Follow
Mohd Aizaini Maarof
Mohd Aizaini Maarof
Professor of Information Security, Universiti Teknologi Malaysia (UTM)- Research ID: L-4331-2013
Verified email at utm.my
Title
Cited by
Cited by
Year
Fraud detection system: A survey
A Abdallah, MA Maarof, A Zainal
Journal of Network and Computer Applications 68, 90-113, 2016
6662016
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
BAS Al-Rimy, MA Maarof, SZM Shaid
Computers & Security 74, 144-166, 2018
3802018
Malware detection based on hybrid signature behaviour application programming interface call graph
AAE Elhadi, MA Maarof, AH Osman
American Journal of Applied Sciences 9 (3), 283, 2012
1312012
Improving the detection of malware behaviour using simplified data dependent API call graph
AAE Elhadi, MA Maarof, B Barry
International Journal of Security and Its Applications 7 (5), 29-42, 2013
1062013
Ensemble classifiers for network intrusion detection system
A Zainal, MA Maarof, SM Shamsuddin
Journal of Information Assurance and Security 4 (3), 217-225, 2009
1062009
Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues
MA Rassam, A Zainal, MA Maarof
Sensors 13 (8), 10087-10122, 2013
902013
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
BAS Al-rimy, MA Maarof, SZM Shaid
Future Generation Computer Systems 101, 476-491, 2019
872019
A survey of intrusion detection schemes in wireless sensor networks
MA Rassam, MA Maarof, A Zainal
American Journal of Applied Sciences 9 (10), 1636, 2012
862012
Malware behavior image for malware variant identification
SZM Shaid, MA Maarof
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
782014
Feature selection using Rough-DPSO in anomaly intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
Computational Science and Its Applications–ICCSA 2007: International …, 2007
752007
Enhancing the detection of metamorphic malware using call graphs
AAE Elhadi, MA Maarof, BIA Barry, H Hamza
computers & security 46, 62-78, 2014
682014
Adaptive and online data anomaly detection for wireless sensor systems
MA Rassam, MA Maarof, A Zainal
Knowledge-Based Systems 60, 44-57, 2014
642014
Zero-day aware decision fusion-based model for crypto-ransomware early detection
BAS Al-rimy, MA Maarof, YA Prasetyo, SZM Shaid, AFM Ariffin
International Journal of Integrated Engineering 10 (6), 2018
612018
Feature selection using rough set in intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006
582006
A 0-day aware crypto-ransomware early behavioral detection framework
BAS Al-rimy, MA Maarof, SZM Shaid
Recent Trends in Information and Communication Technology: Proceedings of …, 2018
542018
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection
BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid, FA Ghaleb, A Almalawi, ...
Future Generation Computer Systems 115, 641-658, 2021
532021
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency …
FA Ghaleb, MA Maarof, A Zainal, MA Rassam, F Saeed, M Alsaedi
Vehicular Communications 20, 100186, 2019
492019
Artificial immune network clustering approach for anomaly intrusion detection
MA Rassam, MA Maarof
Journal of Advances in Information Technology 3 (3), 147-154, 2012
422012
Intelligent alert clustering model for network intrusion analysis
MM Siraj, MA Maarof, SZM Hashim
Int. J. Advance. Soft Comput. Appl 1 (1), 1-16, 2009
412009
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications
MA Rassam, A Zainal, MA Maarof
Applied Soft Computing 13 (4), 1978-1996, 2013
402013
The system can't perform the operation now. Try again later.
Articles 1–20