Anazida Zainal

Orcid: 0000-0003-0022-3039

According to our database1, Anazida Zainal authored at least 70 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Joint intent detection and slot filling with syntactic and semantic features using multichannel CNN-BiLSTM.
PeerJ Comput. Sci., 2024

2023
An effective attack scenario construction model based on identification of attack steps and stages.
Int. J. Inf. Sec., October, 2023

A Kullback-Liebler divergence-based representation algorithm for malware detection.
PeerJ Comput. Sci., 2023

Fraudulent E-Commerce Website Detection Using Convolutional Neural Network Based on Image Features.
Proceedings of the Data Science and Emerging Technologies, 2023

2022
Prototype Regularized Manifold Regularization Technique for Semi-Supervised Online Extreme Learning Machine.
Sensors, 2022

Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey.
Sensors, 2022

Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack.
Sensors, 2022

Dynamic scheduling of heterogeneous resources across mobile edge-cloud continuum using fruit fly-based simulated annealing optimization scheme.
Neural Comput. Appl., 2022

Feature Encoding For High Cardinality Categorical Variables Using Entity Embeddings: A Case Study in Customs Fraud Detection.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022

ADiBA Big Data Adoption Framework: Accelerating Big Data Revolution 5.0.
Proceedings of the 11th International Conference on Data Science, 2022

Review of Smart Home Privacy-Protecting Strategies from a Wireless Eavesdropping Attack.
Proceedings of the Data Science and Emerging Technologies, 2022

2021
Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine.
Sensors, 2021

An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification.
CoRR, 2021

LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

News Event Prediction using Causality Approach on South China Sea Conflict.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

Advanced Persistent Threat Detection: A Survey.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

Application of Knowledge-oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature Selection.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2020
Cloud customers service selection scheme based on improved conventional cat swarm optimization.
Neural Comput. Appl., 2020

A Distributed Intrusion Detection Scheme for Cloud Computing.
Int. J. Distributed Syst. Technol., 2020

Analysis of Metaheuristics Feature Selection Algorithm for Classification.
Proceedings of the Hybrid Intelligent Systems, 2020

Security Threats and Challenges to IoT and its Applications: A Review.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020

2019
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between the cooperative awareness messages.
Veh. Commun., 2019

An optimized skin texture model using gray-level co-occurrence matrix.
Neural Comput. Appl., 2019

An Adaptive Intrusion Detection Scheme for Cloud Computing.
Int. J. Swarm Intell. Res., 2019

Quality of service task scheduling algorithm for time-cost trade off scheduling problem in cloud computing environment.
Int. J. Intell. Syst. Technol. Appl., 2019

BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks.
Future Gener. Comput. Syst., 2019

Fraudulent e-Commerce Website Detection Model Using HTML, Text and Image Features.
Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), 2019

Malware Behavior Profiling from Unstructured Data.
Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), 2019

2018
Optimized Reliable Hybrid Routing Protocol Based Link Stability for Mobile Wireless Networks.
Wirel. Pers. Commun., 2018

Optimal control overhead based multi-metric routing for MANET.
Wirel. Networks, 2018

CLASENTI: A Class-Specific Sentiment Analysis Framework.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2018

Orthogonal Taguchi-based cat algorithm for solving task scheduling problem in cloud computing.
Neural Comput. Appl., 2018

Driving-situation-aware adaptive broadcasting rate scheme for vehicular ad hoc network.
J. Intell. Fuzzy Syst., 2018

CFaaS: bilaterally agreed evidence collection.
J. Cloud Comput., 2018

A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier.
Int. J. Sens. Networks, 2018

2017
Improved vehicle positioning algorithm using enhanced innovation-based adaptive Kalman filter.
Pervasive Mob. Comput., 2017

Risk tolerance and trust issues in cloud-based E-learning.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques.
Proceedings of the Hybrid Intelligent Systems, 2017

2016
Fraud detection system: A survey.
J. Netw. Comput. Appl., 2016

A Review on Challenging Issues in Arabic Sentiment Analysis.
J. Comput. Sci., 2016

Mobility information estimation algorithm using Kalman-filter for vehicular ad hoc networks.
Int. J. Inf. Comput. Secur., 2016

Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2016

Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media.
Proceedings of the Data Mining and Big Data, First International Conference, 2016

2015
Principal component analysis-based data reduction model for wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015

2014
Adaptive and online data anomaly detection for wireless sensor systems.
Knowl. Based Syst., 2014

Mobility Pattern Based Misbehavior Detection to Avoid Collision in Vehicular Adhoc Networks.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services, 2014

Islamic Web Content Filtering and Categorization on Deviant Teaching.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014

Enhanced Rules Application Order Approach to Stem Reduplication Words in Malay Texts.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014

Data integrity and privacy model in cloud computing.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A taxonomy on intrusion alert aggregation techniques.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Mobility pattern based misbehavior detection in vehicular adhoc networks to enhance safety.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

2013
Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues.
Sensors, 2013

An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications.
Appl. Soft Comput., 2013

Spam detection using hybrid Artificial Neural Network and Genetic algorithm.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013

Feature extraction process: A phishing detection approach.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013

2012
Compact classification of optimized Boolean reasoning with Particle Swarm Optimization.
Intell. Data Anal., 2012

Malware Analysis with Multiple Features.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

One-Class Principal Component Classifier for anomaly detection in wireless sensor network.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

Design of Adaptive IDS with Regulated Retraining Approach.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

2011
Ensemble based categorization and adaptive model for malware detection.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

A novel intrusion detection framework for Wireless Sensor Networks.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2009
Rule Modeling Engine for Optimizing Complex Event Processing Patterns.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

An Improved Binary Particle Swarm Optimisation for Gene Selection in Classifying Cancer Classes.
Proceedings of the Distributed Computing, 2009

Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Data Reduction and Ensemble Classifiers in Intrusion Detection.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

Ensemble of One-Class Classifiers for Network Intrusion Detection System.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection.
Proceedings of the Computational Science and Its Applications, 2007

2004
Solving Time Gap Problems through the Optimization of Detecting Stepping Stone Algorithm.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
Attack on Intrusion Detection System Host: Simulation and Analysis.
Proceedings of the 3th International Conference on IT in Asia, 2003


  Loading...