Mohd Aizaini Maarof
Mohd Aizaini Maarof
Professor of Information Security, Universiti Teknologi Malaysia (UTM)- Research ID: L-4331-2013
Verified email at utm.my
Title
Cited by
Cited by
Year
Fraud detection system: A survey
A Abdallah, MA Maarof, A Zainal
Journal of Network and Computer Applications 68, 90-113, 2016
3262016
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
BAS Al-rimy, MA Maarof, SZM Shaid
Computers & Security 74, 144-166, 2018
1742018
Malware detection based on hybrid signature behaviour application programming interface call graph
AAE Elhadi, MA Maarof, AH Osman
American Journal of Applied Sciences 9 (3), 283, 2012
982012
Ensemble classifiers for network intrusion detection system
A Zainal, MA Maarof, SM Shamsuddin
Journal of Information Assurance and Security 4 (3), 217-225, 2009
922009
Improving the detection of malware behaviour using simplified data dependent API call graph
AAE Elhadi, MA Maarof, BIA Barry
International Journal of Security and Its Applications 7 (5), 29-42, 2013
752013
A survey of intrusion detection schemes in wireless sensor networks
MA Rassam, MA Maarof, A Zainal
American Journal of Applied Sciences 9 (10), 1636, 2012
732012
Feature selection using Rough-DPSO in anomaly intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
International Conference on Computational Science and Its Applications, 512-524, 2007
702007
Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues
MA Rassam, A Zainal, MA Maarof
Sensors 13 (8), 10087-10122, 2013
662013
Malware behavior image for malware variant identification
SZM Shaid, MA Maarof
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
542014
Feature selection using rough set in intrusion detection
A Zainal, MA Maarof, SM Shamsuddin
TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006
542006
Enhancing the detection of metamorphic malware using call graphs
AAE Elhadi, MA Maarof, BIA Barry, H Hamza
computers & security 46, 62-78, 2014
522014
Shelf-life evaluation of bilayered human skin equivalent, MyDerm™
WT Seet, M Maarof, K Khairul Anuar, KH Chua, AW Ahmad Irfan, MH Ng, ...
Public Library of Science 7 (8), e40978, 2012
502012
Adaptive and online data anomaly detection for wireless sensor systems
MA Rassam, MA Maarof, A Zainal
Knowledge-Based Systems 60, 44-57, 2014
462014
Intelligent alert clustering model for network intrusion analysis
MM Siraj, MA Maarof, SZM Hashim
Int. J. Advance. Soft Comput. Appl 1 (1), 1-16, 2009
362009
Ensemble of one-class classifiers for network intrusion detection system
A Zainal, MA Maarof, SM Shamsuddin, A Abraham
2008 The Fourth International Conference on Information Assurance and …, 2008
352008
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications
MA Rassam, A Zainal, MA Maarof
Applied Soft Computing 13 (4), 1978-1996, 2013
342013
A sinkhole attack detection scheme in mintroute wireless sensor networks
MA Rassam, A Zainal, MA Maarof, M Al-Shaboti
2012 International Symposium on Telecommunication Technologies, 71-75, 2012
292012
A 0-day aware crypto-ransomware early behavioral detection framework
BAS Al-rimy, MA Maarof, SZM Shaid
International Conference of Reliable Information and Communication …, 2017
282017
Secretion of wound healing mediators by single and bi-layer skin substitutes
M Maarof, JX Law, SR Chowdhury, KA Khairoji, AB Saim, RBH Idrus
Cytotechnology 68 (5), 1873-1884, 2016
282016
Keystroke dynamic authentication in mobile cloud computing
M Babaeizadeh, M Bakhtiari, MA Maarof
Universiti Teknologi Malaysia, 2014
282014
The system can't perform the operation now. Try again later.
Articles 1–20