Profiling and mitigating brute force attack in home wireless LAN MYM Hafiz, FHM Ali 2014 International Conference on Computational Science and Technology (ICCST …, 2014 | 15 | 2014 |
Visualizing realistic benchmarked IDS dataset: CIRA-CIC-DoHBrw-2020 MHM Yusof, AA Almohammedi, V Shepelev, O Ahmed IEEE Access 10, 94624-94642, 2022 | 12 | 2022 |
Precision education reviews: a case study on predicting student’s performance using feed forward neural network MHM Yusof, I Abd Khalid 2021 international conference of technology, science and administration …, 2021 | 12 | 2021 |
Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure MHM Yusof, AM Zin, NSM Satar CMC-COMPUTERS MATERIALS & CONTINUA 72 (2), 2445-2466, 2022 | 11 | 2022 |
Embedded feature selection method for a network-level behavioural analysis detection model MHM Yusof, MR Mokhtar, AM Zain, C Maple International Journal of Advanced Computer Science and Applications 9 (12), 2018 | 11 | 2018 |
A review of predictive analytic applications of Bayesian network MHM Yusof, MR Mokhtar International Journal on Advanced Science, Engineering and Information …, 2016 | 11 | 2016 |
Adaptive IDS Concept with PRBS Multi Inputs Multi Outputs (MIMO) and Matched Filtering Algorithm SR bin Tuan Muda, MHM Yusof, S Shamsuddin 2023 4th International Conference on Artificial Intelligence and Data …, 2023 | 8 | 2023 |
Network-level behavioral malware analysis model based on Bayesian network MHM Yusof, AM Zin 2021 International Conference on Computer & Information Sciences (ICCOINS …, 2021 | 5 | 2021 |
Realtime cyber threat dataset generator over PRBS block circuit SR bin Tuan Muda, MHM Yusof, R Ahmad 2022 3rd International Conference on Artificial Intelligence and Data …, 2022 | 3 | 2022 |
Data communication and networking: Challenges and solutions N Zaidi, MHM Yusof Authorea Preprints, 2023 | 2 | 2023 |
An Intelligent Movies Recommendation System Based Facial Attributes Using Machine Learning M Balfaqih, A Altwaim, AA Almohammedi, MHM Yusof 2023 3rd International Conference on Emerging Smart Technologies and …, 2023 | 2 | 2023 |
Architecture based on tor network for securing the communication of northbound interface in sdn O Ahmed, MH MohdYusof Compusoft 9 (7), 3755-3761, 2020 | 2 | 2020 |
New Optimized Adaptive Time Series IDS Classifier Algorithm: Beyond Deep Learning SRBT Muda, MHM Yusof, KM Alfawaz, M Balfaqih, A Alzahrani IEEE Access 11, 129882-129904, 2023 | 1 | 2023 |
Challenges in Data Communication and Networking in VANETs AM SUPIAN, MHM Yusof Authorea Preprints, 2023 | 1 | 2023 |
Resistors Over Digital Analog Converter on PRBS Threat Generator with PLL Synchronizer: Comparison Between R2R & Weighted AA Almohammedi, MHM Yusof, SR bin Tuan Muda, V Shepelev, ... 2023 3rd International Conference on Emerging Smart Technologies and …, 2023 | | 2023 |
High Gain and Efficiency Triple U-shaped Slots Microstrip Patch Antenna for 5G Applications AA Almohammedi, A Raad, S Darshi, V Shepelev, MHM Yusof, M Balfaqih 2023 3rd International Conference on Computing and Information Technology …, 2023 | | 2023 |
Generating Network Intrusion Image through IGTD Algorithm for CNN Classification MNAA Nazarri, MHM Yusof, AA Almohammedi 2023 3rd International Conference on Computing and Information Technology …, 2023 | | 2023 |
A Review on Taxonomy of Malware Analysis Studies MYM Hafiz, R Mokhtar Advanced Science Letters 24 (2), 938-942, 2018 | | 2018 |
Wireless room control MHB Mohd Yusof Universiti Teknologi Petronas, 2004 | | 2004 |
Wireless Room Control MY Mohammad Hafiz http://utpedia.utp.edu.my/7891/, 2004 | | 2004 |