关注
Mohd Fadzli Marhusin
Mohd Fadzli Marhusin
, Information Systems and Security Lab (ISSL), Universiti Sains Islam Malaysia
在 usim.edu.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
Real-time framework for image dehazing based on linear transmission and constant-time airlight estimation
A Alajarmeh, RA Salam, K Abdulrahim, MF Marhusin, AA Zaidan, ...
Information Sciences 436, 108-130, 2018
292018
Machine learning-based technique to detect SQL injection attack
MA Azman, MF Marhusin, R Sulaiman, U Sains, MF Marhusin, U Sains
Journal of Computer Science 17 (3), 296-303, 2021
282021
An overview of recent advances in intrusion detection
M Marhusin, D Cornforth, H Larkin
Deakin University, 2008
252008
An evaluation of api calls hooking performance
MF Marhusin, H Larkin, C Lokan, D Cornforth
2008 International Conference on Computational Intelligence and Security 1 …, 2008
162008
Signature-Based Malware Detection Using Sequences of N-grams
AM Abiola, MF Marhusin
International Journal of Engineering & Technology 7 (4.15), 120-125, 2018
152018
Real-time video enhancement for various weather conditions using dark channel and fuzzy logic
A Alajarmeh, RA Salam, MF Marhusin, K Abdulrahim
2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014
112014
Detecting worm attacks in cloud computing environment: Proof of concept
HM Kanaker, MM Saudi, MF Marhusin
2014 IEEE 5th Control and System Graduate Research Colloquium, 253-256, 2014
102014
Markov-Modulated Bernoulli-Based Performance Analysis for Gentle BLUE and BLUE Algorithms under Bursty and Correlated Traffic.
A Alsaaidah, M Zalisham, MFM Salleh, H Abdel-jaber
J. Comput. Sci. 12 (6), 289-299, 2016
92016
Instrumenting API Hooking for a Realtime Dynamic Analysis
SM AF, MF Marhusin, R Sulaiman
2019 International Conference on Cybersecurity (ICoCSec), 49-52, 2019
82019
Gentle-BLUE: A New Method for Active Queue Management
A Alsaaidah, M Zalisham, MF Marhusin, H Abdel-Jaber
Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd …, 2014
82014
Malicious code detection architecture inspired by human immune system
MF Marhusin, D Cornforth, H Larkin
2008 Ninth ACIS International Conference on Software Engineering, Artificial …, 2008
82008
A framework for evaluating QinU based on ISO/IEC 25010 and 25012 standards
N Nwasra, N Basir, MF Marhusin
2015 9th Malaysian Software Engineering Conference (MySEC), 70-75, 2015
72015
A SYSTEMATIC ANALYSIS ON WORM DETECTION IN CLOUD BASED SYSTEMS
HM Kanaker, MM Saudi, MF Marhusin
computing 2, 17, 2014
7*2014
Markov-modulated Bernoulli-based Performance Analysis for BLUE Algorithm under Bursty and Correlated Traffics
AM Saaidah, MZ Jali, MF Marhusin, H Abdel-jaber
International Conference on Computer, Communications, and Control Technology …, 2014
72014
SQL injection detection using machine learning with different TF-IDF feature extraction approaches
MA Oudah, MF Marhusin, A Narzullaev
International Conference on Information Systems and Intelligent Applications …, 2022
62022
Improving the Effectiveness of Behaviour-based Malware Detection
MF Marhusin
The University of New South Wales, 2012
62012
A pox controller module to collect web traffic statistics in SDN environment
WH Muragaa, K Seman, MF Marhusin
International Journal of Computer and Information Engineering 10 (12), 2105-2110, 2017
52017
Evaluation of malaysian universities websites based on quality in use evaluation model
N Nwasra, N Basir, MF Marhusin
Int. J. Adv. Sci. Eng. Inf. Technol 8 (4-2), 1417-1422, 2018
42018
A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic
WH Muragaa, K Seman, MF Marhusin
International Journal of Computer and Systems Engineering 11 (12), 1305-1308, 2017
42017
A Preemptive Behaviour-based Malware Detection through Analysis of API Calls Sequence Inspired by Human Immune System
F Marhusin, CJ Lokan
International Journal of Engineering & Technology 7 (4.15), 113-119, 2018
32018
系统目前无法执行此操作,请稍后再试。
文章 1–20