Suhaimi Ibrahim
Suhaimi Ibrahim
Verified email at utm.my - Homepage
TitleCited byYear
Camouflage in malware: from encryption to metamorphism
BB Rad, M Masrom, S Ibrahim
International Journal of Computer Science and Network Security 12 (8), 74-83, 2012
1132012
Evaluation of SQL injection detection and prevention techniques
A Tajpour, MJJ zade Shooshtari
2010 2nd International Conference on Computational Intelligence …, 2010
522010
SQL injection detection and prevention tools assessment
A Tajpour, MZ Heydari, M Masrom, S Ibrahim
2010 3rd International Conference on Computer Science and Information …, 2010
522010
An overview of success factors for CRM
F Arab, H Selamat, M Zamani
2010 2nd IEEE International Conference on Information and Financial …, 2010
452010
An automated framework for software test oracle
SR Shahamiri, WMNW Kadir, S Ibrahim, SZM Hashim
Information and Software Technology 53 (7), 774-788, 2011
442011
Evolution of computer virus concealment and anti-virus techniques: a short survey
BB Rad, M Masrom, S Ibrahim
arXiv preprint arXiv:1104.1070, 2011
402011
Opcodes histogram for classifying metamorphic portable executables malware
BB Rad, M Masrom, S Ibrahim
2012 International Conference on e-Learning and e-Technologies in Education …, 2012
382012
SQL injection is still alive: a study on SQL injection signature evasion techniques
A Sadeghian, M Zamani, S Ibrahim
2013 International Conference on Informatics and Creative Multimedia, 265-268, 2013
372013
Outlier detection in stream data by clustering method
H Moradi Koupaie, S Ibrahim, J Hosseinkhani
International Journal of Advanced Computer Science and Information …, 2014
352014
Web application security by sql injection detectiontools
A Tajpour, S Ibrahim, M Sharifi
IJCSI International Journal of Computer Science Issues 9 (2), 332-339, 2012
342012
SQL injection detection and prevention techniques
A Tajpour, S Ibrahim, M Masrom
International Journal of Advancements in Computing Technology 3 (7), 82-91, 2011
342011
Adoption factors and implementation steps of ITSM in the target
M Ayat, M Sharifi, S Sahibudin, S Ibrahim
2009 Third Asia International Conference on Modelling & Simulation, 369-374, 2009
332009
Redirecting network traffic toward a fake DNS server on a LAN
M Janbeglou, M Zamani, S Ibrahim
2010 3rd International Conference on Computer Science and Information …, 2010
312010
A requirements traceability to support change impact analysis
S Ibrahim, NB Idris, M Munro, A Deraman
Asian Journal of Information Tech 4 (4), 345-355, 2005
292005
Artificial neural networks as multi-networks automated test oracle
SR Shahamiri, WMN Wan-Kadir, S Ibrahim, SZM Hashim
Automated Software Engineering 19 (3), 303-334, 2012
272012
A comparative evaluation of state-of-the-art approaches for web service composition
SGH Tabatabaei, WMNW Kadir, S Ibrahim
2008 The Third International Conference on Software Engineering Advances …, 2008
252008
An evaluation of test coverage tools in software testing
M Shahid, S Ibrahim
2011 International Conference on Telecommunication Technology and …, 2011
242011
A study on test coverage in software testing
M Shahid, S Ibrahim, MN Mahrin
Advanced Informatics School (AIS), Universiti Teknologi Malaysia …, 2011
242011
Implementing a Document-based Requirements Traceability: A Case Study.
S Ibrahim, NB Idris, M Munro, A Deraman
IASTED Conf. on Software Engineering, 124-131, 2005
222005
A comparative evaluation of state-of-the-art web service composition testing approaches
HM Rusli, M Puteh, S Ibrahim, SGH Tabatabaei
Proceedings of the 6th International Workshop on Automation of Software Test …, 2011
212011
The system can't perform the operation now. Try again later.
Articles 1–20