Robiah Yusof

Orcid: 0000-0002-0582-7512

According to our database1, Robiah Yusof authored at least 14 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
IOT Based Integrated COVID-19 Self-Monitoring Tool (COV-SMT) for Quarantine.
Int. J. Interact. Mob. Technol., May, 2023

Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges.
CoRR, 2023

2021
Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset.
IEEE Access, 2021

2016
Discovering Cyber Terrorism Using Trace Pattern.
Int. J. Netw. Secur., 2016

2015
An empirical investigation of RSSI-based distance estimation for wireless indoor positioning system.
Int. J. Wirel. Mob. Comput., 2015

2014
Detecting Access Point Spoofing Attacks Using Partitioning-based Clustering.
J. Networks, 2014

A RSSI-based rogue access point detection framework for Wi-Fi hotspots.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

2013
Profiling mobile malware behaviour through hybrid malware analysis approach.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2010
Advanced Trace Pattern For Computer Intrusion Discovery
CoRR, 2010

Scenario Based Worm Trace Pattern Identification Technique
CoRR, 2010

New Multi-step Worm Attack Model
CoRR, 2010

2009
A New Generic Taxonomy on Hybrid Malware Detection Technique
CoRR, 2009

Tracing Technique for Blaster Attack
CoRR, 2009

Threshold Verification Technique for Network Intrusion Detection System
CoRR, 2009


  Loading...