Real-time framework for image dehazing based on linear transmission and constant-time airlight estimation A Alajarmeh, RA Salam, K Abdulrahim, MF Marhusin, AA Zaidan, ... Information Sciences 436, 108-130, 2018 | 29 | 2018 |
Machine learning-based technique to detect SQL injection attack MA Azman, MF Marhusin, R Sulaiman, U Sains, MF Marhusin, U Sains Journal of Computer Science 17 (3), 296-303, 2021 | 28 | 2021 |
An overview of recent advances in intrusion detection M Marhusin, D Cornforth, H Larkin Deakin University, 2008 | 25 | 2008 |
An evaluation of api calls hooking performance MF Marhusin, H Larkin, C Lokan, D Cornforth 2008 International Conference on Computational Intelligence and Security 1 …, 2008 | 16 | 2008 |
Signature-Based Malware Detection Using Sequences of N-grams AM Abiola, MF Marhusin International Journal of Engineering & Technology 7 (4.15), 120-125, 2018 | 15 | 2018 |
Real-time video enhancement for various weather conditions using dark channel and fuzzy logic A Alajarmeh, RA Salam, MF Marhusin, K Abdulrahim 2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014 | 11 | 2014 |
Detecting worm attacks in cloud computing environment: Proof of concept HM Kanaker, MM Saudi, MF Marhusin 2014 IEEE 5th Control and System Graduate Research Colloquium, 253-256, 2014 | 10 | 2014 |
Markov-Modulated Bernoulli-Based Performance Analysis for Gentle BLUE and BLUE Algorithms under Bursty and Correlated Traffic. A Alsaaidah, M Zalisham, MFM Salleh, H Abdel-jaber J. Comput. Sci. 12 (6), 289-299, 2016 | 9 | 2016 |
Instrumenting API Hooking for a Realtime Dynamic Analysis SM AF, MF Marhusin, R Sulaiman 2019 International Conference on Cybersecurity (ICoCSec), 49-52, 2019 | 8 | 2019 |
Gentle-BLUE: A New Method for Active Queue Management A Alsaaidah, M Zalisham, MF Marhusin, H Abdel-Jaber Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd …, 2014 | 8 | 2014 |
Malicious code detection architecture inspired by human immune system MF Marhusin, D Cornforth, H Larkin 2008 Ninth ACIS International Conference on Software Engineering, Artificial …, 2008 | 8 | 2008 |
A framework for evaluating QinU based on ISO/IEC 25010 and 25012 standards N Nwasra, N Basir, MF Marhusin 2015 9th Malaysian Software Engineering Conference (MySEC), 70-75, 2015 | 7 | 2015 |
A SYSTEMATIC ANALYSIS ON WORM DETECTION IN CLOUD BASED SYSTEMS HM Kanaker, MM Saudi, MF Marhusin computing 2, 17, 2014 | 7* | 2014 |
Markov-modulated Bernoulli-based Performance Analysis for BLUE Algorithm under Bursty and Correlated Traffics AM Saaidah, MZ Jali, MF Marhusin, H Abdel-jaber International Conference on Computer, Communications, and Control Technology …, 2014 | 7 | 2014 |
SQL injection detection using machine learning with different TF-IDF feature extraction approaches MA Oudah, MF Marhusin, A Narzullaev International Conference on Information Systems and Intelligent Applications …, 2022 | 6 | 2022 |
Improving the Effectiveness of Behaviour-based Malware Detection MF Marhusin The University of New South Wales, 2012 | 6 | 2012 |
A pox controller module to collect web traffic statistics in SDN environment WH Muragaa, K Seman, MF Marhusin International Journal of Computer and Information Engineering 10 (12), 2105-2110, 2017 | 5 | 2017 |
Evaluation of malaysian universities websites based on quality in use evaluation model N Nwasra, N Basir, MF Marhusin Int. J. Adv. Sci. Eng. Inf. Technol 8 (4-2), 1417-1422, 2018 | 4 | 2018 |
A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic WH Muragaa, K Seman, MF Marhusin International Journal of Computer and Systems Engineering 11 (12), 1305-1308, 2017 | 4 | 2017 |
A Preemptive Behaviour-based Malware Detection through Analysis of API Calls Sequence Inspired by Human Immune System F Marhusin, CJ Lokan International Journal of Engineering & Technology 7 (4.15), 113-119, 2018 | 3 | 2018 |