Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies MN Yusoff, A Dehghantanha, R Mahmod Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017 | 52 | 2017 |
Contemporary digital forensics investigations of cloud and mobile applications KKR Choo, A Dehghantanha Contemporary digital forensic investigations of cloud and mobile …, 2017 | 27 | 2017 |
Advances of mobile forensic procedures in Firefox OS MN Yusoff, R Mahmod, A Dehghantanha, MT Abdullah International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (4), 2014 | 18 | 2014 |
Optimizing decision tree in malware classification system by using genetic algorithm MN Yusoff, A Jantan computing 10, 14, 2011 | 18 | 2011 |
Machine learning approach for detection of fileless cryptocurrency mining malware WBT Handaya, MN Yusoff, A Jantan Journal of Physics: Conference Series 1450 (1), 012075, 2020 | 15 | 2020 |
Mobile forensic data acquisition in Firefox OS MN Yusoff, R Mahmod, MT Abdullah, A Dehghantanha 2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014 | 15 | 2014 |
A model for android and ios applications risk calculation: Cvss analysis and enhancement using case-control studies M Petraityte, A Dehghantanha, G Epiphaniou Cyber Threat Intelligence, 219-237, 2018 | 14 | 2018 |
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies MN Yusoff, A Dehghantanha, R Mahmod Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017 | 14 | 2017 |
Performance measurement for mobile forensic data acquisition in Firefox OS MN Yusoff, R Mahmod, MT Abdullah, A Dehghantanha International Journal of Cyber-Security and Digital Forensics 3 (3), 130-140, 2014 | 13 | 2014 |
An approach for forensic investigation in Firefox OS MN Yusoff, R Mahmod, A Dehghantanha, MT Abdullah 2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014 | 13 | 2014 |
Redactable blockchain: Comprehensive review, mechanisms, challenges, open issues and future research directions SM Abd Ali, MN Yusoff, HF Hasan Future Internet 15 (1), 35, 2023 | 11 | 2023 |
The effects of feature selection on the classification of encrypted botnet Z Ismail, A Jantan, MN Yusoff, MU Kiru Journal of Computer Virology and Hacking Techniques 17, 61-74, 2021 | 10 | 2021 |
A framework for optimizing malware classification by using genetic algorithm MN Yusoff, A Jantan Software Engineering and Computer Systems: Second International Conference …, 2011 | 10 | 2011 |
A survey on privacy issues in digital forensics A Aminnezhad, A Dehghantanha International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (4), 2014 | 9 | 2014 |
A systematic analysis for botnet detection using genetic algorithm HA Sukhni, MA Al-Khasawneh, FH Yusoff 2021 2nd International Conference on Smart Computing and Electronic …, 2021 | 7 | 2021 |
Evidence collection and forensic challenges in cloud environment AK Abdullahi, J Aman, NY Mohd, M Aminu, KI Mohamad, N RMN MACE Technical Journal (MTJ) MTJ 1 (01), 8-18, 2019 | 6 | 2019 |
Proposing Awqaf Alternative Plan (Aap): The Way Forward & Sustainable Higher Education Financial System AA Pitchay, MNYA Rahman, MAMT Thaker, Z Azhar, AA Mydin, ... International Journal of Islamic Economics and Finance (IJIEF) 1 (1), 39-58, 2018 | 5 | 2018 |
Malware classification using ensemble classifiers MHA Hijazi, TC Beng, J Mountstephens, Y Lim, K Nisar Advanced Science Letters 24 (2), 1172-1176, 2018 | 5 | 2018 |
Generation Z’s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator A Mahmud, MN Yusoff, MH Husin Journal of Systems and Information Technology 25 (2), 133-159, 2023 | 3 | 2023 |
Analysis on Literature Review of Internet of Things Adoption Among the Consumer at the Individual Level A Mahmud, MH Husin, MN Yusoff Journal of Information Science Theory and Practice 10 (2), 45-73, 2022 | 3 | 2022 |