Follow
Mohd Aizaini Maarof
Mohd Aizaini Maarof
Professor of Information Security, Universiti Teknologi Malaysia (UTM)- Research ID: L-4331-2013
Verified email at utm.my
Title
Cited by
Cited by
Year
Fraud detection system: A survey
A Abdallah, MA Maarof, A Zainal
Journal of Network and Computer Applications 68, 90-113, 2016
6092016
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
BAS Al-rimy, MA Maarof, SZM Shaid
Computers & Security 74, 144-166, 2018
3392018
Malware detection based on hybrid signature behaviour application programming interface call graph
AAE Elhadi, MA Maarof, AH Osman
American Journal of Applied Sciences 9 (3), 283, 2012
1292012
Improving the detection of malware behaviour using simplified data dependent API call graph
AAE Elhadi, MA Maarof, B Barry
International Journal of Security and Its Applications 7 (5), 29-42, 2013
1052013
Ensemble classifiers for network intrusion detection system
A Zainal, MA Maarof, SM Shamsuddin
Journal of Information Assurance and Security 4 (3), 217-225, 2009
1022009
Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues
MA Rassam, A Zainal, MA Maarof
Sensors 13 (8), 10087-10122, 2013
852013
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
BAS Al-rimy, MA Maarof, SZM Shaid
Future Generation Computer Systems 101, 476-491, 2019
802019
A survey of intrusion detection schemes in wireless sensor networks
MA Rassam, MA Maarof, A Zainal
American Journal of Applied Sciences 9 (10), 1636, 2012
792012
Feature selection using Rough-DPSO in anomaly intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
Computational Science and Its Applications–ICCSA 2007: International …, 2007
742007
Malware behavior image for malware variant identification
SZM Shaid, MA Maarof
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
722014
Enhancing the detection of metamorphic malware using call graphs
AAE Elhadi, MA Maarof, BIA Barry, H Hamza
computers & security 46, 62-78, 2014
672014
Adaptive and online data anomaly detection for wireless sensor systems
MA Rassam, MA Maarof, A Zainal
Knowledge-Based Systems 60, 44-57, 2014
632014
Zero-day aware decision fusion-based model for crypto-ransomware early detection
BAS Al-rimy, MA Maarof, YA Prasetyo, SZM Shaid, AFM Ariffin
International Journal of Integrated Engineering 10 (6), 2018
582018
Feature selection using rough set in intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006
562006
A 0-day aware crypto-ransomware early behavioral detection framework
BAS Al-rimy, MA Maarof, SZM Shaid
Recent Trends in Information and Communication Technology: Proceedings of …, 2018
502018
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection
BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid, FA Ghaleb, A Almalawi, ...
Future Generation Computer Systems 115, 641-658, 2021
452021
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency …
FA Ghaleb, MA Maarof, A Zainal, MA Rassam, F Saeed, M Alsaedi
Vehicular Communications 20, 100186, 2019
432019
Intelligent alert clustering model for network intrusion analysis
MM Siraj, MA Maarof, SZM Hashim
Int. J. Advance. Soft Comput. Appl 1 (1), 1-16, 2009
412009
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications
MA Rassam, A Zainal, MA Maarof
Applied Soft Computing 13 (4), 1978-1996, 2013
392013
Serious security weakness in RSA cryptosystem
M Bakhtiari, MA Maarof
International Journal of Computer Science Issues (IJCSI) 9 (1), 175, 2012
392012
The system can't perform the operation now. Try again later.
Articles 1–20