia
STAR In-Tech 24 (02), 5, 2009
Understanding cyber terrorism from motivational perspectives
Z Yunos, S Sulaman
Journal of Information Warfare 16 (4), 1-13, 2017
Grounding the component of cyber terrorism framework using the grounded theory
Z Yunos, R Ahmad, M Yusoff
2014 Science and Information Conference, 523-529, 2014
Illicit activities and terrorism in cyberspace: an exploratory study in the southeast asian region
Z Yunos, R Ahmad, SM Ali, S Shamsuddin
Pacific-Asia Workshop on Intelligence and Security Informatics, 27-35, 2012
A systematic literature review on the security and privacy of the blockchain and cryptocurrency
A Hassan, MZ Mas' ud, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ...
OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020
Cloud Forensic Challenges and Recommendations: A Review
W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin
OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020
Understanding cyber terrorism from motivational perspectives: A qualitative data analysis
Z Yunos, N Mohd, A Ariffin, R Ahmad
European Conference on Cyber Warfare and Security, 550-557, 2017
Elements in the cyber security framework for protecting the Critical Information Infrastructure against cyber threats
MS Hashim, MN Masrek, Z Yunos
International Information Institute (Tokyo). Information 19 (7B), 2989, 2016
The system can't perform the operation now. Try again later.
Articles 1–20