Shahrin Sahib
TitoloCitata daAnno
Mapping process of digital forensic investigation framework
SR Selamat, R Yusof, S Sahib
International Journal of Computer Science and Network Security 8 (10), 163-169, 2008
1222008
An introduction to image steganography techniques
AAJ Altaay, SB Sahib, M Zamani
2012 International Conference on Advanced Computer Science Applications and …, 2012
652012
Intrusion alert correlation technique analysis for heterogeneous log
R Yusof, SR Selamat, S Sahib
International Journal of Computer Science and Network Security 8 (9), 132-138, 2008
572008
Analysis of features selection and machine learning classifier in android malware detection
MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat, R Yusof
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
432014
A new generic taxonomy on hybrid malware detection technique
Y Robiah, SS Rahayu, MM Zaki, S Shahrin, MA Faizal, R Marliza
arXiv preprint arXiv:0909.4860, 2009
342009
On the choice of the wavelets for ECG data compression
R Besar, C Eswaran, S Sahib, RJ Simpson
2000 IEEE International Conference on Acoustics, Speech, and Signal …, 2000
232000
Perception on cyber terrorism: A focus group discussion approach
R Ahmad
Journal of Information Security, 2012 3, 231-237, 2012
222012
Understanding cyber terrorism: The grounded theory method applied
R Ahmad, Z Yunos, S Sahib
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
212012
Image watermarking using psychovisual threshold over the edge
NA Abu, F Ernawan, N Suryana, S Sahib
Information and Communication Technology-EurAsia Conference, 519-527, 2013
202013
Forensic Traceability Index in Digital Forensic Investigation
SR Selamat, S Sahib, NH Hassan, R Yusof, MF Abdollah
Journal of Information Security, 19-32, 2013
182013
Technical security metrics model in compliance with ISO/IEC 27001 standard
A MP Azuwa, R Ahmad, S Sahib
International Journal of Cyber-Security and Digital Forensics 1, 280-288, 2012
162012
Image super-resolution via discrete tchebichef moment
NA Abu, WS Lang, S Sahib
2009 International Conference on Computer Technology and Development 2, 315-319, 2009
152009
Threshold verification technique for network intrusion detection system
MA Faizal, MM Zaki, S Shahrin, Y Robiah, SS Rahayu, B Nazrulazhar
arXiv preprint arXiv:0906.3843, 2009
152009
Response quality evaluation in heterogeneous question answering system: a black-box approach
GO Sing, C Ardil, W Wong, S Sahib
Proceedings of World Academy of Science, Engineering and Technology 9, 2005
142005
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
2013 International Conference on Technology, Informatics, Management …, 2013
132013
Time based intrusion detection on fast attack for network intrusion detection system
MA Faizal, S Sahib, Y Robiah, S Rahayu
2010 Second International Conference on Network Applications, Protocols and …, 2010
132010
Determining the threshold of pixel correlativity analysis
AA Jabbar, SB Sahib, M Zamani
International Journal of Digital Content Technology and its Applications 7 …, 2013
112013
A framework of features selection for ipv6 network attacks detection
M Zulkiflee, M Azmi, S Ahmad, S Sahib, M Ghani
WSEAS Trans Commun 14 (46), 399-408, 2015
102015
Android malware detection system classification
MZ Masud, S Sahib, MF Abdollah, SR Selamat, R Yusof
Research Journal of Information Technology 6 (4), 325-341, 2014
102014
Psychovisual model on discrete orthonormal transform
NA Abu, F Ernawan, S Sahib
AIP Conference Proceedings 1557 (1), 309-314, 2013
102013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20