Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded video CRP Siahaan, A Chowanda Journal of Big Data 9 (1), 111, 2022 | 5 | 2022 |
Deployment of Honeypot and SIEM Tools for Cyber Security Education Model in UITM. MA Mohd Ariffin, MY Darus, H Haron, A Kurniawan, Y Muliono, ... International Journal of Emerging Technologies in Learning 17 (20), 2022 | 3 | 2022 |
Automation of Quantifying Security Risk Level on Injection Attacks Based on Common Vulnerability Scoring System Metric. A Kurniawan, MY Darus, MA Mohd Ariffin, Y Muliono, CR Pardomuan Pertanika Journal of Science & Technology 31 (3), 2023 | 1 | 2023 |
Server-Side Cross-Site Scripting Detection Powered by HTML Semantic Parsing Inspired by XSS Auditor. CR Pardomuan, A Kurniawan, MY Darus, MA Mohd Ariffin, Y Muliono Pertanika Journal of Science & Technology 31 (3), 2023 | 1 | 2023 |
Enhancing Web Application Penetration Testing with a Static Application Security Testing (SAST) Tool MY Darus, MFB Bolhan, A Kurniawan, Y Muliono, CR Pardomuan, ... 2023 IEEE 8th International Conference on Recent Advances and Innovations in …, 2023 | | 2023 |
Predicting Confidentiality, Integrity, and Availability from SQL Injection Payload Y Muliono, MY Darus, CR Pardomuan, MAM Ariffin, A Kurniawan 2022 International Conference on Information Management and Technology …, 2022 | | 2022 |