Mohd Aizaini Maarof

Affiliations:
  • University of Technology Malaysia


According to our database1, Mohd Aizaini Maarof authored at least 72 papers between 1997 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification.
Wirel. Commun. Mob. Comput., 2021

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection.
Future Gener. Comput. Syst., 2021

A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

HAC: Model for Privacy-Preserving Outsourced Data Over Cloud.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

Ransomware Anti-Analysis and Evasion Techniques: A Survey and Research Directions.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

Advanced Persistent Threat Detection: A Survey.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature Selection.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2020
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach.
IEEE Access, 2020

A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction.
IEEE Access, 2020

2019
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between the cooperative awareness messages.
Veh. Commun., 2019

Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network.
Remote. Sens., 2019

An optimized skin texture model using gray-level co-occurrence matrix.
Neural Comput. Appl., 2019

Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection.
Future Gener. Comput. Syst., 2019

Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network.
IEEE Access, 2019

Fraudulent e-Commerce Website Detection Model Using HTML, Text and Image Features.
Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), 2019

Malware Behavior Profiling from Unstructured Data.
Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), 2019

Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

2018
A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier.
Int. J. Sens. Networks, 2018

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection.
CoRR, 2018

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions.
Comput. Secur., 2018

2017
GAZELLE: An Enhanced Random Network Coding Based Framework for Efficient P2P Live Video Streaming Over Hybrid WMNs.
Wirel. Pers. Commun., 2017

Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques.
Proceedings of the Hybrid Intelligent Systems, 2017

2016
Fraud detection system: A survey.
J. Netw. Comput. Appl., 2016

Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2016

Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media.
Proceedings of the Data Mining and Big Data, First International Conference, 2016

2015
Efficient P2P Live Video Streaming Over Hybrid WMNs Using Random Network Coding.
Wirel. Pers. Commun., 2015

Principal component analysis-based data reduction model for wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015

2014
Adaptive and online data anomaly detection for wireless sensor systems.
Knowl. Based Syst., 2014

Enhancing the detection of metamorphic malware using call graphs.
Comput. Secur., 2014

Islamic Web Content Filtering and Categorization on Deviant Teaching.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014

Enhanced Rules Application Order Approach to Stem Reduplication Words in Malay Texts.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014

Malware behavior image for malware variant identification.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Improved skin detection based on dynamic threshold using multi-colour space.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues.
Sensors, 2013

GREENIE: a novel hybrid routing protocol for efficient video streaming over wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2013

Efficient image duplicated region detection model using sequential block clustering.
Digit. Investig., 2013

An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications.
Appl. Soft Comput., 2013

Dynamic Innate Immune System Model for Malware Detection.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Malware Analysis with Multiple Features.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory.
Proceedings of the International Conference on IT Convergence and Security, 2012

One-Class Principal Component Classifier for anomaly detection in wireless sensor network.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

Design of Adaptive IDS with Regulated Retraining Approach.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

2011
Improved Web Page Identification Method Using Neural Networks.
Int. J. Comput. Intell. Appl., 2011

Spiral unique sequence: A new rotation invariant feature for small-size image block matching.
Proceedings of the 2011 IEEE International Conference on Signal and Image Processing Applications, 2011

Multi-classifier Scheme with Low-Level Visual Feature for Adult Image Classification.
Proceedings of the Software Engineering and Computer Systems, 2011

Malware Detection Techniques Using Artificial Immune System.
Proceedings of the International Conference on IT Convergence and Security, 2011

Ensemble based categorization and adaptive model for malware detection.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

A novel intrusion detection framework for Wireless Sensor Networks.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2009
A New Clustering Method Based on Weighted Kernel K-Means for Non-linear Data.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

Fuzzy Mamdani Inference System Skin Detection.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Comparative Statistical Analysis of Pseudorandom Bit Sequences.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content Classification.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

The Concept of Bio-fitness in Bio-inspired Computational Metaphor Abstraction.
Proceedings of the Wireless Networks, 2008

Data Reduction and Ensemble Classifiers in Intrusion Detection.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

Towards Identifying Features of Trust in Mobile Ad Hoc Network.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

Ensemble of One-Class Classifiers for Network Intrusion Detection System.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

LoSS Detection Approach Based on ESOSS and ASOSS Models.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

A Friend Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection.
Proceedings of the Computational Science and Its Applications, 2007

2005
Diffusion Analysis of a Scalable Fiestel Network.
Proceedings of the Third World Enformatika Conference, 2005

Polymorphism and Danger Susceptibility of System Call DASTONs.
Proceedings of the Artificial Immune Systems: 4th International Conference, 2005

2004
Towards Danger Theory Based Artificial APC Model: Novel Metaphor for Danger Susceptible Data Codons.
Proceedings of the Artificial Immune Systems, Third International Conference, 2004

Solving Time Gap Problems through the Optimization of Detecting Stepping Stone Algorithm.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
A Hybrid Trust Management Model for MAS Based Trading Society.
Int. Arab J. Inf. Technol., 2003

Towards Solving Time Gap Problems through the Optimization of Packet Capture Technique.
Proceedings of the 3th International Conference on IT in Asia, 2003

Attack on Intrusion Detection System Host: Simulation and Analysis.
Proceedings of the 3th International Conference on IT in Asia, 2003

Enforcing Multilevel Security Policies for Network Firewall.
Proceedings of the 3th International Conference on IT in Asia, 2003

2000
Integrating security services into computer supported cooperative work.
PhD thesis, 2000

1997
Integrating Security Services Into Collaborative Systems.
Proceedings of WebNet 97, 1997


  Loading...