Mohd Zaki Mas'ud
Mohd Zaki Mas'ud
Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka
Verified email at utem.edu.my - Homepage
Title
Cited by
Cited by
Year
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
642014
Generic taxonomy of social engineering attack
F Mohd Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas' ud
42*2011
A New Generic Taxonomy on Hybrid Malware Detection Technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
Arxiv preprint arXiv:0909.4860, 2009
392009
Revealing the criterion on botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, SR Selamat, R Yusof
International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013
332013
Threshold Verification Technique for Network Intrusion Detection System
A Mohd Faizal, M Mohd Zaki, S Shahrin, Y Robiah, S Siti Rahayu
International Journal of Computer Science and Information Security 2 (1), 2009
18*2009
Machine Learning for HTTP Botnet Detection Using Classifier Algorithms
RFM Dollah, MA Faizal, F Arif, MZ Mas’ud, LK Xin
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
142018
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
2013 International Conference on Technology, Informatics, Management …, 2013
142013
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, M Zaki, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
132010
Android Malware Detection System Classification
MZ Mas’ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
122014
Implementation of IPv6 network testbed: Intrusion detection system on transition mechanism
N Bahaman, P Anton Satria, Z Mas' ud
Journal of Applied Sciences 11 (1), 118-124, 2011
122011
Recognizing API Features for Malware Detection Using Static Analysis
SMA Ghani, MF Abdollah, R Yusof, M Zaki
Journal of Wireless Networking and Communications 5 (2A), 6-12, 2015
102015
Profiling mobile malware behaviour through hybrid malware analysis approach
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
102013
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy
IJ Network Security 19 (5), 727-733, 2017
92017
An improved traditional worm attack pattern
Y Robiah, SS Rahayu, S Sahib, MM Zaki, MA Faizal, R Marliza
Information Technology (ITSim), 2010 International Symposium in 2, 1067-1072, 2010
82010
New Multi-step Worm Attack Model
Y Robiah, SS Rahayu, S Shahrin, MA Faizal, MM Zaki, R Marliza
Arxiv preprint arXiv:1001.3477, 2010
82010
Detection on Straight Line Problem in Triangle Geometry Features for Digit Recognition
NA Arbain, MS Azmi, SSS Ahmad, R Nordin, MZ Mas' ud, MA Lateh
International Journal on Advanced Science, Engineering and Information …, 2016
62016
Enhanced Alert Correlation Framework for Heterogeneous Log
R Yusof, SR Selamat, S Sahib, MZ Mas’ud, MF Abdollah
International Conference on Informatics Engineering and Information Science …, 2011
62011
Advanced Trace Pattern For Computer Intrusion Discovery
SS Rahayu, Y Robiah, S Shahrin, MM Zaki, MA Faizal, ZA Zaheera
Arxiv preprint arXiv:1006.4569, 2010
62010
Performance enhancements in IEEE 802.11 DCF MANET through variation of SIFS values in distance vector routing environment
MN bin Md Khambari, ZA bin Muhamad Noh, NA bin Mat Ariff, ...
2011 7th International Conference on Information Technology in Asia, 1-5, 2011
52011
Statistical Approach for Validating Static Threshold in Fast Attack Detection
MF Abdollah, MZ Mas' ud, R Yusof, SR Selamat
Journal of Advanced Manufacturing Technology 4 (1), 53-71, 2010
52010
The system can't perform the operation now. Try again later.
Articles 1–20