Mohamad Fadli Bin Zolkipli

Orcid: 0000-0002-6780-8480

According to our database1, Mohamad Fadli Bin Zolkipli authored at least 17 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Malware Detection Issues, Future Trends and Challenges: A Survey.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2022
Internet of Things (IoT): A Study of Security Issues and Challenges.
Int. J. Recent Contributions Eng. Sci. IT, June, 2022

Challenges and Issues in Implementing Personal Data Protection.
Int. J. Recent Contributions Eng. Sci. IT, June, 2022

2020
A Smart Framework for Mobile Botnet Detection Using Static Analysis.
KSII Trans. Internet Inf. Syst., 2020

Globalized firefly algorithm and chaos for designing substitution box.
J. Inf. Secur. Appl., 2020

2019
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map.
Neural Comput. Appl., 2019

Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map.
Cryptologia, 2019

2018
A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization.
IEEE Access, 2018

Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System.
ICO, 2018

2017
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey.
J. Netw. Comput. Appl., 2017

From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions.
Algorithms, 2017

Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing.
Proceedings of the Advances on P2P, 2017

2016
Traceback model for identifying sources of distributed attacks in real time.
Secur. Commun. Networks, 2016

Present Status and Challenges in Cloud Monitoring Framework: A Survey.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2014
Trusting cloud computing for personal files.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

2013
Use of cryptography in cloud computing.
Proceedings of the 2013 IEEE International Conference on Control System, 2013

2011
A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring.
Proceedings of the Software Engineering and Computer Systems, 2011


  Loading...