Aman Jantan
Orcid: 0000-0001-9899-2287Affiliations:
- Universiti Sains Malaysia, School of Computer Science, Penang, Malaysia
According to our database1,
Aman Jantan
authored at least 42 papers
between 2003 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Multi-Behavior RFM Model Based on Improved SOM Neural Network Algorithm for Customer Segmentation.
IEEE Access, 2022
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks.
IEEE Access, 2022
2021
J. Comput. Virol. Hacking Tech., 2021
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
2020
Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp.
Wirel. Pers. Commun., 2020
Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization.
Neural Process. Lett., 2020
A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm.
Neural Comput. Appl., 2020
HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys.
Health Informatics J., 2020
An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons.
IEEE Access, 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
An enhanced Bat algorithm with mutation operator for numerical optimization problems.
Neural Comput. Appl., 2019
Evidence collection and forensics on social networks: Research challenges and directions.
Digit. Investig., 2019
A multilayered semantic framework for integrated forensic acquisition on social media.
Digit. Investig., 2019
A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems.
IEEE Access, 2019
Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition.
IEEE Access, 2019
2018
Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems.
Neural Comput. Appl., 2018
J. Inf. Process. Syst., 2018
A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons.
Cogn. Comput., 2018
2016
Comput. Commun., 2016
2014
Proceedings of the 2014 IEEE International Conference on Control System, 2014
2013
J. Netw. Syst. Manag., 2013
IEEE Secur. Priv., 2013
Proceedings of the 8th International Conference on Information Technology in Asia, 2013
2012
Multi-Connect Architecture (MCA) Associative Memory: A Modified Hopfield Neural Network.
Intell. Autom. Soft Comput., 2012
A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
2011
Comput. Commun., 2011
A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring.
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
A New Approach Based on Honeybee to Improve Intrusion Detection System Using Neural Network and Bees Algorithm.
Proceedings of the Software Engineering and Computer Systems, 2011
2010
J. Digit. Content Technol. its Appl., 2010
2009
An approach for monitoring pedestrian by using multi-connect architected MCA associative memory.
J. Digit. Content Technol. its Appl., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Database Systems for Advanced Applications, 2009
2008
An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.
Proceedings of the Software Engineering, 2008
Safe Runtime Reconfiguration in Component-Based Software Systems.
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM-Based Intrusion Detection Sensors.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
2003
An Agent-based Design Pattern for Decoupling Views of E-business System.
Proceedings of the 3th International Conference on IT in Asia, 2003