TYPE |
PUBLICATION |
TARIKH PENERBITAN |
TYPE OF CONTRIBUTION |
REFEREED PUBLICATION |
CONFERENCE PAPER |
A Review: Static Analysis of Android Malware and Detection Technique |
24/08/2021 |
100 |
CONFERENCE PAPER |
An Organ Donation Management System (ODMS) based on Blockchain Technology for Tracking and Security Purposes |
24/08/2021 |
50 |
CONFERENCE PAPER |
Applying Bayesian probability for Android malware detection using permission features |
24/08/2021 |
100 |
CONFERENCE PAPER |
Performance Analysis on Denial of Service attack using UNSW-NB15 Dataset |
24/08/2021 |
50 |
JOURNAL |
A Bayesian probability model for Android malware detection |
21/09/2021 |
100 |
JOURNAL |
A static analysis approach for Android permission-based malware detection systems |
30/09/2021 |
100 |
JOURNAL |
Android mobile malware detection using fuzzy AHP |
01/09/2021 |
100 |
JOURNAL |
Grasp on next generation security operation centre (NGSOC): Comparative study |
01/07/2021 |
100 |
JOURNAL |
Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) |
11/06/2021 |
50 |
JOURNAL |
New formula to calculate the number of designs in RADG cryptosystem |
04/02/2021 |
50 |
JOURNAL |
The prediction of undergraduate student performance in chemistry course using multilayer perceptron |
01/02/2021 |
50 |
JOURNAL |
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches |
01/04/2021 |
80 / checking the format and standard, pay the proofread |
JOURNAL |
Towards a systematic description of the field using bibliometric analysis: malware evolution |
09/02/2021 |
100 - Main Supervisor |
CONFERENCE PAPER |
An Improved Mapping Pattern for Digital Watermarking using Hilbert-Peano Pattern |
01/01/2020 |
50% |
JOURNAL |
A malicious URLs detection system using optimization and machine learning classifiers |
01/03/2020 |
100 main supervisor |
JOURNAL |
Android Malware Detection System using Machine Learning |
01/03/2020 |
100 main supervisor |
JOURNAL |
Automated Feature Selection using Boruta Algorithm to Detect Mobile Malware |
01/09/2020 |
50 / check format |
JOURNAL |
Phishing detection system using machine learning classifiers |
01/03/2020 |
100 Main supervisor |
CONFERENCE PAPER |
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA) |
01/02/2019 |
20 |
JOURNAL |
Augmented reality: effect on conceptual change of scientific |
01/12/2019 |
50 |
JOURNAL |
Selecting Root Exploit Features Using Flying Animal-Inspired Decision |
27/07/2019 |
50% |
JOURNAL |
The rise of blockchain: bibliometric analysis of blockchain study |
01/09/2019 |
50 |
JOURNAL |
Less give more: evaluate and zoning android applications |
01/02/2019 |
100 |
JOURNAL |
Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics |
18/07/2018 |
10 |
JOURNAL |
Cost effective network flow measurement for software defined networks: A distributed controller scenario |
01/01/2018 |
10 |
JOURNAL |
Detecting opinion spams through supervised boosting approach |
01/06/2018 |
10 |
JOURNAL |
Discovering optimal features using static analysis and a genetic search based method for android malware detection |
01/06/2018 |
10 |
JOURNAL |
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management |
01/06/2018 |
10 |
JOURNAL |
Bio-inspired for features optimization and malware detection |
01/12/2017 |
100 |
JOURNAL |
The rise of malware: Bibliometric analysis of malware study |
01/11/2016 |
100 |
REVIEWER |
JOURNAL |
COMPUTERS & SECURITY |
01/04/2021 |
100 |
JOURNAL |
Multimedia Tools and Applications |
03/04/2020 |
100 |