Shahrin Sahib
Cited by
Cited by
Mapping process of digital forensic investigation framework
SR Selamat, R Yusof, S Sahib
International Journal of Computer Science and Network Security 8 (10), 163-169, 2008
An introduction to image steganography techniques
AAJ Altaay, SB Sahib, M Zamani
2012 international conference on advanced computer science applications and …, 2012
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
Intrusion alert correlation technique analysis for heterogeneous log
R Yusof, SR Selamat, S Sahib
IJCSNS International Journal of Computer Science and Network Security 8 (9 …, 2008
A new generic taxonomy on hybrid malware detection technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
arXiv preprint arXiv:0909.4860, 2009
Perception on cyber terrorism: A focus group discussion approach
R Ahmad, Z Yunos, S Sahib, M Yusoff
Scientific Research Publishing, 2012
Technical security metrics model in compliance with ISO/IEC 27001 standard
M Azuwa, R Ahmad, S Sahib, S Shamsuddin
International Journal of Cyber-Security and Digital Forensics 1 (4), 280-288, 2012
Drone tracking modelling ontology for tourist behavior
JF Rusdi, S Salam, NA Abu, S Sahib, M Naseer, AA Abdullah
Journal of Physics: Conference Series 1201 (1), 012032, 2019
A framework of features selection for ipv6 network attacks detection
M Zulkiflee, M Azmi, S Ahmad, S Sahib, M Ghani
WSEAS Trans Commun 14 (46), 399-408, 2015
On the choice of the wavelets for ECG data compression
R Besar, C Eswaran, S Sahib, RJ Simpson
2000 IEEE International Conference on Acoustics, Speech, and Signal …, 2000
Mapping the Futures of Malaysian Higher Education: A Meta-Analysis of Futures Studies in the Malaysian Higher Education Scenario.
F Ithnin, S Sahib, CK Eng, S Sidek, RNSR Harun
Journal of Futures Studies 22 (3), 2018
Understanding cyber terrorism: The grounded theory method applied
R Ahmad, Z Yunos, S Sahib
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
Threshold verification technique for network intrusion detection system
MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar
arXiv preprint arXiv:0906.3843, 2009
Collective information structure model for information security risk assessment (ISRA)
P Shamala, R Ahmad, AH Zolait, S bin Sahib
Journal of Systems and Information Technology 17 (2), 193-219, 2015
A forensic traceability index in digital forensic investigation
SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah
Scientific Research Publishing, 2013
Image watermarking using psychovisual threshold over the edge
NA Abu, F Ernawan, N Suryana, S Sahib
Information and Communication Technology: International Conference, ICT …, 2013
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy
Int. J. Netw. Secur. 19 (5), 727-733, 2017
Response quality evaluation in heterogeneous question answering system: a black-box approach
GO Sing, C Ardil, W Wong, S Sahib
Proceedings of World Academy of Science, Engineering and Technology 9, 2006
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
2013 International Conference on Technology, Informatics, Management …, 2013
Dimension of mobile security model: Mobile user security threats and awareness
M Sheila, MA Faizal, S Shahrin
International Journal of Mobile Learning and Organisation 9 (1), 66-85, 2015
The system can't perform the operation now. Try again later.
Articles 1–20