Follow
Dr.Fakariah Hani Mohd Ali
Dr.Fakariah Hani Mohd Ali
lecturer faculty of computer and mathematical sciences universiti teknologi MARA
Verified email at tmsk.uitm.edu.my
Title
Cited by
Cited by
Year
Study of S-box properties in block cipher
K Mohamed, MNM Pauzi, FHHM Ali, S Ariffin, NHN Zulkipli
2014 International Conference on Computer, Communications, and Control …, 2014
602014
Evaluation effectiveness of hybrid IDs using snort with naive Bayes to detect attacks
SM Hussein, FHM Ali, Z Kasiran
2012 Second International Conference on Digital Information and …, 2012
452012
Detection and defense algorithms of different types of DDoS attacks
MAM Yusof, FHM Ali, MY Darus
International Journal of Engineering and Technology 9 (5), 410, 2017
412017
Simple Port Knocking Method
ATCPR Attack, P Scanning
38*
A method for web application vulnerabilities detection by using Boyer-Moore string matching algorithm
AZM Saleh, NA Rozali, AG Buja, KA Jalil, FHM Ali, TFA Rahman
Procedia Computer Science 72, 112-121, 2015
372015
Comparison of malware detection techniques using machine learning algorithm
N Selamat, F Ali
Indones. J. Electr. Eng. Comput. Sci 16 (1), 435-440, 2019
312019
Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11
N Baharudin, FHM Ali, MY Darus, N Awang
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
212015
A novel hybrid fuzzy-SVM image steganographic model
HS Hussain, SA Aljunid, S Yahya, FHM Ali
2010 International Symposium on Information Technology 1, 1-6, 2010
192010
Detection and defense algorithms of different types of DDoS attacks using machine learning
MAM Yusof, FHM Ali, MY Darus
Computational Science and Technology: 4th ICCST 2017, Kuala Lumpur, Malaysia …, 2018
162018
Profiling and mitigating brute force attack in home wireless LAN
MYM Hafiz, FHM Ali
2014 International Conference on Computational Science and Technology (ICCST …, 2014
152014
An Improved AES S-box Based on Fibonacci Numbers and Prime Factor.
K Mohamed, FHHM Ali, S Ariffin, NH Zakaria, MNM Pauzi
Int. J. Netw. Secur. 20 (6), 1206-1214, 2018
122018
Performance enhancement of wireless sensor network (WSN) with the implementation of Hybrid ARQ (HARQ) and Transmission Power Control (TPC)
SM Razali, K Mamat, K Abdul-Basit, FHM Ali
2014 IEEE Conference on Wireless Sensors (ICWiSE), 36-40, 2014
102014
Secured web application using combination of Query Tokenization and Adaptive Method in preventing SQL Injection Attacks
NAA Othman, FHM Ali, MBM Noh
2014 International Conference on Computer, Communications, and Control …, 2014
102014
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations.
M Ali, F Hani, R Mahmod, M Rushdan, I Abdullah
Universiti Putra Malaysia, 2004
10*2004
Polymorphic malware detection
NS Selamat, FHM Ali, NAA Othman
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-5, 2016
92016
Network security threat assessment model based on fuzzy algorithm
FHM Ali, WMNHW Ismail
2011 IEEE International Conference on Computer Science and Automation …, 2011
82011
Green synthesis of gold nanaoparticles using Delphinium Chitralense tuber extracts, their characterization and enzyme inhibitory potential
S Ahmad, H Ahmad, I Khan, S Alghamdi, M Almehmadi, M Ali, A Ullah, ...
Brazilian Journal of Biology 82, e257622, 2022
72022
Directional Based Graphical Authentication Method with Shoulder Surfing Resistant
NAA Othman, MAA Rahman, ASA Sani, FHM Ali
2018 IEEE Conference on Systems, Process and Control (ICSPC), 198-202, 2018
72018
Ids using mitigation rules approach to mitigate icmp attacks
ADA Hadi, FH Azmat, FHM Ali
2013 International Conference on Advanced Computer Science Applications and …, 2013
72013
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
S Yahya, HS Hussain
62015
The system can't perform the operation now. Try again later.
Articles 1–20