Follow
ismahani ismail
ismahani ismail
Verified email at utm.my
Title
Cited by
Cited by
Year
Feature selection and machine learning classification for malware detection
BM Khammas, A Monemi, JS Bassi, I Ismail, SM Nor, MN Marsono
Jurnal Teknologi 77 (1), 2015
452015
Edge computing intelligence using robust feature selection for network traffic classification in internet-of-things
B Mohammed, M Hamdan, JS Bassi, HA Jamil, S Khan, A Elhigazi, ...
IEEE Access 8, 224059-224070, 2020
172020
Detecting worms using data mining techniques: learning in the presence of class noise
I Ismail, MN Marsono, SM Nor
2010 Sixth International Conference on Signal-Image Technology and Internet …, 2010
162010
Incorporating known malware signatures to classify new malware variants in network traffic
I Ismail, MN Marsono, BM Khammas, SM Nor
International Journal of Network Management 25 (6), 471-489, 2015
152015
Multi-stage feature selection for on-line flow peer-to-peer traffic identification
BM Ali Abdalla, HA Jamil, M Hamdan, JS Bassi, I Ismail, MN Marsono
Modeling, Design and Simulation of Systems: 17th Asia Simulation Conference …, 2017
122017
Stateless malware packet detection by incorporating naive bayes with known malware signatures
I Ismail, SM Nor, MN Marsono
Applied Computational Intelligence and Soft Computing 2014, 5-5, 2014
122014
Metamorphic malware detection based on support vector machine classification of malware sub-signatures
BM Khammas, A Monemi, I Ismail, SM Nor, MN Marsono
TELKOMNIKA (Telecommunication Computing Electronics and Control) 14 (3 …, 2016
112016
Accuracy improved malware detection method using snort sub-signatures and machine learning techniques
BM Khammas, S Hasan, RA Ahmed, JS Bassi, I Ismail
2018 10th Computer Science and Electronic Engineering (CEEC), 107-112, 2018
92018
Impact of packet inter-arrival time features for online peer-to-peer (P2P) classification
BMA Abdalla, M Hamdan, MS Mohammed, JS Bassi, I Ismail, ...
International Journal of Electrical and Computer Engineering 8 (4), 2521, 2018
92018
Pre-filters in-transit malware packets detection in the network
BM Khammas, I Ismail, MN Marsono
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (4 …, 2019
82019
Financial analysis
M Mohammed, I Ismail, AN Nour
Amman, Jordan, Institute of banking studies, 1997
71997
First line defense against spreading new malware in the network
BM Khammas, S Hasan, N Nateq, JS Bassi, I Ismail, MN Marsono
2018 10th Computer Science and Electronic Engineering (CEEC), 113-118, 2018
52018
Online peer-to-peer traffic identification. based on complex events processing of traffic event signatures
JS Bassi, LH Ru, I Ismail, BM Khammas, MN Marsono
Jurnal Teknologi 78 (7), 9-16, 2016
52016
Obfuscated computer virus detection using machine learning algorithm
TH Xin, I Ismail, BM Khammas
Bulletin of Electrical Engineering and Informatics 8 (4), 1383-1391, 2019
42019
Malware detection using augmented naive Bayes with domain knowledge and under presence of class noise
I Ismail, MN Marsono, SM Nor
International Journal of Information and Computer Security 6 (2), 179-197, 2014
32014
Naive Bayes classification with domain knowledge for new malware variants and stateless packet level detection
I Ismail
Universiti Teknologi Malaysia, 2013
32013
Cooperative learning for online in-network performance monitoring
SB Joseph, HR Loo, I Ismail, MN Marsono
2015 IEEE 12th Malaysia International Conference on Communications (MICC …, 2015
22015
Study of Enhanced DCF (EDCF) in Multimedia Application
I Ismail
Universiti Teknologi Malaysia, 2005
22005
Impact of Early Estimation of Statistical Flow Features in On-line P2P Classification
BMA Abdalla, M Hamdan, EH Khalifa, A Elhigazi, I Ismail, MN Marsono
2020 IEEE Student Conference on Research and Development (SCOReD), 294-299, 2020
12020
Cooperative learning for distributed in-network traffic classification
SB Joseph, HR Loo, I Ismail, T Andromeda, MN Marsono
IOP Conference Series: Materials Science and Engineering 190 (1), 012010, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20