A survey about impacts of cloud computing on digital forensics F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin, ... International Journal of Cyber-Security and Digital Forensics 2 (2), 77-95, 2013 | 76 | 2013 |
Digital forensic trends and future FN Dezfoli, A Dehghantanha, R Mahmoud, NFBM Sani, F Daryabar International Journal of Cyber-Security and Digital Forensics 2 (2), 48-77, 2013 | 72 | 2013 |
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah IEEE Access 8, 70651-70663, 2020 | 63 | 2020 |
An effective security alert mechanism for real-time phishing tweet detection on Twitter SW Liew, NFM Sani, MT Abdullah, R Yaakob, MY Sharum Computers & security 83, 201-207, 2019 | 60 | 2019 |
MRMR BA: a hybrid gene selection algorithm for cancer classification OA Alomari, AT Khader, MA Al-Betar, LM Abualigah J Theor Appl Inf Technol 95 (12), 2610-2618, 2017 | 56 | 2017 |
Unit testing approaches for BPEL: a systematic review Z Zakaria, R Atan, AAA Ghani, NFM Sani 2009 16th Asia-Pacific Software Engineering Conference, 316-322, 2009 | 52 | 2009 |
Volatile memory acquisition using backup for forensic investigation FN Dezfouli, A Dehghantanha, R Mahmoud, NFBM Sani, ... Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 42 | 2012 |
Towards secure model for SCADA systems F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 40 | 2012 |
S-scrum: a secure methodology for agile development of web services D Mougouei, NFM Sani, MM Almasi World of Computer Science and Information Technology Journal (WCSIT) 3 (1 …, 2013 | 38 | 2013 |
Enhance Luhn algorithm for validation of credit cards numbers KW Hussein, NFM Sani, R Mahmod, MT Abdullah Int. J. Comput. Sci. Mob. Comput 2 (7), 262-272, 2013 | 21 | 2013 |
A survey on security awareness among social networking users in Malaysia I Ishak, F Sidi, MA Jabar, NFM Sani, A Mustapha, SR Supian, M Apau Australian Journal of Basic and Applied Sciences 6 (12), 23-29, 2012 | 20 | 2012 |
SEMANTIC SCHEMA MATCHING APPROACHES: A REVIEW. J HOSSAIN, NFM Sani, LS AFFENDEY, I Ishak, KA KASMIRAN Journal of Theoretical & Applied Information Technology 62 (1), 2014 | 15 | 2014 |
Mobile plant tagging system for urban forest eco-tourism using QR code I Ishak, F Sidi, LS Affendey, NFM Sani, AS Hamzah, P Bawon 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 14 | 2013 |
A survey on malware analysis and detection techniques FN Dezfouli, A Dehghantanha, R Mahmod, NFBM Sani, SB Shamsuddin, ... International Journal of Advancements in Computing Technology 5 (14), 42, 2013 | 14 | 2013 |
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine MAM Isa, MM Ahmad, NFM Sani, H Hashim, R Mahmod Procedia Computer Science 42, 263-270, 2014 | 13 | 2014 |
Nonnegative matrix factorization and metamorphic malware detection YT Ling, NFM Sani, MT Abdullah, NAWA Hamid Journal of Computer Virology and Hacking Techniques 15, 195-208, 2019 | 11 | 2019 |
A survey on privacy impacts of digital investigation F Daryabar, A Dehghantanha, NI Udzir, NFM Sani, S Shamsuddin, ... Journal of Next Generation Information Technology 4 (8), 2013 | 11 | 2013 |
An indexed non-probability skyline query processing framework for uncertain data MM Lawal, H Ibrahim, NF Mohd Sani, R Yaakob International Conference on Advanced Machine Learning Technologies and …, 2020 | 10 | 2020 |
Analyses of indexing techniques on uncertain data with high dimensionality H Ibrahim, NFM Sani, R Yaakob IEEE Access 8, 74101-74117, 2020 | 9 | 2020 |
Permission extraction framework for android malware detection A Ghasempour, NFM Sani, JA Ovye International Journal of Advanced Computer Science and Applications 11 (11), 2020 | 9 | 2020 |