Mohd Aizaini Maarof
Affiliations:- University of Technology Malaysia
According to our database1,
Mohd Aizaini Maarof
authored at least 72 papers
between 1997 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification.
Wirel. Commun. Mob. Comput., 2021
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection.
Future Gener. Comput. Syst., 2021
Proceedings of the 3rd International Cyber Resilience Conference, 2021
Proceedings of the 3rd International Cyber Resilience Conference, 2021
Proceedings of the 3rd International Cyber Resilience Conference, 2021
Proceedings of the 3rd International Cyber Resilience Conference, 2021
Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature Selection.
Proceedings of the 3rd International Cyber Resilience Conference, 2021
2020
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach.
IEEE Access, 2020
A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction.
IEEE Access, 2020
2019
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between the cooperative awareness messages.
Veh. Commun., 2019
Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network.
Remote. Sens., 2019
Neural Comput. Appl., 2019
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection.
Future Gener. Comput. Syst., 2019
Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network.
IEEE Access, 2019
Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), 2019
Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), 2019
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019
2018
A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier.
Int. J. Sens. Networks, 2018
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection.
CoRR, 2018
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions.
Comput. Secur., 2018
2017
GAZELLE: An Enhanced Random Network Coding Based Framework for Efficient P2P Live Video Streaming Over Hybrid WMNs.
Wirel. Pers. Commun., 2017
Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques.
Proceedings of the Hybrid Intelligent Systems, 2017
2016
Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2016
Proceedings of the Data Mining and Big Data, First International Conference, 2016
2015
Wirel. Pers. Commun., 2015
Principal component analysis-based data reduction model for wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015
2014
Knowl. Based Syst., 2014
Comput. Secur., 2014
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014
Enhanced Rules Application Order Approach to Stem Reduplication Words in Malay Texts.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
2013
Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues.
Sensors, 2013
GREENIE: a novel hybrid routing protocol for efficient video streaming over wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2013
Digit. Investig., 2013
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications.
Appl. Soft Comput., 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
2012
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
One-Class Principal Component Classifier for anomaly detection in wireless sensor network.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012
2011
Int. J. Comput. Intell. Appl., 2011
Spiral unique sequence: A new rotation invariant feature for small-size image block matching.
Proceedings of the 2011 IEEE International Conference on Signal and Image Processing Applications, 2011
Multi-classifier Scheme with Low-Level Visual Feature for Adult Image Classification.
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the International Conference on IT Convergence and Security, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2009
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content Classification.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the Wireless Networks, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the Computational Science and Its Applications, 2007
2005
Diffusion Analysis of a Scalable Fiestel Network.
Proceedings of the Third World Enformatika Conference, 2005
Proceedings of the Artificial Immune Systems: 4th International Conference, 2005
2004
Towards Danger Theory Based Artificial APC Model: Novel Metaphor for Danger Susceptible Data Codons.
Proceedings of the Artificial Immune Systems, Third International Conference, 2004
Solving Time Gap Problems through the Optimization of Detecting Stepping Stone Algorithm.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
2003
Int. Arab J. Inf. Technol., 2003
Towards Solving Time Gap Problems through the Optimization of Packet Capture Technique.
Proceedings of the 3th International Conference on IT in Asia, 2003
Attack on Intrusion Detection System Host: Simulation and Analysis.
Proceedings of the 3th International Conference on IT in Asia, 2003
Enforcing Multilevel Security Policies for Network Firewall.
Proceedings of the 3th International Conference on IT in Asia, 2003
2000
PhD thesis, 2000
1997
Integrating Security Services Into Collaborative Systems.
Proceedings of WebNet 97, 1997