Follow
Mohd Najwadi Yusoff
Mohd Najwadi Yusoff
School of Computer Sciences, Universiti Sains Malaysia
Verified email at usm.my - Homepage
Title
Cited by
Cited by
Year
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies
MN Yusoff, A Dehghantanha, R Mahmod
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017
522017
Contemporary digital forensics investigations of cloud and mobile applications
KKR Choo, A Dehghantanha
Contemporary digital forensic investigations of cloud and mobile …, 2017
272017
Advances of mobile forensic procedures in Firefox OS
MN Yusoff, R Mahmod, A Dehghantanha, MT Abdullah
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (4), 2014
182014
Optimizing decision tree in malware classification system by using genetic algorithm
MN Yusoff, A Jantan
computing 10, 14, 2011
182011
Machine learning approach for detection of fileless cryptocurrency mining malware
WBT Handaya, MN Yusoff, A Jantan
Journal of Physics: Conference Series 1450 (1), 012075, 2020
152020
Mobile forensic data acquisition in Firefox OS
MN Yusoff, R Mahmod, MT Abdullah, A Dehghantanha
2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014
152014
A model for android and ios applications risk calculation: Cvss analysis and enhancement using case-control studies
M Petraityte, A Dehghantanha, G Epiphaniou
Cyber Threat Intelligence, 219-237, 2018
142018
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies
MN Yusoff, A Dehghantanha, R Mahmod
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2017
142017
Performance measurement for mobile forensic data acquisition in Firefox OS
MN Yusoff, R Mahmod, MT Abdullah, A Dehghantanha
International Journal of Cyber-Security and Digital Forensics 3 (3), 130-140, 2014
132014
An approach for forensic investigation in Firefox OS
MN Yusoff, R Mahmod, A Dehghantanha, MT Abdullah
2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014
132014
Redactable blockchain: Comprehensive review, mechanisms, challenges, open issues and future research directions
SM Abd Ali, MN Yusoff, HF Hasan
Future Internet 15 (1), 35, 2023
112023
The effects of feature selection on the classification of encrypted botnet
Z Ismail, A Jantan, MN Yusoff, MU Kiru
Journal of Computer Virology and Hacking Techniques 17, 61-74, 2021
102021
A framework for optimizing malware classification by using genetic algorithm
MN Yusoff, A Jantan
Software Engineering and Computer Systems: Second International Conference …, 2011
102011
A survey on privacy issues in digital forensics
A Aminnezhad, A Dehghantanha
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (4), 2014
92014
A systematic analysis for botnet detection using genetic algorithm
HA Sukhni, MA Al-Khasawneh, FH Yusoff
2021 2nd International Conference on Smart Computing and Electronic …, 2021
72021
Evidence collection and forensic challenges in cloud environment
AK Abdullahi, J Aman, NY Mohd, M Aminu, KI Mohamad, N RMN
MACE Technical Journal (MTJ) MTJ 1 (01), 8-18, 2019
62019
Proposing Awqaf Alternative Plan (Aap): The Way Forward & Sustainable Higher Education Financial System
AA Pitchay, MNYA Rahman, MAMT Thaker, Z Azhar, AA Mydin, ...
International Journal of Islamic Economics and Finance (IJIEF) 1 (1), 39-58, 2018
52018
Malware classification using ensemble classifiers
MHA Hijazi, TC Beng, J Mountstephens, Y Lim, K Nisar
Advanced Science Letters 24 (2), 1172-1176, 2018
52018
Generation Z’s adoption of IoT: protection motivation theory as the underlying model and gender as a moderator
A Mahmud, MN Yusoff, MH Husin
Journal of Systems and Information Technology 25 (2), 133-159, 2023
32023
Analysis on Literature Review of Internet of Things Adoption Among the Consumer at the Individual Level
A Mahmud, MH Husin, MN Yusoff
Journal of Information Science Theory and Practice 10 (2), 45-73, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20