Zahri Yunos
Zahri Yunos
UTEM
No verified email - Homepage
Title
Cited by
Cited by
Year
A dynamic cyber terrorism framework
R Ahmad, Z Yunos
International Journal of Computer Science and Information Security 10 (2), 149, 2012
462012
Perception on cyber terrorism: A focus group discussion approach
R Ahmad, Z Yunos, S Sahib, M Yusoff
Scientific Research Publishing, 2012
242012
Understanding cyber terrorism: The grounded theory method applied
R Ahmad, Z Yunos, S Sahib
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
232012
The application of mixed method in developing a cyber terrorism framework
R Ahmad, Z Yunos
Scientific Research Publishing, 2012
202012
Development of a cyber security awareness strategy using focus group discussion
Z Yunos, RS Ab Hamid, M Ahmad
2016 SAI Computing Conference (SAI), 1063-1067, 2016
192016
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework
Z Yunos, R Ahmad, SH Suid, Z Ismail
2010 Sixth International Conference on Information Assurance and Security, 21-27, 2010
182010
A qualitative analysis for evaluating a cyber terrorism framework in Malaysia
Z Yunos, R Ahmad, NA Mohd Sabri
Information Security Journal: A Global Perspective 24 (1-3), 15-23, 2015
152015
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ...
Applied Sciences 10 (15), 5208, 2020
132020
The application of qualitative method in developing a cyber terrorism framework
Z Yunos, R Ahmad
Proccedings of the International Conference on Economics, Management and …, 2014
122014
How to make online banking secure
ANM Zin, Z Yunos
The Star 21, 2005
112005
Protection of critical national information infrastructure (cnii) against cyber terrorism: Development of strategy and policy framework
Z Yunos, SH Suid
2010 IEEE International Conference on Intelligence and Security Informatics …, 2010
102010
Forensic readiness: A case study on digital CCTV systems antiforensics
A Ariffin, KKR Choo, Z Yunos
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017
92017
Putting Cyberterrorism into Context
Z Yunos, CS Malaysia
STAR In-Tech 24 (02), 5, 2009
92009
Understanding cyber terrorism from motivational perspectives
Z Yunos, S Sulaman
Journal of Information Warfare 16 (4), 1-13, 2017
82017
Grounding the component of cyber terrorism framework using the grounded theory
Z Yunos, R Ahmad, M Yusoff
2014 Science and Information Conference, 523-529, 2014
72014
Illicit activities and terrorism in cyberspace: an exploratory study in the southeast asian region
Z Yunos, R Ahmad, SM Ali, S Shamsuddin
Pacific-Asia Workshop on Intelligence and Security Informatics, 27-35, 2012
72012
A systematic literature review on the security and privacy of the blockchain and cryptocurrency
A Hassan, MZ Mas' ud, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ...
OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020
62020
Cloud Forensic Challenges and Recommendations: A Review
W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin
OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020
52020
Understanding cyber terrorism from motivational perspectives: A qualitative data analysis
Z Yunos, N Mohd, A Ariffin, R Ahmad
European Conference on Cyber Warfare and Security, 550-557, 2017
52017
Elements in the cyber security framework for protecting the Critical Information Infrastructure against cyber threats
MS Hashim, MN Masrek, Z Yunos
International Information Institute (Tokyo). Information 19 (7B), 2989, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20