Follow
Raihana Syahirah Abdullah
Raihana Syahirah Abdullah
Verified email at utem.edu.my
Title
Cited by
Cited by
Year
Revealing the criterion on botnet detection technique
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' Ud, SR Selamat, R Yusof
International Journal of Computer Science Issues (IJCSI) 10 (2), 208, 2013
362013
Block chain: cryptographic method in fourth industrial revolution
RS Abdullah, MA Faizal
International Journal of Computer Network and Information Security 10 (11), 9, 2018
222018
Identify of factors affecting information security awareness and weight analysis Process
I Al-Shanfari, W Yassin, R Abdullah
International Journal of Engineering and Advanced Technology (IJEAT) 9 (3 …, 2020
182020
Preliminary study of host and network-based analysis on P2P Botnet detection
RS Abdullah, MF Abdollah, ZAM Noh, MZ Mas' ud, S Sahib, R Yusof
2013 International Conference on Technology, Informatics, Management …, 2013
162013
Attack graph reachability: concept, analysis, challenges and issues
ZJ Al-Araji, SSS Ahmed, RS Abdullah, AA Mutlag, HAA Raheem, ...
Network Security 2021 (6), 13-19, 2021
142021
Bin
R Abdullah, MF Abdollah
Karim, NBA, Patah, MORBA, Zahari, H., Nair, GKS, & Jusoff, K, 152-160, 2009
142009
Ransomware behavior attack construction via graph theory approach
MS Rosli, RS Abdullah, W Yassin, MA Faizal, WNFWM Zaki
International Journal of Advanced Computer Science and Applications 11 (2), 2020
82020
An IoT botnet prediction model using frequency based dependency graph: Proof-of-concept
W Yassin, R Abdullah, MF Abdollah, Z Mas' ud, FA Bakhari
Proceedings of the 2019 7th International Conference on Information …, 2019
72019
Recognizing P2P botnets characteristic through TCP distinctive behaviour
RS Abdullah, MZ Mas' ud, MF Abdollah, S Sahib, R Yusof
International Journal of Computer Science and Information Security 9 (12), 7, 2011
72011
Attack prediction to enhance attack path discovery using improved attack graph
Z Al-Araji, SS Syed Ahmad, RS Abdullah
Karbala International Journal of Modern Science 8 (3), 313-329, 2022
62022
Cyberbullying detection in twitter using sentiment analysis
CP Theng, NF Othman, RS Abdullah, S Anawar, Z Ayop, SN Ramli
International Journal of Computer Science & Network Security 21 (11), 1-10, 2021
62021
Propose vulnerability metrics to measure network secure using attack graph
ZJ Al-Araji, SSS Ahmad, RS Abdullah
International Journal of Advanced Computer Science and Applications 12 (5), 2021
62021
Tracing P2P Botnets Behavior via Hybrid Analysis Approach
RS Abdullah, MA Faizal, ZAM Noh
European Journal Scientific Research 118 (January 2014), 75-85, 2014
62014
Url phishing detection system utilizing catboost machine learning approach
LC Fang, Z Ayop, S Anawar, NF Othman, N Harum, RS Abdullah
International Journal of Computer Science & Network Security 21 (9), 297-302, 2021
52021
Understanding the threats of botnets detection: a wide scale survey
R Abdullah, N Abu, M Faizal, Z Noh
Research Journal of Information Technology 6 (3), 135-153, 2014
52014
Constructing iot botnets attack pattern for host-based and network-based platform
WNFWM Zaki, RS Abdullah, W Yassin, MA Faizal, MS Rosli
International Journal of Advanced Computer Science and Applications 12 (8), 2021
42021
A Novel Leader Election Algorithm for Honeycomb Mesh Networks
IM ALI, YAHJ YUSMADI, R ABDULLAH, RNORH NOR, LS AFFENDEY, ...
Journal of Theoretical and Applied Information Technology 97 (13), 2019
42019
An analysis of system calls using J48 and jRip for malware detection.
MA Faizal, W YASSIN, NUR HIDAYAH, SR Selamat, RS ABDULLAH
Journal of Theoretical & Applied Information Technology 96 (13), 2018
42018
Analysis of data mining tools for android malware detection
R Yusof, NS Adnan, NA Jalil, RS Abdullah
Journal of Advanced Computing Technology and Application (JACTA) 1 (2), 21-24, 2019
22019
Multivariate statistical analysis on anomaly p2p botnets detection
RSB Abdullah, MA Faizal, ZAM Noh
International Journal of Advanced Computer Science and Applications 8 (12), 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20