Showing
1 - 16
results of
16
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Mas'ud, M. Z.
Search Results - Mas'ud, M. Z.
Showing
1 - 16
results of
16
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by
Abdollah, M. F.
,
Mas'ud, M. Z
.
,
Yusof, R.
,
Selamat, S. R.
Published 2010
Get full text
Get full text
QR Code
2
Enhanced Alert Correlation Framework for Heterogeneous Log
by
Yusof, R.
,
Selamat, S. R.
,
Sahib, S.
,
Mas'ud, M. Z
.
,
Abdollah, M. F.
Published 2011
Get full text
Get full text
QR Code
3
Threshold Verification Technique for Network Intrusion Detection System
by
Abdollah, M. F.
,
Mas'ud, M. Z
.
,
Sahib, S.
,
Yusof, R.
,
Selamat, S. R.
Published 2009
Get full text
Get full text
QR Code
4
Threshold verification using Statistical Approach for Fast Attack Detection
by
Abdollah, M. F.
,
Mas'ud, M. Z
.
,
Sahib, S.
,
Yusof, R.
,
Selamat, S. R.
Published 2009
Get full text
Get full text
QR Code
5
Collaborative Security Mechanism in Detecting Intrusion Activity
by
Abdollah, M. F.
,
Mas'ud, M. Z
.
,
Sahib, S.
,
Selamat, S. R.
,
Yusof, R.
Published 2010
Get full text
Get full text
QR Code
6
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by
Abdullah, Raihana Syahirah
,
Mas'ud, M. Z
.
,
Abdollah, M. F.
,
Sahib, S.
,
Yusof, R.
Published 2011
Get full text
Get full text
QR Code
7
Adapting Traceability in Digital Forensic Investigation Process
by
Selamat, S. R.
,
Yusof, R.
,
Sahib, S.
,
Roslan, I.
,
Abdollah, M. F.
,
Mas'ud, M. Z
.
Published 2011
Get full text
Get full text
QR Code
8
A New Generic Taxonomy on Hybrid Malware Detection Technique
by
Yusof, R.
,
Selamat, S. R.
,
Mas'ud, M. Z
.
,
Sahib, S.
,
Abdollah, M. F.
,
Ramly, M.
Published 2009
Get full text
Get full text
QR Code
9
New Multi-step Worm Attack Model
by
Yusof, R.
,
Selamat, S. R.
,
Sahib, S.
,
Abdollah, M. F.
,
Mas'ud, M. Z
.
,
Ramly, M.
Published 2010
Get full text
Get full text
QR Code
10
A New Malware Attack Pattern Generalization
by
Yusof, R.
,
Selamat, S. R.
,
Sahib, S.
,
Abdollah, M. F.
,
Mas'ud, M. Z
.
,
Ramly, M.
Published 2011
Get full text
Get full text
QR Code
11
Generic Taxonomy of Social Engineering Attack
by
Mohd Foozy, F
,
Ahmad, R.
,
Abdollah, M. F.
,
Yusof, R.
,
Mas'ud, M. Z
.
Published 2011
Get full text
Get full text
QR Code
12
Scenario Based Worm Trace Pattern Identification Technique
by
Selamat, S. R.
,
Yusof, R.
,
Sahib, S.
,
Mas'ud, M. Z
.
,
Roslan, I.
,
Abdollah, M. F.
Published 2010
Get full text
Get full text
QR Code
13
Host Based Detection Approach using Time Based Module for Fast Attack Detection Behavior
by
Abdollah, M. F.
,
Mas’ud, M. Z
.
,
Sahib, S.
,
Yaacub, A. H.
,
Yusof, R.
,
Selamat, S. R.
Published 2011
Get full text
Get full text
QR Code
14
Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System
by
Abdollah, M. F.
,
Mas'ud, M. Z
.
,
Sahib, S.
,
Yusof, R.
,
Selamat, S. R.
,
Yaacub, A. H.
Published 2010
Get full text
Get full text
QR Code
15
Virtual Machine based Autonomous Web Server
by
Mas’ud, M. Z
.
,
Abdollah, M. F.
,
Yaacub, A. H.
,
Ahmad, N. M.
,
Abdul Hamid, E.
Published 2011
Get full text
Get full text
QR Code
16
Performance Enhancements in IEEE 802.11 DCF MANET through Variation of SIFS Values in Distance Vector Routing Environment
by
Md Khambari, M. N.
,
Muhamad Noh, Z. A.
,
Mat Ariff, N. A.
,
Mas'ud, M. Z
.
Published 2011
Get full text
Get full text
QR Code
Search Tools:
RSS Feed
Email Search