Mohammad Yazid Bin Idris

Orcid: 0000-0001-7702-6610

Affiliations:
  • Universiti Teknologi Malaysia, School of Computing, Faculty of Engineering, Malaysia


According to our database1, Mohammad Yazid Bin Idris authored at least 21 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104.
IET Cyper-Phys. Syst.: Theory & Appl., September, 2024

2023
An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection.
Comput. Syst. Sci. Eng., 2023

2022
Improvement of attack detection performance on the internet of things with PSO-search and random forest.
J. Comput. Sci., 2022

An Improved Robust Misbehavior Detection Scheme for Vehicular Ad Hoc Network.
IEEE Access, 2022

2021
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm.
Inf. Technol. Control., 2021

Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network.
IEEE Access, 2021

An Approach for Optimizing Ensemble Intrusion Detection Systems.
IEEE Access, 2021

2020
Agile Software Development Using Cloud Computing: A Case Study.
IEEE Access, 2020

CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection.
IEEE Access, 2020

The State of the Art on Secure Software Engineering: A Systematic Mapping Study.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

2019
Investigating Brute Force Attack Patterns in IoT Network.
J. Electr. Comput. Eng., 2019

TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis.
Int. J. Online Biomed. Eng., 2019

Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method.
Int. J. Commun. Networks Inf. Secur., 2019

An Evaluation Framework for Communication and Coordination Processes in Offshore Software Development Outsourcing Relationship: Using Fuzzy Methods.
IEEE Access, 2019

2017
Cyber-Attack Penetration Test and Vulnerability Analysis.
Int. J. Online Eng., 2017

Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs.
Digit. Commun. Networks, 2017

2016
Penetration Testing and Mitigation of Vulnerabilities Windows Server.
Int. J. Netw. Secur., 2016

2015
Penetration Testing and Network Auditing: Linux.
J. Inf. Process. Syst., 2015

2012
Intrinsic authentication of multimedia objects using biometric data manipulation.
Int. Arab J. Inf. Technol., 2012

2011
Research on Heteregeneous Data for Recognizing Threat.
Proceedings of the ICSOFT 2011, 2011

2010
Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation.
Proceedings of the Future Generation Information Technology, 2010


  Loading...