An intelligent virtual financial advisor system (IVFAS).

Goh Ong Sing , Shahrin Sahib , Rajendraan Elangsegaran , Kolej Universiti Teknikal Kebangsaan Malaysia
Neural Networks and Computational Intelligence 146 -151

3
2004
Pseudonmization techniques for clinical data: Privacy study in Sultan Ismail Hospital Johor Bahru

Yahaya Abd. Rahim , Shahrin Sahib , Mohd Khanapi Abd Ghani
international conference on networked computing 74 -77

3
2011
DIFS modifications to support QoS in IEEE 802.11g DCF ad-hoc networks

Shahrin Sahib , Mohd Najwan Khambari , Mohd Fairuz Iskandar Othman

2009
Intelligent responses through network-based answer discovery with advanced reasoning

Halizah Basiron , Ong-Sing Goh , Shahrin Sahib , Wilson Wong
computational intelligence 342 -347

3
2005
TECHNICAL SECURITY METRICS MODEL IN COMPLIANCE WITH ISO/IEC 27001 STANDARD

Shahrin Sahib , Rabiah Ahmad , Azuwa M.P. Azuwa , Solahuddin Shamsuddin
International Journal of Cyber-Security and Digital Forensics 1 ( 4) 280 -288

8
2012
Accurate and real time method for network packet classification

Norayu Abd Ghani , Faizal Abdollah , Shahrin Sahib
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications 79 -86

2006
Controlling B-Spline Snake Behavior using Particle Swarm Optimization

Nanna Suryana , Shahrin Sahib , Habibullah Akbar
International Journal Bioautomation 16 ( 3) 179 -186

1
2012
Reflection Decomposition in Single Images Using an Optimum Thresholding-based Method

Halizah Basiron , Gede Pramudya , Nanna Suryana , Shahrin Sahib
Journal of Advanced Computer Science and Technology 2 ( 4)

2012
Chaotic clonal selection optimisation for multi-threshold segmentation

Nanna Suryana , Shahrin Sahib , Habibullah Akbar
International Journal of Signal and Imaging Systems Engineering

1
2015
LEARNERS' ENSEMBLE BASED SECURITY CONCEPTUAL MODEL FOR M-LEARNING SYSTEM IN MALAYSIAN HIGHER LEARNING INSTITUTION

Faizal Mohd Abdollah , Shahrin Sahib , Sheila Mahalingam
International Association for Development of the Information Society

1
2014
LEARNER CENTRIC IN M-LEARNING: INTEGRATION OF SECURITY, DEPENDABILITY AND TRUST

Faizal Mohd Abdollah , Shahrin Sahib , Sheila Mahalingam
International Association for Development of the Information Society

3
2014
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.

Siti Rahayu Selamat , Mohd Zaki Mas'ud , Shahrin Sahib , Mohd Faizal Abdollah
Int. J. Netw. Secur. 19 727 -733

5
2017
Online cyberlaw knowledge base construction using semantic network

Goh Ong Sing , Wilson Wong Yik Sen , Shahrin Sahib , Mohammad Ishak Desa
Proceedings of the IASTED International Conference on Applied Simulation and Modelling

5
2004
Prototype of GIS Based Location Information Enquiry System

Anusuriya Devaraju , Nanna Suryana Herman , Shahrin Sahib , Zulkifli Muslim

2006
Preliminary study of host and network-based analysis on P2P Botnet detection

Raihana Syahirah Abdullah , Mohd Faizal Abdollah , Zul Azri Muhamad Noh , Mohd Zaki Mas' ud
2013 International Conference on Technology, Informatics, Management, Engineering and Environment 105 -109

16
2013
Drone Tracking Modelling Ontology for Tourist Behavior

Jack Febrian Rusdi , Sazilah Salam , Nur Azman Abu , Shahrin Sahib
Journal of Physics: Conference Series 1201 ( 1) 012032

30
2019
A Framework for Hoax News Detection and Analyzer used Rule-based Methods

SY Yuliani , Mohd Faizal , Shahrin Sahib , Yunus Supriadi
International Journal of Advanced Computer Science and Applications 10 ( 10)

1
2019
Enhancing the Secured Software Framework using Vulnerability Patterns and Flow Diagrams

Nor Hafeizah Hassan , Nazrulazhar Bahaman , Burairah Hussin , Shahrin Sahib
International Journal of Advanced Computer Science and Applications 9 ( 9)

2018
Profiling mobile malware behaviour through hybrid malware analysis approach

Mohd Zaki Mas'ud , Shahrin Sahib , Mohd Faizal Abdollah , Siti Rahayu Selamat
information assurance and security 78 -84

4
2013