Robiah Yusof
YOU?
Author Swipe
View article: Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges Open
Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the perfor…
View article: An Algorithm for Color-Based Password Authentication to Increase Security Level
An Algorithm for Color-Based Password Authentication to Increase Security Level Open
Security level in authentication is essential to decrease the possibility of an account being guessed. Several authentication methods are widely used nowadays, covering digital aspects such as passwords, challenge-response, public and priv…
View article: Development of Cybersecurity Competency and Professional Talent for Cyber Ummah
Development of Cybersecurity Competency and Professional Talent for Cyber Ummah Open
The world is facing with threats in digital transformation. Cyber threats become trending as reported by my countries. Developed countries like Britain, America, Europe and Japan already prepared countermeasures for various incidents on co…
View article: Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges
Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges Open
Intrusion detection systems (IDSs) built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. Although review papers are used the systematic review or simple method…
View article: Analysis of Machine Learning Techniques on URL Phishing Dataset
Analysis of Machine Learning Techniques on URL Phishing Dataset Open
The Internet has become a vital part of daily life, as do almost all online social and financial practices. However, rising phishing sites today faced significant threats because of their appallingly imperceptible danger. Phishing is an on…
View article: IOT Based Integrated COVID-19 Self-Monitoring Tool (COV-SMT) for Quarantine
IOT Based Integrated COVID-19 Self-Monitoring Tool (COV-SMT) for Quarantine Open
COVID-19 Self-Monitoring Tool (COV-SMT) is the research developed to address multiple issues in monitoring quarantined individuals due to COVID-19 infection. As COVID-19 is still highly infectious despite the availability of vaccines, the …
View article: Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI)
Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI) Open
In recent year, an adversary has improved their Tactic, Technique and Procedure (TTPs) in launching cyberattack that make it less predictable, more persistent, resourceful and better funded. So many organisation has opted to use Cyber Thre…
View article: DeepIoT.IDS: Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection
DeepIoT.IDS: Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection Open
With an increasing number of services connected to the internet, including cloud computing and Internet of Things (IoT) systems, the prevention of cyberattacks has become more challenging due to the high dimensionality of the network traff…
View article: Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset
Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset Open
An intrusion detection system (IDS) is an important protection instrument for detecting complex network attacks. Various machine learning (ML) or deep learning (DL) algorithms have been proposed for implementing anomaly-based IDS (AIDS). O…
View article: Enhanced Authentication for Web-Based Security using Keystroke Dynamics
Enhanced Authentication for Web-Based Security using Keystroke Dynamics Open
Current password authentication system was proven not secure enough to protect the information from intruders.However, various research has been done and the results show the value of FRR still low and the value of FAR still high.Thus, one…
View article: ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS Open
Current password authentication system was proven not secure enough to protect the information from intruders. However, various research has been done and the results show the value of FRR still low and the value of FAR still high. Thus, o…
View article: An Attribution of Cyberattack using Association Rule Mining (ARM)
An Attribution of Cyberattack using Association Rule Mining (ARM) Open
With the rapid development of computer networks and information technology, an attacker has taken advantage to manipulate the situation to launch a complicated cyberattack. This complicated cyberattack causes a lot of problems among the or…
View article: Intersection Features for Android Botnet Classification
Intersection Features for Android Botnet Classification Open
The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) deve…
View article: Code Pocket: Development of Interactive Online Learning of STEM’s Subject
Code Pocket: Development of Interactive Online Learning of STEM’s Subject Open
As to promote and develop STEM education in Malaysia, various approaches have been taken, including improving the curriculum of secondary school by enhancing the contents of the Technology subjects. In this paper, we are concentrating on t…
View article: A Review Study on Cloud Computing Issues
A Review Study on Cloud Computing Issues Open
Cloud computing is the most promising current implementation of utility computing in the business world, because it provides some key features over classic utility computing, such as elasticity to allow clients dynamically scale-up and sca…
View article: Cyber Threat Intelligence – Issue and Challenges
Cyber Threat Intelligence – Issue and Challenges Open
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) …
View article: Organisation Readiness Factors Towards IPv6 Migration: Expert Review
Organisation Readiness Factors Towards IPv6 Migration: Expert Review Open
Background Internet Protocol (IP) is one of the Internet's addressing protocols that allow devices to link to each other. At present, the existing IPv4 protocol gradually been migrated to the new the protocol which is IPv6 to afford a lar…
View article: Recognizing API Features for Malware Detection Using Static Analysis
Recognizing API Features for Malware Detection Using Static Analysis Open
Android is one of the mobile operating system. Rapidly increasing of devices which used android as platform, make the Android is the best target to cybercriminal. Besides, Android offers many applications and these applications can get fro…