Search Results - Mas'ud, M. Z.
- Showing 1 - 18 results of 18
-
1
-
2
IPv6 and IPv4 security issues by Mas'ud, M. Z., Hamid , Erman, Bahaman, Nazrulazhar, Shibghatullah, Abdul Samad
Published 2008Get full text
Get full text
Conference or Workshop Item -
3
New Multi-step Worm Attack Model by Yusof, R., Selamat, S. R., Sahib, S., Abdollah, M. F., Mas'ud, M. Z., Ramly, M.
Published 2010Get full text
Get full text
Article -
4
Collaborative Security Mechanism in Detecting Intrusion Activity by Abdollah, M. F., Mas'ud, M. Z., Sahib, S., Selamat, S. R., Yusof, R.
Published 2010Get full text
Get full text
Conference or Workshop Item -
5
A New Malware Attack Pattern Generalization by Yusof, R., Selamat, S. R., Sahib, S., Abdollah, M. F., Mas'ud, M. Z., Ramly, M.
Published 2011Get full text
Get full text
Conference or Workshop Item -
6
-
7
Next generation internet protocol — Test6-I deployment by Bahaman, Nazrulazhar, Hamid , Erman, Shibghatullah, Abdul Samad, Mas'ud, M. Z., Abd Malek, Akhdiat
Published 2008Get full text
Get full text
Conference or Workshop Item -
8
Adapting Traceability in Digital Forensic Investigation Process by Selamat, S. R., Yusof, R., Sahib, S., Roslan, I., Abdollah, M. F., Mas'ud, M. Z.
Published 2011Get full text
Get full text
Conference or Workshop Item -
9
Generic Taxonomy of Social Engineering Attack by Mohd Foozy, F, Ahmad, R., Abdollah, M. F., Yusof, R., Mas'ud, M. Z.
Published 2011Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
Enhanced Alert Correlation Framework for Heterogeneous Log by Yusof, R., Selamat, S. R., Sahib, S., Mas'ud, M. Z., Abdollah, M. F.
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Virtual Machine based Autonomous Web Server by Mas’ud, M. Z., Abdollah, M. F., Yaacub, A. H., Ahmad, N. M., Abdul Hamid, E.
Published 2011Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Host Based Detection Approach using Time Based Module for Fast Attack Detection Behavior by Abdollah, M. F., Mas’ud, M. Z., Sahib, S., Yaacub, A. H., Yusof, R., Selamat, S. R.
Published 2011Get full text
Get full text
Conference or Workshop Item -
17
Threshold verification using Statistical Approach for Fast Attack Detection by Abdollah, M. F., Mas'ud, M. Z., Sahib, S., Yusof, R., Selamat, S. R.
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System by Abdollah, M. F., Mas'ud, M. Z., Sahib, S., Yusof, R., Selamat, S. R., Yaacub, A. H.
Published 2010Get full text
Get full text
Conference or Workshop Item
