Norbik Bashah Idris

Orcid: 0000-0001-7711-6819

According to our database1, Norbik Bashah Idris authored at least 26 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing Academic Certificate Privacy with a Hyperledger Fabric Blockchain-Based Access Control Approach.
SN Comput. Sci., September, 2023

2021
A New Decentralized Certification Verification Privacy Control Protocol.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2019
Detecting False Messages in the Smartphone Fault Reporting System.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

2018
State of the Art Intrusion Detection System for Cloud Computing.
Int. J. Commun. Networks Inf. Secur., 2018

Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System.
Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, 2018

2017
CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism.
Int. J. Commun. Networks Inf. Secur., 2017

2014
Security risk assessment framework for cloud computing environments.
Secur. Commun. Networks, 2014

2013
A Unified Trust Model for Pervasive Environments - Simulation and Analysis.
KSII Trans. Internet Inf. Syst., 2013

Unified trust establishment by leveraging remote attestation - modeling and analysis.
Inf. Manag. Comput. Secur., 2013

A Survey on Querying Encrypted Data for Database as a Service.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Prediction of Relevance between Requests and Web Services Using ANN and LR Models.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

2012
Contemporary Semantic Web Service Frameworks: An Overview and Comparisons
CoRR, 2012

Distributed Intrusion Detection trust management through integrity and expertise evaluation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2009
Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

2006
An XML-based Security Management Model for Multilevel Security Databases.
Int. Arab J. Inf. Technol., 2006

A Software Traceability Validation For Change Impact Analysis of Object Oriented Software.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Novel Attack Detection Using Fuzzy Logic and Data Mining.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
nhancing Cognitive Aspects of Software Visualization Using DocLike Modularized Graph.
Int. Arab J. Inf. Technol., 2005

Integrating Software Traceability for Change Impact Analysis.
Int. Arab J. Inf. Technol., 2005

Implementing a Document-based Requirements Traceability: A Case Study.
Proceedings of the IASTED International Conference on Software Engineering, 2005

2003
Re-documenting, Visualizing and Understanding Software System Using DocLike Viewer.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

Case study: Reconnaissance techniques to support feature location using RECON2.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Production and Maintenance of System Documentation: What, Why, When and How Tools Should Support the Practice.
Proceedings of the 9th Asia-Pacific Software Engineering Conference (APSEC 2002), 2002

1994
Providing Dynamic Security Control in a Federated Database.
Proceedings of the VLDB'94, 1994

1993
Integration of Secrecy Features in a Federated Database Environment.
Proceedings of the Database Security, 1993


  Loading...