Nor Fazlida Mohd Sani

Orcid: 0000-0002-0366-051X

According to our database1, Nor Fazlida Mohd Sani authored at least 16 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CSQUiD: an index and non-probability framework for constrained skyline query processing over uncertain data.
PeerJ Comput. Sci., 2024

2023
Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure.
J. Intell. Syst., 2023

2022
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model.
J. Comput. Virol. Hacking Tech., 2022

2021
Structural features with nonnegative matrix factorization for metamorphic malware detection.
Comput. Secur., 2021

2020
An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network.
IEEE Access, 2020

Analyses of Indexing Techniques on Uncertain Data With High Dimensionality.
IEEE Access, 2020

2019
Nonnegative matrix factorization and metamorphic malware detection.
J. Comput. Virol. Hacking Tech., 2019

An effective security alert mechanism for real-time phishing tweet detection on Twitter.
Comput. Secur., 2019

2016
Performance-Aware Trust-Based Access Control for Protecting Sensitive Attributes.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

2014
Plan recognition scheme using multi-factors authentication for smart card online system.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Design of Object-Oriented Debugger Model by using Unified Modeling Language.
J. Comput. Sci., 2013

Using Feature Selection as accuracy Benchmarking in Clinical Data Mining.
J. Comput. Sci., 2013

2012
Transformation from requirement into behavior design: A review.
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012

Volatile memory acquisition using backup for forensic investigation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Towards secure model for SCADA systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2009
Unit Testing Approaches for BPEL: A Systematic Review.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009


  Loading...