Mohd Faizal Abdollah
YOU?
Author Swipe
View article: PENDEKATAN PENDIDIKAN AGAMA ISLAM DALAM MEMPERKUAT TOLERANSI BERAGAMA SISWA DI SMPN 1 KOTA BIMA
PENDEKATAN PENDIDIKAN AGAMA ISLAM DALAM MEMPERKUAT TOLERANSI BERAGAMA SISWA DI SMPN 1 KOTA BIMA Open
This research aims to examine the Islamic religious education approach to building interfaith tolerance at SMPN 1 Kota Bima. Tolerance is crucial in Indonesia's diverse society, especially among young people who are in the process of formi…
View article: Routing Protocols Performance on 6LoWPAN IoT Networks
Routing Protocols Performance on 6LoWPAN IoT Networks Open
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of …
View article: Novel Unsupervised Cluster Reinforcement Q-Learning in Minimizing Energy Consumption of Federated Edge Cloud
Novel Unsupervised Cluster Reinforcement Q-Learning in Minimizing Energy Consumption of Federated Edge Cloud Open
As global demand for cloud computing rises, green computing has become essential. Federated Edge Cloud (FEC) offers improved energy efficiency compared to traditional infrastructures, yet managing distributed energy consumption remains a c…
View article: Ransomware Early Detection using Machine Learning Approach and Pre-Encryption Boundary Identification
Ransomware Early Detection using Machine Learning Approach and Pre-Encryption Boundary Identification Open
The escalating ransomware threat has catalysed the formation of a sophisticated network of cybercriminal enterprises. Addressing this issue, our research provides a detailed exploration of the ransomware menace and an evaluation of contemp…
View article: Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning
Early Detection of Windows Cryptographic Ransomware Based on Pre-Attack API Calls Features and Machine Learning Open
Ransomware attacks are currently one of cybersecurity's greatest and most alluring threats. Antivirus software is frequently ineffective against zero-day malware and ransomware attacks; consequently, significant network infections could re…
View article: Malware Detection Using K-Nearest Neighbor Algorithm and Feature Selection
Malware Detection Using K-Nearest Neighbor Algorithm and Feature Selection Open
Malware is one of the biggest threats in today’s digital era. Malware detection becomes crucial since it can protect devices or systems from the dangers posed by malware, such as data loss/damage, data theft, account break-ins, and the ent…
View article: Ransomware Behavior on Windows Endpoint: An Analysis
Ransomware Behavior on Windows Endpoint: An Analysis Open
This paper provides a comprehensive examination of ransomware behavior on Windows endpoints, exploring the intrusion mechanisms, proliferation methods, and the mitigating strategies that can be employed. It provides a comparative analysis …
View article: Blackhole attacks in internet of things networks: a review
Blackhole attacks in internet of things networks: a review Open
The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected …
View article: An Improved Fully Homomorphic Encryption Scheme for Cloud Computing
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing Open
Business in cloud computing is very popular among Small and Medium Enterprises (SMEs). By leveraging services from the cloud, such companies can migrate all of their in-house operations to cloud at low costs with minimum IT facility requir…
View article: RENTAKA: A Novel Machine Learning Framework for Crypto-Ransomware Pre-encryption Detection
RENTAKA: A Novel Machine Learning Framework for Crypto-Ransomware Pre-encryption Detection Open
Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber community due to several successful worldwide attacks. The encryption employed…
View article: SSRINDEX tool: An automated tool to measure level of software security readiness index for remote working during Covid-19 pandemic
SSRINDEX tool: An automated tool to measure level of software security readiness index for remote working during Covid-19 pandemic Open
Resulting from the COVID-19 pandemic, which requires mankind to practice social distancing, companies and government agencies do not have any options but to send their workers home and practice remote working. With very limited guidance, w…
View article: Validity Of Fisher Effect Theory: Evidence from The Conventional and Islamic Money Market in Malaysia
Validity Of Fisher Effect Theory: Evidence from The Conventional and Islamic Money Market in Malaysia Open
This study attempts to examine existence of Fisher Effect theory in Malaysia's conventional and Islamic money markets.Time series data has been included for the years 2011 to 2018 and consists of two stages of data analysis.First stage ana…
View article: Peer Review #1 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.3)"
Peer Review #1 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.3)" Open
Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture.Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in d…
View article: Peer Review #1 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.1)"
Peer Review #1 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.1)" Open
Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture.Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in d…
View article: Peer Review #3 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.3)"
Peer Review #3 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.3)" Open
Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture.Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in d…
View article: Peer Review #3 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.2)"
Peer Review #3 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.2)" Open
Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture.Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in d…
View article: Peer Review #2 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.1)"
Peer Review #2 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.1)" Open
Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture.Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in d…
View article: Peer Review #2 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.2)"
Peer Review #2 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.2)" Open
Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture.Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in d…
View article: Peer Review #2 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.3)"
Peer Review #2 of "Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation) (v0.3)" Open
Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture.Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in d…
View article: Automated Feature Selection using Boruta Algorithm to Detect Mobile Malware
Automated Feature Selection using Boruta Algorithm to Detect Mobile Malware Open
The usage of android system is rapidly growing in mobile devices.Android system might also incur severe different malware dangers and security threats such as infections, root exploit, Trojan, and worms.The malware has potential to comprom…
View article: Hoax news validation using similarity algorithms
Hoax news validation using similarity algorithms Open
News that is presented every day on social media dramatically affects the feelings, feelings, thoughts, or even actions of a person or group. Hoax News is one of them which is disturbing the public and raising noise in various fields, rang…
View article: Hoax News Classification using Machine Learning Algorithms
Hoax News Classification using Machine Learning Algorithms Open
Hoax news on social media has had a dramatic effect on our society in recent years. The impact of hoax news felt by many people, anxiety, financial loss, and loss of the right name. Therefore we need a detection system that can help reduce…
View article: Crypto Ransomware Detection on Windows Operating System
Crypto Ransomware Detection on Windows Operating System Open
Crypto-ransomware is a kind of malware threat, and it is one of approach frequently used by cybercriminals. It is due to the capability to hijack the victim’s files and data by totally encrypting it using sophisticated cryptographic librar…
View article: INTRODUCING A NEW CITIZEN-CENTRIC MODEL OF EPARTICIPATION IN IRAQ
INTRODUCING A NEW CITIZEN-CENTRIC MODEL OF EPARTICIPATION IN IRAQ Open
The study objective is to validate and evaluate the proposed model of adopting an e-participation model for e-government in Iraq. The new integrated model was constructed throughout the utilization of variables from three main theories and…
View article: Intersection Features for Android Botnet Classification
Intersection Features for Android Botnet Classification Open
The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) deve…
View article: Optimization and estimation framework of smart farm based on spatial data mining and geostatistics
Optimization and estimation framework of smart farm based on spatial data mining and geostatistics Open
The development of integrated information systems in the field of rice plant has become an urgent need for policy makers at both provincial and national levels, specialized in developing countries such as Indonesia. At this time, data rela…
View article: E-PARTICIPATION ADOPTION OF GOVERNMENT SERVICES IN IRAQ: A PILOT STUDY
E-PARTICIPATION ADOPTION OF GOVERNMENT SERVICES IN IRAQ: A PILOT STUDY Open
The purpose of this study is to validate the reliability of the questionnaires items in order to make sure that items are ready to be utilized in the main survey of adopting an e-participation model for e-government in Iraq.
View article: E-GOVERNMENT ADOPTION SUCCESS FACTORS AND THEIR WEIGHT ANALYSIS: A CITIZEN PERSPECTIVE
E-GOVERNMENT ADOPTION SUCCESS FACTORS AND THEIR WEIGHT ANALYSIS: A CITIZEN PERSPECTIVE Open
Since there are many theories, models and factors to choose when investigating the e-government adoption, the issue of how to choose the appropriate factors arises. Hence, this study’s purpose is to overcome this issue by highlighting e-go…