Zaiton Muda
Title
Cited by
Cited by
Year
Intrusion detection based on K-Means clustering and Naďve Bayes classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th international conference on information technology in Asia, 1-6, 2011
1572011
Anomaly-based Intrusion Detection Through K-Means Clustering and Naives Bayes Classification
W Yassin, NI Udzir, Z Muda, MN Sulaiman
4th International Conference on Computing and Informatics, ICOCI 2013., 298-303, 2013
942013
A K-Means and Naive Bayes learning approach for better intrusion detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Information technology journal 10 (3), 648-655, 2011
862011
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
722012
Ranking of influencing factors in predicting students’ academic performance
LS Affendey, IHM Paris, N Mustapha, MN Sulaiman, Z Muda
Information Technology Journal 9 (4), 832-837, 2010
672010
Intrusion detection based on k-means clustering and OneR classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
642011
Windows instant messaging app forensics: Facebook and Skype as case studies
TY Yang, A Dehghantanha, KKR Choo, Z Muda
PloS one 11 (3), e0150300, 2016
622016
Improving intrusion detection using genetic algorithm
VM Hashemi, Z Muda, W Yassin
Information Technology Journal 12 (11), 2167, 2013
302013
K-means clustering and naive bayes classification for intrusion detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Journal of IT in Asia 4 (1), 13-25, 2014
272014
Security improvement for management frames in IEEE 802.11 wireless networks
M Malekzadeh, A Azim, A Ghani, ZA Zulkarnain, Z Muda
International Journal of Computer Science and Network Security 7 (6), 276-284, 2007
262007
MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW.
S Juma, Z Muda, MA Mohamed, W Yassin
Journal of Theoretical & Applied Information Technology 72 (3), 2015
252015
Comparative study of performance in cryptography algorithms (Blowfish and Skipjack)
AA Milad, Z Muda, ZABM Noh, MA Algaet
Journal of Computer Science 8 (7), 91, 2012
252012
Greening cloud-enabled big data storage forensics: Syncany as a case study
YY Teing, A Dehghantanha, KKR Choo, Z Muda, MT Abdullah
IEEE Transactions on Sustainable Computing 4 (2), 204-216, 2017
242017
Improve Cloud Computing Security Using RSA Encryption with Fermat’s Little Theorem
BM Shereek, Z Muda, S Yasin
IOSR Journal of Engineering (IOSRJEN) 4 (2), 1-8, 2014
21*2014
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
172014
A Hybrid Framework Based on Neural Network MLP and K-Means Clustering for Intrusion Detection System
MM Lisehroodi, Z Muda, W Yassin
4th International Conference on Computing and Informatics, ICOCI 2013., 305-311, 2013
142013
The new approach of Rijndael key schedule
S Sulaiman, Z Muda, J Juremi
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
142012
A closer look at syncany Windows and Ubuntu Clients’ residual artefacts
YY Teing, A Dehghantanha, KKR Choo, Z Muda, MT Abdullah, WC Chai
International Conference on Security, Privacy and Anonymity in Computation …, 2016
112016
Packet header anomaly detection using statistical analysis
W Yassin, NI Udzir, A Abdullah, MT Abdullah, Z Muda, H Zulzalil
International Joint Conference SOCO’14-CISIS’14-ICEUTE’14, 473-482, 2014
112014
Key transformation approach for Rijndael security
Z Muda, R Mahmod, MR Sulong
Information Technology Journal 9 (2), 290-297, 2010
112010
The system can't perform the operation now. Try again later.
Articles 1–20