Nor Badrul Anuar

Orcid: 0000-0003-4380-5303

According to our database1, Nor Badrul Anuar authored at least 73 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improved temporal IoT device identification using robust statistical features.
PeerJ Comput. Sci., 2024

2023
Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics.
Multim. Tools Appl., March, 2023

The rise of website fingerprinting on Tor: Analysis on techniques and assumptions.
J. Netw. Comput. Appl., March, 2023

Web content topic modeling using LDA and HTML tags.
PeerJ Comput. Sci., 2023

RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things.
PeerJ Comput. Sci., 2023

2022
The rise of obfuscated Android malware and impacts on detection methods.
PeerJ Comput. Sci., 2022

A systematic review of routing attacks detection in wireless sensor networks.
PeerJ Comput. Sci., 2022

A new deep model for family and non-family photo identification.
Multim. Tools Appl., 2022

Self-Configured Framework for scalable link prediction in twitter: Towards autonomous spark framework.
Knowl. Based Syst., 2022

Ground Truth Dataset: Objectionable Web Content.
Data, 2022

Scalable link prediction in Twitter using self-configured framework.
CoRR, 2022

GRAIN: Granular multi-label encrypted traffic classification using classifier chain.
Comput. Networks, 2022

2021
A survey on video content rating: taxonomy, challenges and open issues.
Multim. Tools Appl., 2021

The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches.
J. Netw. Comput. Appl., 2021

Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic.
Comput. Networks, 2021

2020
MapReduce scheduling algorithms: a review.
J. Supercomput., 2020

The rise of traffic classification in IoT networks: A survey.
J. Netw. Comput. Appl., 2020

Applications of link prediction in social networks: A review.
J. Netw. Comput. Appl., 2020

Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey.
J. Medical Imaging Health Informatics, 2020

Blending Big Data Analytics: Review on Challenges and a Recent Study.
IEEE Access, 2020

Local Gradient Difference Features for Classification of 2D-3D Natural Scene Text Images.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

2019
The rise of "blockchain": bibliometric analysis of blockchain study.
Scientometrics, 2019

SMSAD: a framework for spam message and spam account detection.
Multim. Tools Appl., 2019

Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics.
CoRR, 2019

Halal Products on Twitter: Data Extraction and Sentiment Analysis Using Stack of Deep Learning Algorithms.
IEEE Access, 2019

Challenges and Recommended Solutions in Multi-Source and Multi-Domain Sentiment Analysis.
IEEE Access, 2019

2018
Multi-objective scheduling of MapReduce jobs in big data processing.
Multim. Tools Appl., 2018

Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics.
Multim. Tools Appl., 2018

Discovering optimal features using static analysis and a genetic search based method for Android malware detection.
Frontiers Inf. Technol. Electron. Eng., 2018

Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.
J. Medical Syst., 2018

Internet of Things: Infrastructure, Architecture, Security and Privacy.
CoRR, 2018

Challenges of Internet of Things and Big Data Integration.
CoRR, 2018

Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario.
IEEE Access, 2018

2017
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey.
J. Netw. Comput. Appl., 2017

Malicious accounts: Dark of the social networks.
J. Netw. Comput. Appl., 2017

Source camera identification: a distributed computing approach using Hadoop.
J. Cloud Comput., 2017

The Evolution of Android Malware and Android Analysis Techniques.
ACM Comput. Surv., 2017

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.
Comput. Secur., 2017

An Overview of Audio Event Detection Methods from Feature Extraction to Classification.
Appl. Artif. Intell., 2017

2016
Evaluation of machine learning classifiers for mobile malware detection.
Soft Comput., 2016

Service delivery models of cloud computing: security issues and open challenges.
Secur. Commun. Networks, 2016

MapReduce: Review and open challenges.
Scientometrics, 2016

The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks.
Pervasive Mob. Comput., 2016

The rise of "malware": Bibliometric analysis of malware study.
J. Netw. Comput. Appl., 2016

Intrusion response systems: Foundations, design, and challenges.
J. Netw. Comput. Appl., 2016

Secure and dependable software defined networks.
J. Netw. Comput. Appl., 2016

Big data: From beginning to future.
Int. J. Inf. Manag., 2016

The role of big data in smart city.
Int. J. Inf. Manag., 2016

2015
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Netw. Comput. Appl., 2015

Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network.
J. Intell. Fuzzy Syst., 2015

The rise of "big data" on cloud computing: Review and open research issues.
Inf. Syst., 2015

A review on feature selection in mobile malware detection.
Digit. Investig., 2015

The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations.
Comput. Methods Programs Biomed., 2015

Pixel value differencing steganography techniques: Analysis and open challenge.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
A response selection model for intrusion response systems: Response Strategy Model (RSM).
Secur. Commun. Networks, 2014

Botnet detection techniques: review, future trends, and issues.
J. Zhejiang Univ. Sci. C, 2014

Routing protocol design for secure WSN: Review and open research issues.
J. Netw. Comput. Appl., 2014

Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks.
J. Netw. Comput. Appl., 2014

A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier.
Neurocomputing, 2014

Ant colony optimisation for vehicle traffic systems: applications and challenges.
Int. J. Bio Inspired Comput., 2014

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks.
Eng. Appl. Artif. Intell., 2014

Ant-based vehicle congestion avoidance system using vehicular networks.
Eng. Appl. Artif. Intell., 2014

Blind source mobile device identification based on recorded call.
Eng. Appl. Artif. Intell., 2014

Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper.
Appl. Soft Comput., 2014

Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
Secur. Commun. Networks, 2013

Development of a new type of passively adaptive compliant gripper.
Ind. Robot, 2013

An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique.
Eng. Appl. Artif. Intell., 2013

A Single Journal Study : Malaysian Journal of Computer Science
CoRR, 2013

Anomaly Detection Using Cooperative Fuzzy Logic Controller.
Proceedings of the Intelligent Robotics Systems: Inspiring the NEXT, 2013

2012
A Response Strategy Model for Intrusion Response Systems.
Proceedings of the Information Security and Privacy Research, 2012

2010
An investigation and survey of response options for Intrusion Response Systems (IRSs).
Proceedings of the Information Security South Africa Conference 2010, 2010

2003
Inculcating ICT Skills through a Collaborative Digital Library Initiative for Educational Use.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003


  Loading...