Mohd Faizal Abdollah

Orcid: 0000-0003-2706-7603

According to our database1, Mohd Faizal Abdollah authored at least 23 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An Emotion and Gender Detection Using Hybridized Convolutional 2D and Batch Norm Residual Network Learning.
Proceedings of the ICIT 2021: IoT and Smart City, Guangzhou, China, December 22 - 25, 2021, 2021

2019
An IoT Botnet Prediction Model Using Frequency based Dependency Graph: Proof-of-concept.
Proceedings of the ICIT 2019, 2019

2018
Secure video transcoding in Mobile Cloud Computing.
Int. J. Comput., 2018

An Improved Fully Homomorphic Encryption Scheme for Cloud Computing.
Int. J. Commun. Networks Inf. Secur., 2018

2017
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.
Int. J. Netw. Secur., 2017

Revealing Influenced Selected Feature for P2P Botnet Detection.
Int. J. Commun. Networks Inf. Secur., 2017

Revealing the Feature Influence in HTTP Botnet Detection.
Int. J. Commun. Networks Inf. Secur., 2017

The Rise of Ransomware.
Proceedings of the International Conference on Software and e-Business, 2017

2015
An empirical investigation of RSSI-based distance estimation for wireless indoor positioning system.
Int. J. Wirel. Mob. Comput., 2015

Dimension of mobile security model: mobile user security threats and awareness.
Int. J. Mob. Learn. Organisation, 2015

2014
Detecting Access Point Spoofing Attacks Using Partitioning-based Clustering.
J. Networks, 2014

Designing Ensemble Based Security Framework for M-Learning System.
Int. J. Distance Educ. Technol., 2014

A RSSI-based rogue access point detection framework for Wi-Fi hotspots.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

2013
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Profiling mobile malware behaviour through hybrid malware analysis approach.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Enhanced P2P botnets detection framework architecture with hybrid analyzer: Host-based and network-based.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
Enhancement of Asset value classification for Mobile devices.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2010
Advanced Trace Pattern For Computer Intrusion Discovery
CoRR, 2010

Scenario Based Worm Trace Pattern Identification Technique
CoRR, 2010

New Multi-step Worm Attack Model
CoRR, 2010

2009
A New Generic Taxonomy on Hybrid Malware Detection Technique
CoRR, 2009

Tracing Technique for Blaster Attack
CoRR, 2009

Threshold Verification Technique for Network Intrusion Detection System
CoRR, 2009


  Loading...