Cyber threat intelligence–issue and challenges MS Abu, SR Selamat, A Ariffin, R Yusof Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018 | 180 | 2018 |
Zero-day aware decision fusion-based model for crypto-ransomware early detection BAS Al-rimy, MA Maarof, YA Prasetyo, SZM Shaid, AFM Ariffin International Journal of Integrated Engineering 10 (6), 2018 | 66 | 2018 |
Android malware detection using machine learning on image patterns FM Darus, NAA Salleh, AFM Ariffin 2018 Cyber Resilience Conference (CRC), 1-2, 2018 | 46 | 2018 |
The rise of ransomware WZA Zakaria, MF Abdollah, O Mohd, AFM Ariffin Proceedings of the 2017 International Conference on Software and e-Business …, 2017 | 42 | 2017 |
iOS anti-forensics: How can we securely conceal, delete and insert data? C D'Orazio, A Ariffin, R Choo 47th Annual Hawaii International Conference on System Sciences (HICSS 2014), 2013 | 31 | 2013 |
iOS Forensics: How can we recover deleted image files with timestamp in a forensically sound manner? A Ariffin, C D'Orazio, KKR Choo, J Slay The 8th ARES Conference (ARES 2013), University of Regensburg, Germany., 2013 | 25 | 2013 |
Cloud forensic challenges and recommendations: A review W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020 | 20 | 2020 |
A systematic literature review on the security and privacy of the blockchain and cryptocurrency A Hassan, MZ Mas' ud, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ... OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020 | 19 | 2020 |
Endpoint detection and response: Why use machine learning? NNA Sjarif, S Chuprat, MN Mahrin, NA Ahmad, A Ariffin, FM Senan, ... 2019 International Conference on Information and Communication Technology …, 2019 | 19 | 2019 |
Android malware classification using XGBoost on data image pattern FM Darus, NA Ahmad, AFM Ariffin 2019 IEEE International Conference on Internet of Things and Intelligence …, 2019 | 16 | 2019 |
Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection WZA Zakaria, MF Abdollah, O Mohd, SMWMSMM Yassin, A Ariffin International Journal of Advanced Computer Science and Applications 13 (5), 2022 | 14 | 2022 |
Cryptocurrencies investigation: A methodology for the preservation of cryptowallets SK Taylor, A Ariffin, KAZ Ariffin, SNHS Abdullah 2021 3rd international cyber resilience conference (CRC), 1-5, 2021 | 14 | 2021 |
Forensic readiness: A case study on digital CCTV systems antiforensics A Ariffin, KKR Choo, Z Yunos Contemporary digital forensic investigations of cloud and mobile …, 2017 | 14 | 2017 |
Data Recovery From Proprietary-Formatted CCTV Hard Disks A Ariffin, J Slay, KKR Choo Advances in Digital Forensics IX, 2013 | 14 | 2013 |
Digital Camcorder Forensics A Ariffin, KKR Choo, J Slay | 12 | 2013 |
Taxonomy of cyber threat intelligence framework AN Irfan, S Chuprat, MN Mahrin, A Ariffin 2022 13th International Conference on Information and Communication …, 2022 | 11 | 2022 |
An enhancement of cyber threat Intelligence framework S Abu, SR Selamat, R Yusof, A Ariffin J. Adv. Res. Dyn. Control. Syst 10, 96-104, 2018 | 10 | 2018 |
A review of digital forensics framework for blockchain in cryptocurrency technology MZ Mas’ud, A Hassan, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ... 2021 3rd International Cyber Resilience Conference (CRC), 1-6, 2021 | 9 | 2021 |
An attribution of cyberattack using association rule mining (ARM) MS Abu, SR Selamat, R Yusof, A Ariffin International Journal of Advanced Computer Science and Applications 11 (2), 2020 | 7 | 2020 |
Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis Z Yunos, A Ariffin http://www.waset.org/downloads/16/papers/17za110003.pdf, 2017 | 7 | 2017 |