Follow
Siti Rahayu Selamat
Title
Cited by
Cited by
Year
Cyber threat intelligence–issue and challenges
MS Abu, SR Selamat, A Ariffin, R Yusof
Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018
2042018
Mapping process of digital forensic investigation framework
SR Selamat, R Yusof, S Sahib
International Journal of Computer Science and Network Security 8 (10), 163-169, 2008
2002008
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
862014
Intrusion alert correlation technique analysis for heterogeneous log
R Yusof, SR Selamat, S Sahib
IJCSNS International Journal of Computer Science and Network Security 8 (9 …, 2008
742008
A review study on cloud computing issues
QK Kadhim, R Yusof, HS Mahdi, SS Ali Al-shami, SR Selamat
Journal of Physics: Conference Series 1018, 012006, 2018
582018
Analysis of cybersecurity standard and framework components
M Syafrizal, SR Selamat, NA Zakaria
International Journal of Communication Networks and Information Security 12 …, 2020
542020
A New Generic Taxonomy on Hybrid Malware Detection Technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
Arxiv preprint arXiv:0909.4860, 2009
522009
Revealing the criterion on botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' Ud, SR Selamat, R Yusof
International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013
362013
Identification key scheme to enhance network performance in wireless body area network
I Albaeazanchi, HR Abdulshaheed, SA Shawkat, SRB Selamat
Periodicals of Engineering and Natural Sciences 7 (2), 895-906, 2019
342019
A new routing protocols for reducing path loss in wireless body area network (WBAN)
I Al_Barazanchi, AS Shibghatullah, SR Selamat
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
272017
Clustering analysis for malware behavior detection using registry data
NA Rosli, W Yassin, MA Faizal, SR Selamat
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
252019
Threshold Verification Technique for Network Intrusion Detection System
A Mohd Faizal, M Mohd Zaki, S Shahrin, Y Robiah, S Siti Rahayu
International Journal of Computer Science and Information Security 2 (1), 2009
24*2009
A forensic traceability index in digital forensic investigation
SR Selamat, S Sahib, N Hafeizah, R Yusof, MF Abdollah
Scientific Research Publishing, 2013
232013
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, CY Huoy
Int. J. Netw. Secur. 19 (5), 727-733, 2017
202017
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
162010
Android malware detection system classification
MZ Masud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
142014
Profiling mobile malware behaviour through hybrid malware analysis approach
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof, R Ahmad
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
142013
Traceability in digital forensic investigation process
SR Selamat, R Yusof, S Sahib, NH Hassan, MF Abdollah, ZZ Abidin
2011 IEEE Conference on Open Systems, 101-106, 2011
132011
Security and Privacy Challenges of Big Data Adoption: A Qualitative Study in Telecommunication Industry.
S Anawar, NF Othman, SR Selamat, Z Ayop, N Harum, FA Rahim
International Journal of Interactive Mobile Technologies 16 (19), 2022
112022
An enhancement of cyber threat Intelligence framework
S Abu, SR Selamat, R Yusof, A Ariffin
J. Adv. Res. Dyn. Control. Syst 10, 96-104, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20