Nor Badrul Anuar
Orcid: 0000-0003-4380-5303
According to our database1,
Nor Badrul Anuar
authored at least 73 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
PeerJ Comput. Sci., 2024
2023
Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics.
Multim. Tools Appl., March, 2023
J. Netw. Comput. Appl., March, 2023
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things.
PeerJ Comput. Sci., 2023
2022
PeerJ Comput. Sci., 2022
PeerJ Comput. Sci., 2022
Multim. Tools Appl., 2022
Self-Configured Framework for scalable link prediction in twitter: Towards autonomous spark framework.
Knowl. Based Syst., 2022
Comput. Networks, 2022
2021
Multim. Tools Appl., 2021
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches.
J. Netw. Comput. Appl., 2021
Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic.
Comput. Networks, 2021
2020
J. Netw. Comput. Appl., 2020
J. Netw. Comput. Appl., 2020
Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey.
J. Medical Imaging Health Informatics, 2020
IEEE Access, 2020
Local Gradient Difference Features for Classification of 2D-3D Natural Scene Text Images.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
2019
Scientometrics, 2019
Multim. Tools Appl., 2019
Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics.
CoRR, 2019
Halal Products on Twitter: Data Extraction and Sentiment Analysis Using Stack of Deep Learning Algorithms.
IEEE Access, 2019
Challenges and Recommended Solutions in Multi-Source and Multi-Domain Sentiment Analysis.
IEEE Access, 2019
2018
Multim. Tools Appl., 2018
Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics.
Multim. Tools Appl., 2018
Discovering optimal features using static analysis and a genetic search based method for Android malware detection.
Frontiers Inf. Technol. Electron. Eng., 2018
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.
J. Medical Syst., 2018
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario.
IEEE Access, 2018
2017
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey.
J. Netw. Comput. Appl., 2017
J. Cloud Comput., 2017
ACM Comput. Surv., 2017
Comput. Secur., 2017
An Overview of Audio Event Detection Methods from Feature Extraction to Classification.
Appl. Artif. Intell., 2017
2016
Soft Comput., 2016
Secur. Commun. Networks, 2016
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks.
Pervasive Mob. Comput., 2016
J. Netw. Comput. Appl., 2016
J. Netw. Comput. Appl., 2016
2015
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Netw. Comput. Appl., 2015
J. Intell. Fuzzy Syst., 2015
Inf. Syst., 2015
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations.
Comput. Methods Programs Biomed., 2015
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015
2014
A response selection model for intrusion response systems: Response Strategy Model (RSM).
Secur. Commun. Networks, 2014
J. Zhejiang Univ. Sci. C, 2014
J. Netw. Comput. Appl., 2014
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks.
J. Netw. Comput. Appl., 2014
A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier.
Neurocomputing, 2014
Int. J. Bio Inspired Comput., 2014
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks.
Eng. Appl. Artif. Intell., 2014
Eng. Appl. Artif. Intell., 2014
Eng. Appl. Artif. Intell., 2014
Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper.
Appl. Soft Comput., 2014
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
2013
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
Secur. Commun. Networks, 2013
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique.
Eng. Appl. Artif. Intell., 2013
Proceedings of the Intelligent Robotics Systems: Inspiring the NEXT, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
2010
An investigation and survey of response options for Intrusion Response Systems (IRSs).
Proceedings of the Information Security South Africa Conference 2010, 2010
2003
Inculcating ICT Skills through a Collaborative Digital Library Initiative for Educational Use.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003