Mohd Taufik Abdullah

According to our database1, Mohd Taufik Abdullah authored at least 19 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network.
IEEE Access, 2020

2019
Nonnegative matrix factorization and metamorphic malware detection.
J. Comput. Virol. Hacking Tech., 2019

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.
IEEE Trans. Sustain. Comput., 2019

An effective security alert mechanism for real-time phishing tweet detection on Twitter.
Comput. Secur., 2019

Reliable Access Control for Mobile Cloud Computing (MCC) With Cache-Aware Scheduling.
IEEE Access, 2019

2018
Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks.
Int. J. Netw. Virtual Organisations, 2018

2016
Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload.
KSII Trans. Internet Inf. Syst., 2016

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

2015
Issues and Challenges in Anomaly Intrusion Detection for HTTP Web Services.
J. Comput. Sci., 2015

A Survey of Anomaly Detection Using Data Mining Methods for Hypertext Transfer Protocol Web Services.
J. Comput. Sci., 2015

Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2014
Packet Header Anomaly Detection Using Statistical Analysis.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Signature-Based Anomaly intrusion detection using Integrated data mining classifiers.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

An approach for forensic investigation in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

Mobile forensic data acquisition in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

2012
A Cloud-based Intrusion Detection Service framework.
Proceedings of the 2012 International Conference on Cyber Security, 2012

An overview of attacks against digital watermarking and their respective countermeasures.
Proceedings of the 2012 International Conference on Cyber Security, 2012

VoIP evidence model: A new forensic method for investigating VoIP malicious attacks.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2009
Analysis of Evidence Using Formal Event Reconstruction.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009


  Loading...