Follow
Warusia
Warusia
Universiti Teknikal Malaysia Melaka, Information Security Forensics & Computer Networking INSFORNET
Verified email at utem.edu.my - Homepage
Title
Cited by
Cited by
Year
Intrusion detection based on K-Means clustering and Naïve Bayes classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th international conference on information technology in Asia, 1-6, 2011
2032011
Cyber-security incidents: a review cases in cyber-physical systems
MN Al-Mhiqani, R Ahmad, W Yassin, A Hassan, ZZ Abidin, NS Ali, ...
International Journal of Advanced Computer Science and Applications 9 (1), 2018
1322018
ANOMALY-BASED INTRUSION DETECTION THROUGH K-MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION
W Yassin, NI Udzir, Z Muda, MN Sulaiman
Proceedings of the 4th International Conference on Computing and Informatics …, 2013
1322013
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ...
Applied Sciences 10 (15), 5208, 2020
1052020
A K-Means and Naive Bayes learning approach for better intrusion detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Information technology journal 10 (3), 648-655, 2011
982011
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
822012
Intrusion detection based on k-means clustering and OneR classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
742011
Improving Intrusion Detection Using Genetic Algorithm
WY Vahid Moraveji Hashemi, Zaiton Muda
Information Technology Journal 12 (11), 2167-2173, 2013
402013
K-Means Clustering and Naive Bayes Classification for Intrusion Detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Journal of IT in Asia 4 (1), 13-25, 2014
392014
MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW.
S Juma, Z Muda, MA Mohamed, W Yassin
Journal of Theoretical & Applied Information Technology 72 (3), 2015
282015
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
282014
New insider threat detection method based on recurrent neural networks
MN Al-Mhiqani, R Ahmad, ZZ Abidin, W Yassin, A Hassan, ...
Indones. J. Electr. Eng. Comput. Sci 17 (3), 1474-1479, 2020
272020
Clustering analysis for malware behavior detection using registry data
NA Rosli, W Yassin, MA Faizal, SR Selamat
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
252019
A new taxonomy of insider threats: an initial step in understanding authorised attack
MN Al-Mhiqani, R Ahmad, ZZ Abidin, WM Yassin, A Hassan, ...
International Journal of Information Systems and Management 1 (4), 343-359, 2018
242018
Cloud forensic challenges and recommendations: A review
W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin
OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020
232020
Identify of Factors Affecting Information Security Awareness and Weight Analysis Process
RA Issam Al-Shanfari, Warusia Yassin
International Journal of Engineering and Advanced Technology 9 (3), 534-542, 2020
21*2020
A HYBRID FRAMEWORK BASED ON NEURAL NETWORK MLP AND K-MEANS CLUSTERING FOR INTRUSION DETECTION SYSTEM
WY Mazyar Mohammadi Lisehroodi, Zaiton Muda
Proceedings of the 4th International Conference on Computing and Informatics …, 2013
19*2013
Packet Header Anomaly Detection Using Statistical Analysis
W Yassin, NI Udzir, A Abdullah, MT Abdullah
Springer, 2013
162013
Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection
WZA Zakaria, MF Abdollah, O Mohd, SMWMSMM Yassin, A Ariffin
International Journal of Advanced Computer Science and Applications 13 (5), 2022
142022
Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees
Al-Shanfari, W Yassin, N Tabook, R Ismail, A Ismail
International Journal of Advanced Computer Science and Applications (IJACSA …, 2022
122022
The system can't perform the operation now. Try again later.
Articles 1–20