Bander Ali Saleh Al-rimy
Bander Ali Saleh Al-rimy
Ph.D. (Computer Science), Faculty of Engineering, Universiti Teknologi Malaysia; IEEE Senior Member
Verified email at - Homepage
Cited by
Cited by
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
BAS Al-rimy, MA Maarof, SZM Shaid
Computers & Security 74, 144-166, 2018
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
BAS Al-rimy, MA Maarof, SZM Shaid
Future Generation Computer Systems 101, 476-491, 2019
Zero-day aware decision fusion-based model for crypto-ransomware early detection
BAS Al-rimy, MA Maarof, YA Prasetyo, SZM Shaid, AFM Ariffin
International Journal of Integrated Engineering 10 (6), 2018
A 0-day aware crypto-ransomware early behavioral detection framework
BAS Al-rimy, MA Maarof, SZM Shaid
International Conference of Reliable Information and Communication …, 2017
Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET
F A. Ghaleb, F Saeed, M Al-Sarem, B Ali Saleh Al-rimy, W Boulila, ...
Electronics 9 (9), 1411, 2020
Review of data fusion methods for real-time and multi-sensor traffic flow analysis
SA Kashinath, SA Mostafa, A Mustapha, H Mahdin, D Lim, MA Mahmoud, ...
IEEE Access 9, 51258-51276, 2021
A System Call Refinement-Based Enhanced Minimum Redundancy Maximum Relevance Method for Ransomware Early Detection
MMH Yahye Abukar Ahmed, Barış Koçer, Shamsul Huda, Bander Ali Saleh Al-rimy
Journal of Network and Computer Applications, 2020
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection
BAS Al-rimy
Future Generation Computer Systems 115, 641-658, 2021
Hybrid and multifaceted context-aware misbehavior detection model for vehicular ad hoc network
FA Ghaleb, MA Maarof, A Zainal, BAS Al-Rimy, F Saeed, T Al-Hadhrami
IEEE Access 7, 159119-159140, 2019
A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction
BAS Al-rimy
IEEE Access 8, 1-10, 2020
Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network
FA Ghaleb, MA Maarof, A Zainal, BAS Al-rimy, A Alsaeedi, W Boulila
Remote Sensing 11 (23), 2852, 2019
An adaptive protection of flooding attacks model for complex network environments
BA Khalaf, SA Mostafa, A Mustapha, MA Mohammed, MA Mahmoud, ...
Security and Communication Networks 2021, 2021
Automated Analysis Approach for the Detection of High Survivable Ransomware
BASA Yahye Abukar Ahmed, Barış Koçer
KSII Transactions on Internet and Information Systems 14 (5), 2236-2257, 2020
Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions
U Urooj, BASA rimy, A Zainal, FA Ghaleb, MA Rassam
Applied Sciences, 2022
DeepIoT.IDS: Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection
ZK Maseer, R Yusof, SA Mostafa, N Bahaman, O Musa, BAS Al-rimy
CMC-Computers, Materials & Continua 69 (3), 3945–3966, 2021
Ransomware anti-analysis and evasion techniques: A survey and research directions
MN Olaimat, MA Maarof, BAS Al-rimy
2021 3rd international cyber resilience conference (CRC), 1-6, 2021
A user mobility-aware fair channel assignment scheme for wireless mesh network
BAS Al-rimy, M Kamat, FA Ghaleb, F Rohani, SA Razak, MA Shah
Computational Science and Technology, 531-541, 2020
A proposed adaptive pre-encryption crypto-ransomware early detection model
U Urooj, MAB Maarof, BAS Al-rimy
2021 3rd International Cyber Resilience Conference (CRC), 1-6, 2021
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-aware Approach
FA Ghaleb, BAS Al-rimy, A Almalawi, AM Ali, A Zainal, MA Rassam, ...
IEEE Access, 2020
Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges
Y Alghofaili, A Albattah, N Alrajeh, MA Rassam, BAS Al-rimy
Applied Sciences 11 (19), 2021
The system can't perform the operation now. Try again later.
Articles 1–20