Maheyzah Md Siraj

Orcid: 0000-0003-4431-8419

According to our database1, Maheyzah Md Siraj authored at least 12 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An effective attack scenario construction model based on identification of attack steps and stages.
Int. J. Inf. Sec., October, 2023

2022
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey.
Sensors, 2022

2021
Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification.
Wirel. Commun. Mob. Comput., 2021

An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification.
CoRR, 2021

A Review of Anomaly Intrusion Detection Systems in IoT using Deep Learning Techniques.
Adv. Data Sci. Adapt. Anal., 2021

HAC: Model for Privacy-Preserving Outsourced Data Over Cloud.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2019
Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

A Survey on Privacy Preserving Data Mining Approaches and Techniques.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

2014
Towards metamodel-based approach for Information Security Awareness Management.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A taxonomy on intrusion alert aggregation techniques.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Handwritten alphabets recognition using twelve directional feature extraction and self organizing maps.
Proceedings of the 2014 International Conference on Computer, 2014

2009
Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...