MULTIPLE ANDROID PACKAGE FILES EXTRACTOR IN MINING REQUEST PERMISSIONS AND API CALLS

F. Arif , Y. Robiah , A. Aminordin , A. Mukhlis
Journal of Advanced Manufacturing Technology (JAMT) 12 ( 2) 11 -24

2018
A Study on Abnormal Behaviour in Mobile Application

Naqliyah Bt Zainuddin , Mohd Faizal Bin Abdollah , Robiah Bt Yusof , Shahrin Bin Sahib
Open Access Library Journal 01 ( 09) 1 -6

1
2014
Android malware classification base on application category using static code analysis

AZMI Aminordin , MA Faizal , ROBIAH Yusof
J. Theor. Appl. Inf. Technol 96 ( 11)

12
2018
Recognizing API Features for Malware Detection Using Static Analysis

Mohd Zaki Mas’ud , Saidah Mastura A. Ghani , Mohd Faizal Abdollah , Robiah Yusof
Journal of Wireless Networking and Communications 5 6 -12

2
2015
Simulation of Token Bucket Algorithm for Network Traffic Performance

Robiah Yusof , Nor Afifah Mat Nawi
JOURNAL OF ADVANCED COMPUTING TECHNOLOGY AND APPLICATION (JACTA) 2 ( 1) 1 -8

2020
Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset

Ziadoon Kamil Maseer , Robiah Yusof , Nazrulazhar Bahaman , Salama A Mostafa
IEEE Access 9 22351 -22370

101
2021
Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI)

Aswami Ariffin , Siti Rahayu , Robiah Yusof , Sahrom Abu
International Journal of Advanced Computer Science and Applications 12 ( 4)

2021
Preliminary study of host and network-based analysis on P2P Botnet detection

Raihana Syahirah Abdullah , Mohd Faizal Abdollah , Zul Azri Muhamad Noh , Mohd Zaki Mas' ud
2013 International Conference on Technology, Informatics, Management, Engineering and Environment 105 -109

16
2013
Cyber Threat Intelligence – Issue and Challenges

Md Sahrom Abu , Siti Rahayu Selamat , Aswami Ariffin , Robiah Yusof
Indonesian Journal of Electrical Engineering and Computer Science 10 ( 1) 371 -379

99
2018
An Attribution of Cyberattack using Association Rule Mining (ARM)

Md Sahrom Abu , Siti Rahayu , Robiah Yusof , Aswami Ariffin
International Journal of Advanced Computer Science and Applications 11 ( 2)

2
2020
Profiling mobile malware behaviour through hybrid malware analysis approach

Mohd Zaki Mas'ud , Shahrin Sahib , Mohd Faizal Abdollah , Siti Rahayu Selamat
information assurance and security 78 -84

4
2013
Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection

Mohd Zaki Mas'ud , Shahrin Sahib , Mohd Faizal Abdollah , Siti Rahayu Selamat
2014 International Conference on Information Science & Applications (ICISA) 1 -5

78
2014
Detecting Access Point Spoofing Attacks Using Partitioning-based Clustering

Nazrul M. Ahmad , Anang Hudaya Muhamad Amin , Subarmaniam Kannan , Mohd Faizal Abdollah
Journal of Networks 9 ( 12) 3470 -3477

2014
An empirical investigation of RSSI-based distance estimation for wireless indoor positioning system

Nazrul M. Ahmad , Anang Hudaya Muhamad Amin , Mohd Faizal Abdollah , Robiah Yusof
International Journal of Wireless and Mobile Computing 8 ( 2) 206 -212

2015
A Review Study on Cloud Computing Issues

Qusay Kanaan Kadhim , Robiah Yusof , Hamid Sadeq Mahdi , Sayed Samer Ali Al-shami
Journal of Physics: Conference Series 1018 ( 1) 012006

7
2018
A Forensic Traceability Index in Digital Forensic Investigation

Siti Rahayu Selamat , Shahrin Sahib , Nor Hafeizah , Robiah Yusof
Journal of Information Security 2013 ( 1) 19 -32

11
2013
Enhanced Alert Correlation Framework for Heterogeneous Log

Robiah Yusof , Siti Rahayu Selamat , Shahrin Sahib , Mohd Zaki Mas’ud
International Conference on Informatics Engineering and Information Science 107 -122

5
2011
A passive and privacy-friendly area based localization for wireless indoor networks

Nazrul M. Ahmad , Anang Hudaya Muhamad Amin , Subarmaniam Kannan , Afiq Muzakkir Mat Ali
2016 IEEE Region 10 Symposium (TENSYMP) 213 -218

4
2016
Traceability in digital forensic investigation process

Siti Rahayu Selamat , Robiah Yusof , Shahrin Sahib , Nor Hafeizah Hassan
ieee conference on open systems 101 -106

7
2011
Android Malware Detection System Classification

Mohd Zaki Mas`ud , Shahrin Sahib , . . , Mohd Faizal Abdollah
Research Journal of Information Technology 6 ( 4) 325 -341

4
2014