Study of S-box properties in block cipher K Mohamed, MNM Pauzi, FHHM Ali, S Ariffin, NHN Zulkipli 2014 International Conference on Computer, Communications, and Control …, 2014 | 60 | 2014 |
Evaluation effectiveness of hybrid IDs using snort with naive Bayes to detect attacks SM Hussein, FHM Ali, Z Kasiran 2012 Second International Conference on Digital Information and …, 2012 | 45 | 2012 |
Detection and defense algorithms of different types of DDoS attacks MAM Yusof, FHM Ali, MY Darus International Journal of Engineering and Technology 9 (5), 410, 2017 | 41 | 2017 |
Simple Port Knocking Method ATCPR Attack, P Scanning | 38* | |
A method for web application vulnerabilities detection by using Boyer-Moore string matching algorithm AZM Saleh, NA Rozali, AG Buja, KA Jalil, FHM Ali, TFA Rahman Procedia Computer Science 72, 112-121, 2015 | 37 | 2015 |
Comparison of malware detection techniques using machine learning algorithm N Selamat, F Ali Indones. J. Electr. Eng. Comput. Sci 16 (1), 435-440, 2019 | 31 | 2019 |
Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11 N Baharudin, FHM Ali, MY Darus, N Awang 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015 | 21 | 2015 |
A novel hybrid fuzzy-SVM image steganographic model HS Hussain, SA Aljunid, S Yahya, FHM Ali 2010 International Symposium on Information Technology 1, 1-6, 2010 | 19 | 2010 |
Detection and defense algorithms of different types of DDoS attacks using machine learning MAM Yusof, FHM Ali, MY Darus Computational Science and Technology: 4th ICCST 2017, Kuala Lumpur, Malaysia …, 2018 | 16 | 2018 |
Profiling and mitigating brute force attack in home wireless LAN MYM Hafiz, FHM Ali 2014 International Conference on Computational Science and Technology (ICCST …, 2014 | 15 | 2014 |
An Improved AES S-box Based on Fibonacci Numbers and Prime Factor. K Mohamed, FHHM Ali, S Ariffin, NH Zakaria, MNM Pauzi Int. J. Netw. Secur. 20 (6), 1206-1214, 2018 | 12 | 2018 |
Performance enhancement of wireless sensor network (WSN) with the implementation of Hybrid ARQ (HARQ) and Transmission Power Control (TPC) SM Razali, K Mamat, K Abdul-Basit, FHM Ali 2014 IEEE Conference on Wireless Sensors (ICWiSE), 36-40, 2014 | 10 | 2014 |
Secured web application using combination of Query Tokenization and Adaptive Method in preventing SQL Injection Attacks NAA Othman, FHM Ali, MBM Noh 2014 International Conference on Computer, Communications, and Control …, 2014 | 10 | 2014 |
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations. M Ali, F Hani, R Mahmod, M Rushdan, I Abdullah Universiti Putra Malaysia, 2004 | 10* | 2004 |
Polymorphic malware detection NS Selamat, FHM Ali, NAA Othman 2016 6th International Conference on IT Convergence and Security (ICITCS), 1-5, 2016 | 9 | 2016 |
Network security threat assessment model based on fuzzy algorithm FHM Ali, WMNHW Ismail 2011 IEEE International Conference on Computer Science and Automation …, 2011 | 8 | 2011 |
Green synthesis of gold nanaoparticles using Delphinium Chitralense tuber extracts, their characterization and enzyme inhibitory potential S Ahmad, H Ahmad, I Khan, S Alghamdi, M Almehmadi, M Ali, A Ullah, ... Brazilian Journal of Biology 82, e257622, 2022 | 7 | 2022 |
Directional Based Graphical Authentication Method with Shoulder Surfing Resistant NAA Othman, MAA Rahman, ASA Sani, FHM Ali 2018 IEEE Conference on Systems, Process and Control (ICSPC), 198-202, 2018 | 7 | 2018 |
Ids using mitigation rules approach to mitigate icmp attacks ADA Hadi, FH Azmat, FHM Ali 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 7 | 2013 |
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image S Yahya, HS Hussain | 6 | 2015 |