Aman Jantan

Orcid: 0000-0001-9899-2287

Affiliations:
  • Universiti Sains Malaysia, School of Computer Science, Penang, Malaysia


According to our database1, Aman Jantan authored at least 42 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Multi-Behavior RFM Model Based on Improved SOM Neural Network Algorithm for Customer Segmentation.
IEEE Access, 2022

Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks.
IEEE Access, 2022

2021
The effects of feature selection on the classification of encrypted botnet.
J. Comput. Virol. Hacking Tech., 2021

A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

2020
Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp.
Wirel. Pers. Commun., 2020

Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization.
Neural Process. Lett., 2020

A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm.
Neural Comput. Appl., 2020

HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys.
Health Informatics J., 2020

Formal knowledge model for online social network forensics.
Comput. Secur., 2020

An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons.
IEEE Access, 2020

Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
An enhanced Bat algorithm with mutation operator for numerical optimization problems.
Neural Comput. Appl., 2019

Evidence collection and forensics on social networks: Research challenges and directions.
Digit. Investig., 2019

A multilayered semantic framework for integrated forensic acquisition on social media.
Digit. Investig., 2019

A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems.
IEEE Access, 2019

Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition.
IEEE Access, 2019

2018
Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems.
Neural Comput. Appl., 2018

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence.
J. Inf. Process. Syst., 2018

A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons.
Cogn. Comput., 2018

2016
Filtration model for the detection of malicious traffic in large-scale networks.
Comput. Commun., 2016

2014
Swarm intelligence and neural network for data classification.
Proceedings of the 2014 IEEE International Conference on Control System, 2014

2013
Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse.
J. Netw. Syst. Manag., 2013

Real-Time Detection of Intrusive Traffic in QoS Network Domains.
IEEE Secur. Priv., 2013

E-Cyborg: The cybercrime evidence finder.
Proceedings of the 8th International Conference on Information Technology in Asia, 2013

2012
Multi-Connect Architecture (MCA) Associative Memory: A Modified Hopfield Neural Network.
Intell. Autom. Soft Comput., 2012

A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
SLA-based complementary approach for network intrusion detection.
Comput. Commun., 2011

A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring.
Proceedings of the Software Engineering and Computer Systems, 2011

A Framework for Optimizing Malware Classification by Using Genetic Algorithm.
Proceedings of the Software Engineering and Computer Systems, 2011

F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics.
Proceedings of the Software Engineering and Computer Systems, 2011

Attack Intention Analysis Model for Network Forensics.
Proceedings of the Software Engineering and Computer Systems, 2011

A Secure Storage Model to Preserve Evidence in Network Forensics.
Proceedings of the Software Engineering and Computer Systems, 2011

A New Approach Based on Honeybee to Improve Intrusion Detection System Using Neural Network and Bees Algorithm.
Proceedings of the Software Engineering and Computer Systems, 2011

2010
A Potent Model for Unwanted Traffic Detection in QoS Network Domain.
J. Digit. Content Technol. its Appl., 2010

2009
An approach for monitoring pedestrian by using multi-connect architected MCA associative memory.
J. Digit. Content Technol. its Appl., 2009

Clustering-Based Frequency l-Diversity Anonymization.
Proceedings of the Advances in Information Security and Assurance, 2009

Honeybee-Based Model to Detect Intrusion.
Proceedings of the Advances in Information Security and Assurance, 2009

Privacy Risk Diagnosis: Mining <i>l</i>-Diversity.
Proceedings of the Database Systems for Advanced Applications, 2009

2008
An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.
Proceedings of the Software Engineering, 2008

Safe Runtime Reconfiguration in Component-Based Software Systems.
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008

Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM-Based Intrusion Detection Sensors.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2003
An Agent-based Design Pattern for Decoupling Views of E-business System.
Proceedings of the 3th International Conference on IT in Asia, 2003


  Loading...