Fraud detection system: A survey A Abdallah, MA Maarof, A Zainal Journal of Network and Computer Applications 68, 90-113, 2016 | 609 | 2016 |
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions BAS Al-rimy, MA Maarof, SZM Shaid Computers & Security 74, 144-166, 2018 | 339 | 2018 |
Malware detection based on hybrid signature behaviour application programming interface call graph AAE Elhadi, MA Maarof, AH Osman American Journal of Applied Sciences 9 (3), 283, 2012 | 129 | 2012 |
Improving the detection of malware behaviour using simplified data dependent API call graph AAE Elhadi, MA Maarof, B Barry International Journal of Security and Its Applications 7 (5), 29-42, 2013 | 105 | 2013 |
Ensemble classifiers for network intrusion detection system A Zainal, MA Maarof, SM Shamsuddin Journal of Information Assurance and Security 4 (3), 217-225, 2009 | 102 | 2009 |
Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues MA Rassam, A Zainal, MA Maarof Sensors 13 (8), 10087-10122, 2013 | 85 | 2013 |
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection BAS Al-rimy, MA Maarof, SZM Shaid Future Generation Computer Systems 101, 476-491, 2019 | 80 | 2019 |
A survey of intrusion detection schemes in wireless sensor networks MA Rassam, MA Maarof, A Zainal American Journal of Applied Sciences 9 (10), 1636, 2012 | 79 | 2012 |
Feature selection using Rough-DPSO in anomaly intrusion detection A Zainal, MA Maarof, SM Shamsuddin Computational Science and Its Applications–ICCSA 2007: International …, 2007 | 74 | 2007 |
Malware behavior image for malware variant identification SZM Shaid, MA Maarof 2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014 | 72 | 2014 |
Enhancing the detection of metamorphic malware using call graphs AAE Elhadi, MA Maarof, BIA Barry, H Hamza computers & security 46, 62-78, 2014 | 67 | 2014 |
Adaptive and online data anomaly detection for wireless sensor systems MA Rassam, MA Maarof, A Zainal Knowledge-Based Systems 60, 44-57, 2014 | 63 | 2014 |
Zero-day aware decision fusion-based model for crypto-ransomware early detection BAS Al-rimy, MA Maarof, YA Prasetyo, SZM Shaid, AFM Ariffin International Journal of Integrated Engineering 10 (6), 2018 | 58 | 2018 |
Feature selection using rough set in intrusion detection A Zainal, MA Maarof, SM Shamsuddin TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006 | 56 | 2006 |
A 0-day aware crypto-ransomware early behavioral detection framework BAS Al-rimy, MA Maarof, SZM Shaid Recent Trends in Information and Communication Technology: Proceedings of …, 2018 | 50 | 2018 |
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid, FA Ghaleb, A Almalawi, ... Future Generation Computer Systems 115, 641-658, 2021 | 45 | 2021 |
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency … FA Ghaleb, MA Maarof, A Zainal, MA Rassam, F Saeed, M Alsaedi Vehicular Communications 20, 100186, 2019 | 43 | 2019 |
Intelligent alert clustering model for network intrusion analysis MM Siraj, MA Maarof, SZM Hashim Int. J. Advance. Soft Comput. Appl 1 (1), 1-16, 2009 | 41 | 2009 |
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications MA Rassam, A Zainal, MA Maarof Applied Soft Computing 13 (4), 1978-1996, 2013 | 39 | 2013 |
Serious security weakness in RSA cryptosystem M Bakhtiari, MA Maarof International Journal of Computer Science Issues (IJCSI) 9 (1), 175, 2012 | 39 | 2012 |