Search Results - Maarof, Mohd. Aizaini
- Showing 1 - 20 results of 40
- Go to Next Page
-
1
Automated web pages classification with independent component analysis by Sam, Lee Zhi, Maarof, Mohd. Aizaini, Selamat, Ali
Published 2006Get full text
Get full text
Conference or Workshop Item -
2
Challenges in high accuracy of malware detection by Ahmad Zabidi, Muhammad Najmi, Maarof, Mohd Aizaini, Zainal, Anazida
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
3
Research issues in adaptive intrusion detection by Zainal, Anazida, Maarof, Mohd. Aizaini, Shamsuddin, Siti Mariyam
Published 2006Get full text
Get full text
Conference or Workshop Item -
4
-
5
Secret sharing scheme for collaborative access system by Kadir, Rashidah, Maarof, Mohd. Aizaini
Published 2000Get full text
Get full text
Conference or Workshop Item -
6
Feature selection using rough set in intrusion detection by Zainal, Anazida, Maarof, Mohd. Aizaini, Shamsuddin, Siti Mariyam
Published 2006Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
A Review on Biological Inspired Computation in Cryptology by Ibrahim, Subariah, Maarof, Mohd Aizaini
Published 2005Get full text
Get full text
Article -
10
-
11
Feature selection using rough-dpso in anomaly intrusion detection by Zainal, Anazida, Maarof, Mohd. Aizaini, Shamsuddin, Siti Mariyam
Published 2007Get full text
Get full text
Book Section -
12
Cryptanalysis using biological inspired computing approaches by Ahmad, Badrisham, Maarof, Mohd. Aizaini
Published 2006Get full text
Get full text
Conference or Workshop Item -
13
Polymorphism and danger susceptibility of system call DASTONs by Maarof, Mohd. Aizaini, Iqbal, Anjum
Published 2007Get full text
Get full text
Book Section -
14
A survey on the cryptanalysis of the advanced encryption standard by Z’aba, Muhammad Reza, Maarof, Mohd. Aizaini
Published 2006Get full text
Get full text
Conference or Workshop Item -
15
Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
16
How AIS Addresses Adaptability in IDS by Zainal, Anazida, Maarof, Mohd. Aizaini, Shamsuddin, Siti Mariyam
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Modified key size determination models for symmetric ciphers by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2005Get full text
Get full text
Conference or Workshop Item -
18
Avalanche Analysis of Extended Feistel Network by Ibrahim, Subariah, Maarof, Mohd. Aizaini, Idris, Norbik Bashah
Published 2005Get full text
Get full text
Conference or Workshop Item -
19
Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006Get full text
Conference or Workshop Item -
20
