Asrul Hadi bin Yaacob
Asrul Hadi bin Yaacob
Verified email at
Cited by
Cited by
Arima based network anomaly detection
AH Yaacob, IKT Tan, SF Chien, HK Tan
2010 Second International Conference on Communication Software and Networks …, 2010
IPSec over Heterogeneous IPv4 and IPv6 Networks: Issues and Implementation
NM Ahmad, AH Yaacob
International Journal of Computer Networks Communications 4 (5), 57-72, 2012
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
Revealing the Influence of Feature Selection for Fast Attack Detection
MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MF Iskandar
International Journal of Computer Science and Network Security 8 (8), 107-115, 2008
Moving Towards Positive Security Model for Web Application Firewall
AH Yaacob, NM Ahmad, NN Ahmad, M Roslee
World Academy Of Science, Engineering And Technology 72, 1759-1764, 2012
Performance analysis of MapReduce on OpenStack-based Hadoop virtual cluster
NM Ahmad, AH Yaacob, AHM Amin, S Kannan
2014 IEEE 2nd International Symposium on Telecommunication Technologies …, 2014
End to end ipsec support across ipv4/Ipv6 translation gateway
NM Ahmad, AH Yaacob
2010 Second International Conference on Network Applications, Protocols and …, 2010
An Earlier Detection Framework for Network Intrusion Detection System
MA Faizal, HY Asrul, S Shahrin
Proceeding of the Second International Conference on Advances in Information …, 2007
Host based detection approach using time based module for fast attack detection behavior
FM Abdollah, MZ Mas’ ud, S Sahib, AH Yaacob, R Yusof, SR Selamat
Recent Progress in Data Engineering and Internet Technology: Volume 2, 163-171, 2012
IKE authentication using certificateless signature
AH Yaacob, NM Ahmad, R Fauzi, MSAM Shikh
The International Conference on Information Networking 2011 (ICOIN2011), 447-452, 2011
Performance analysis of certificateless signature for IKE authentication
NM Ahmad, AH Yaacob, R Fauzi, A Khorram
International Journal of Computer and Information Engineering 5 (2), 211-218, 2011
Improved Fast Attack Detection Model for Network Intrusion Detection
MF Abdollah, AH Yaacob, S Sahib
Proceeding of International Conference on Engineering and ICT, UTeM, 2007
Towards Early Detection of Network Intrusion
S Shahib, MF Abdollah, AH Yaacob
Network performance testing on VM based autonomous web server
MZ Mas' ud, AH Yaacob, NM Ahmad
2006 International Conference on Computing & Informatics, 1-6, 2006
Secure partial secret key issuing in Certificateless Public Key Infrastructure
S Mehrasa, NM Ahmad, A Khorram, AH Yaacob
2011 IEEE Student Conference on Research and Development, 79-84, 2011
Comparative analysis and implementation of certificateless based authentication scheme
NM Ahmad, AH Yaacob, A Khorram, JF Tan, YH Ong, YM Leong
Informatics Engineering and Information Science: International Conference …, 2011
Feature Selection For Detecting Fast Attack in Network Intrusion Detection
MA Faizal, S Shahrin, HY Asrul, MIO Fairuz, Y Robbie
Journal of Advanced Manufacturing Technology 2 (2), 39-56, 2008
Virtual Machine based Autonomous Web Server
MZ Mas’ud, MA Faizal, Y Asrul Hadi, NM Ahmad, H Erman
Recent Progress in Data Engineering and Internet Technology 157 (2), 173-182, 2012
IPSec Authentication using Certificateless Signature in Heterogeneous IPv4/IPv6 Network
NM Ahmad, AH Yaacob, R Fauzi, A Khorram, JAK Lama
IEEE Symposium on Computers & Informatics, 668 - 673, 2011
A Hybrid Method For K-Anonymization Using Clustering Technique
S Sahib, MK Abd Ghani, AH Yaacob
International Conference on Aerospace Engineering and Information Technology …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20