[HTML][HTML] Evaluation of Boruta algorithm in DDoS detection

N Farhana, A Firdaus, MF Darmawan… - Egyptian Informatics …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) is a type of attack that leverages many
compromised systems or computers, as well as multiple Internet connections, to flood …

Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)

NK Kamarudin, A Firdaus, A Zabidi… - Journal of Intelligent …, 2023 - content.iospress.com
Many smart mobile devices, including smartphones, smart televisions, smart watches, and
smart vacuums, have been powered by Android devices. Therefore, mobile devices have …

The Relevance of Bibliometric Analysis to Discover the Area’ s Research Efforts: Root Exploit Evolution

CAC Yahaya, A Firdaus, F Ernawan… - JOIV: International Journal …, 2022 - joiv.org
Malware steals, encrypts, and damages data of the targeted machines for private, money, or
fame purposes. The types of malware are root exploit, cryptojacking, Trojan, worms, viruses …

The Rise of Deep Learning in Cyber Security: Bibliometric Analysis of Deep Learning and Malware

NK Kamarudin, A Firdaus, MZ Osman, A Alanda… - … : International Journal on …, 2024 - joiv.org
Deep learning is a machine learning technology that allows computational models to learn
via experience, mimicking human cognitive processes. This method is critical in the …

Machine Learning Classification Algorithms for Accurate Breast Cancer Diagnosis

MS Alzboon, S Qawasmeh, M Alqaraleh… - … on Emerging Smart …, 2023 - ieeexplore.ieee.org
The introduction of algorithms based on machine learning (ML) has revolutionized computer
science by allowing machines to learn without explicit programming. These algorithms …

Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey

LM Kadhum, A Firdaus, SI Hisham, W Mushtaq… - … : International Journal on …, 2024 - joiv.org
Various types of malwares are capable of bringing harm to users. The list of types are root
exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking …

[PDF][PDF] Egyptian Informatics Journal

N Farhana, A Firdaus, MF Darmawan, MF Ab Razak - 2023 - researchgate.net
abstract Distributed Denial of Service (DDoS) is a type of attack that leverages many
compromised systems or computers, as well as multiple Internet connections, to flood …