Ramlan Mahmod

Orcid: 0000-0003-1359-0444

According to our database1, Ramlan Mahmod authored at least 48 papers between 2001 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
State of the Art in Biometric Key Binding and Key Generation Schemes.
Int. J. Commun. Networks Inf. Secur., 2017

Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies.
CoRR, 2017

Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies.
CoRR, 2017

Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
Optimizing {0, 1, 3}-NAF Recoding Algorithm Using Block-Method Technique in Elliptic Curve Cryptosystem.
J. Comput. Sci., 2016

A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016

A Formal Calculus for International Relations Computation and Evaluation.
CoRR, 2016

A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A Hybrid Scheme for Face Template Protection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation.
CoRR, 2015

Data Warehousing Based Computer Forensics Investigation Framework.
Proceedings of the 12th International Conference on Information Technology, 2015

Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2014
Intrusion Detection System in Secure Shell Traffic in Cloud Environment.
J. Comput. Sci., 2014

Extending TLS with Mutual Attestation for Platform Integrity Assurance.
J. Commun., 2014

An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices.
CoRR, 2014

A Secure TFTP Protocol with Security Proofs.
CoRR, 2014

Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes.
Proceedings of the Computational Forensics, 2014

Push-based XML access control policy languages: A review.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Distributed Denial of Service detection using hybrid machine learning technique.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

RF simulator for cryptographic protocol.
Proceedings of the 2014 IEEE International Conference on Control System, 2014

An approach for forensic investigation in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

Mobile forensic data acquisition in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

2013
Trends In Android Malware Detection.
J. Digit. Forensics Secur. Law, 2013

Temporal, Delegable and Cheap Update Access control to published XML Documents.
J. Comput. Sci., 2013

Comparison of ECC and RSA Algorithm in Resource Constrained Devices.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems.
Int. J. Nat. Comput. Res., 2012

Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Active warden as the main hindrance for steganography information retrieval.
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012

Multi-resolution Joint Auto Correlograms: Determining the distance function.
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012

A proposal for improving AES S-box with rotation and key-dependent.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Finest authorizing member of common criteria certification.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Volatile memory acquisition using backup for forensic investigation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Forensics investigation challenges in cloud computing environments.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
File Integrity Monitor Scheduling Based on File Security Level Classification.
Proceedings of the Software Engineering and Computer Systems, 2011

Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Immune Systems Approaches for Cryptographic Algorithm.
Proceedings of the Sixth International Conference on Bio-Inspired Computing: Theories and Applications, 2011

Towards data centric mobile security.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition.
Comput. Speech Lang., 2010

Towards a Pervasive Formal Privacy Language.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2008
A Survey on Cryptography Algorithms in Security of Voting System Approaches.
Proceedings of the Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, 2008

2007
An Integrated Color-Spatial Approach for Content-Based Image Retrieval.
Proceedings of the 2007 International Conference on Multimedia Systems and Applications, 2007

2006
Modeling expressive wrinkle on human face.
Proceedings of the 4th International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2006, Kuala Lumpur, Malaysia, November 29, 2006

2005
Pola Grammar Technique to Identify Subject and Predicate in Malaysian Language.
Proceedings of the Natural Language Processing - IJCNLP 2005, Second International Joint Conference, Jeju Island, Republic of Korea, October 11-13, 2005, 2005

A Stemming Algorithm for Malay Language.
Proceedings of the 4th International Conference on IT in Asia, 2005

2003
Application of Latent Semantic Indexing on Malay-English Cross Language Information Retrieval.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

2002
A New Addition Formula for Elliptic Curves over GF(2<sup>n</sup>).
IEEE Trans. Computers, 2002

2001
Neural Expert System with Two Engines of Rough Set.
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001


  Loading...