Search Results - 57203863738
- Showing 1 - 20 results of 21
- Go to Next Page
-
1
A survey on anomalies detection techniques and measurement methods by Muruti G., Rahim F.A., Bin Ibrahim Z.-A.
Published 2023Conference Paper -
2
INSIDER THREATS: PROFILING POTENTIAL MALICIOUS ATTACKS, SEVERITY AND IMPACT by Ibrahim Z.-A., Rahim F.A., Alauddin A.A., Jamil N., Abdullah H.I.M.
Published 2023Other Authors: “…57203863738…”
Article -
3
-
4
-
5
A Systematic Literature Review of Multimodal Analysis Techniques for Malware Detection by Ibrahim Z.-A., Ismail S.A., Rahim F.A.
Published 2025Other Authors: “…57203863738…”
Conference paper -
6
A Review of Evidence Extraction Techniques in Big Data Environment by Mokhtar S.H., Muruti G., Ibrahim Z.-A., Rahim F.A., Kasim H.
Published 2023Conference Paper -
7
Smart verification algorithm for IoT applications using QR tag by Al-Ghaili A.M., Kasim H., Rahim F.A., Ibrahim Z.-A., Othman M., Hassan Z.
Published 2023Conference Paper -
8
Smart Grid Digital Forensics Investigation Framework by Mohd Abdullah H.I., Mustaffa M.Z., Rahim F.A., Ibrahim Z.-A., Yusoff Y., Yussof S., Bakar A.A., Ismail R., Ramli R.
Published 2023Conference Paper -
9
-
10
Building Energy Efficiency (BEE): Conventional and unconventional techniques by Al-Ghaili A.M., Kasim H., Othman M., Ibrahim Z.A., Hassan Z.
Published 2023Article -
11
A Dynamical Behavior Measurement Algorithm for Smart Meter Data: An Analytical Study by Al-Ghaili A.M., Baskaran H., Ibrahim Z.-A., Rahim F.A., Hairi S.A.S.
Published 2023Conference Paper -
12
A Survey on Deception Techniques for Securing Web Application by Mohd Efendi M.A.E., Ibrahim Z.-A., Ahmad Zawawi M.N., Abdul Rahim F., Muhamad Pahri N., Ismail A.
Published 2023Conference Paper -
13
Reducing Climate Change for Future Transportation: Roles of Computing by Kasim H., Ibrahim Z.-A., Al-Ghaili A.M.
Published 2023Conference Paper -
14
Data falsification attacks in advanced metering infrastructure by Baskaran H., Al-Ghaili A.M., Ibrahim Z.-A., Rahim F.A., Muthaiyah S., Kasim H.
Published 2023Article -
15
-
16
A Review of Machine Learning Botnet Detection Techniques based on Network Traffic Log by Ibrahim Z.-A., Razali R.A., Ismail S.A., Azhar I.H.K., Rahim F.A., Azilan A.M.A.
Published 2023Other Authors: “…57203863738…”
Conference Paper -
17
-
18
Digital Forensics Investigation Procedures of Smart Grid Environment by Abdullah H.I.M., Ibrahim Z.-A., Rahim F.A., Fadzil H.S., Nizam S.A.S., Mustaffa M.Z.
Published 2023Article -
19
Forensic Analysis on False Data Injection Attack on IoT Environment by Nizam S.A.S., Ibrahim Z.-A., Rahim F.A., Fadzil H.S., Mohd Abdullah H.I., Mustaffa M.Z.
Published 2023Article -
20
