Syed Zainudeen Mohd Shaid
Syed Zainudeen Mohd Shaid
Lecturer of Computer Science, Faculty of Computing, Universiti Teknologi Malaysia
Email verificata su - Home page
Citata da
Citata da
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
BAS Al-rimy, MA Maarof, SZM Shaid
Computers & Security 74, 144-166, 2018
Malware behavior image for malware variant identification
SZM Shaid, MA Maarof
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection
BAS Al-rimy, MA Maarof, SZM Shaid
Future Generation Computer Systems 101, 476-491, 2019
Zero-day aware decision fusion-based model for crypto-ransomware early detection
BAS Al-rimy, MA Maarof, YA Prasetyo, SZM Shaid, AFM Ariffin
International Journal of Integrated Engineering 10 (6), 2018
Redundancy coefficient gradual up-weighting-based mutual information feature selection technique for crypto-ransomware early detection
BAS Al-Rimy, MA Maarof, M Alazab, SZM Shaid, FA Ghaleb, A Almalawi, ...
Future Generation Computer Systems 115, 641-658, 2021
In memory detection of Windows API call hooking technique
SZM Shaid, MA Maarof
2015 International conference on computer, communications, and control …, 2015
A pseudo feedback-based annotated TF-IDF technique for dynamic crypto-ransomware pre-encryption boundary delineation and features extraction
BAS Al-Rimy, MA Maarof, M Alazab, F Alsolami, SZM Shaid, FA Ghaleb, ...
IEEE Access 8, 140586-140598, 2020
Malware Behaviour Visualization
SZ Mohd Shaid, MA Maarof
Jurnal Teknologi 70 (5), 2014
An optimized skin texture model using gray-level co-occurrence matrix
M Maktabdar Oghaz, MA Maarof, MF Rohani, A Zainal, SZM Shaid
Neural Computing and Applications 31 (6), 1835-1853, 2019
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach
FA Ghaleb, BAS Al-Rimy, A Almalawi, AM Ali, A Zainal, MA Rassam, ...
IEEE Access 8, 217744-217761, 2020
Automating penetration testing within an ambiguous testing environment
LK Seng, N Ithnin, SZM Shaid
International Journal of Innovative Computing 8 (3), 2018
A hybrid color space for skin recognition for real-time applications
MM Oghaz, MA Maarof, MF Rohani, A Zainal, SZM Shaid
Journal of Computational and Theoretical Nanoscience 14 (4), 1852-1861, 2017
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection
BA Saleh Al-rimy, M Aizaini Maarof, SZM Shaid
arXiv e-prints, arXiv: 1807.09574, 2018
A Visually-verifiable Malware Classification Framework Using Malware Behaviour Image
SZM Shaid
Universiti Teknologi Malaysia, 2014
Introduction to Malware Reverse Engineering
SZ Mohd Shaid
Issues in Computer Security & Networking, Part 1, 105-127, 2012
Cloud-based RFID Attendance System
MFAM Yazid, SZM Shaid
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–16