Follow
Mohd Zaki Mas'ud
Mohd Zaki Mas'ud
Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka
Verified email at utem.edu.my - Homepage
Title
Cited by
Cited by
Year
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
872014
Generic taxonomy of social engineering attack
F Mohd Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas' ud
65*2011
A New Generic Taxonomy on Hybrid Malware Detection Technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
Arxiv preprint arXiv:0909.4860, 2009
522009
Machine Learning for HTTP Botnet Detection Using Classifier Algorithms
RFM Dollah, MA Faizal, F Arif, MZ Mas’ud, LK Xin
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
432018
Revealing the criterion on botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, SR Selamat, R Yusof
International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013
362013
Analysis of phishing susceptibility in a workplace: a big-five personality perspectives
S Anawar, DL Kunasegaran, MZ Mas’ud, NA Zakaria
J Eng Sci Technol 14 (5), 2865-2882, 2019
322019
Threshold Verification Technique for Network Intrusion Detection System
A Mohd Faizal, M Mohd Zaki, S Shahrin, Y Robiah, S Siti Rahayu
International Journal of Computer Science and Information Security 2 (1), 2009
24*2009
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy
Int. J. Netw. Secur. 19 (5), 727-733, 2017
202017
A systematic literature review on the security and privacy of the blockchain and cryptocurrency
A Hassan, MZ Mas' ud, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ...
OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020
192020
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
2013 International Conference on Technology, Informatics, Management …, 2013
162013
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
162010
Android Malware Detection System Classification
MZ Mas’ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
142014
Profiling mobile malware behaviour through hybrid malware analysis approach
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
142013
Implementation of IPv6 network testbed: Intrusion detection system on transition mechanism
N Bahaman, P Anton Satria, MZ Mas' ud
Journal of Applied Sciences 11 (1), 118-124, 2011
132011
Recognizing API features for malware detection using static analysis
SMA Ghani, MF Abdollah, R Yusof, MZ Mas’ud
Journal of Wireless Networking and Communications 5 (2A), 6-12, 2015
102015
A Review of Digital Forensics Framework for Blockchain in Cryptocurrency Technology
MZ Mas’ud, A Hassan, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ...
2021 3rd International Cyber Resilience Conference (CRC), 1-6, 2021
92021
An improved traditional worm attack pattern
Y Robiah, SS Rahayu, S Sahib, MM Zaki, MA Faizal, R Marliza
Information Technology (ITSim), 2010 International Symposium in 2, 1067-1072, 2010
92010
New Multi-step Worm Attack Model
Y Robiah, SS Rahayu, S Shahrin, MA Faizal, MM Zaki, R Marliza
Arxiv preprint arXiv:1001.3477, 2010
82010
IOT TECHNOLOGICAL DEVELOPMENT: PROSPECT AND IMPLICATION FOR CYBERSTABILITY
SBANAB ZAKARIA, MZBIN MAS'UD, ZBIN MUSLIM, NB HARUM, ...
International Journal of Advanced Computer Science and Applications 10 (2), 2019
72019
Recognizing P2P botnets characteristic through TCP distinctive behaviour
RS Abdullah, MZ Mas' ud, MF Abdollah, S Sahib, R Yusof
International Journal of Computer Science and Information Security 9 (12), 7, 2011
72011
The system can't perform the operation now. Try again later.
Articles 1–20