default search action
Mohd Aizaini Maarof
Person information
- affiliation: University of Technology Malaysia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j23]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Abdulmohsen Almalawi, Abdullah Marish Ali, Tawfik Al Hadhrami:
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection. Future Gener. Comput. Syst. 115: 641-658 (2021) - [j22]Huda Osman, Maheyzah Md Siraj, Fuad A. Ghaleb, Faisal Saeed, Eman H. Alkhammash, Mohd Aizaini Maarof:
Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification. Wirel. Commun. Mob. Comput. 2021: 7154705:1-7154705:13 (2021) - [c47]Noor Azeera Abdul Aziz, Mohd Aizaini Maarof, Anazida Zainal:
Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature Selection. CRC 2021: 1-6 - [c46]Adam Khalid, Anazida Zainal, Mohd Aizaini Maarof, Fuad A. Ghaleb:
Advanced Persistent Threat Detection: A Survey. CRC 2021: 1-6 - [c45]Mohammad N. Olaimat, Mohd Aizaini Maarof, Bander Ali Saleh Al-rimy:
Ransomware Anti-Analysis and Evasion Techniques: A Survey and Research Directions. CRC 2021: 1-6 - [c44]Huda Osman, Maheyzah Md Siraj, Mohd Aizaini Maarof:
HAC: Model for Privacy-Preserving Outsourced Data Over Cloud. CRC 2021: 1-4 - [c43]Umara Urooj, Mohd. Aizani Bin Maarof, Bander Ali Saleh Al-rimy:
A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model. CRC 2021: 1-6 - 2020
- [j21]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab, Fawaz Alsolami, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Tawfik Al Hadhrami, Abdullah Marish Ali:
A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction. IEEE Access 8: 140586-140598 (2020) - [j20]Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Abdulmohsen Almalawi, Abdullah Marish Ali, Anazida Binti Zainal, Murad A. Rassam, Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof:
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach. IEEE Access 8: 217744-217761 (2020)
2010 – 2019
- 2019
- [j19]Fuad A. Ghaleb, Mohd Aizaini Maarof, Anazida Binti Zainal, Bander Ali Saleh Al-rimy, Faisal Saeed, Tawfik Al Hadhrami:
Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network. IEEE Access 7: 159119-159140 (2019) - [j18]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Gener. Comput. Syst. 101: 476-491 (2019) - [j17]Mahdi Maktab Dar Oghaz, Mohd Aizaini Maarof, Mohd. Foad Rohani, Anazida Zainal, Syed Zainudeen Mohd Shaid:
An optimized skin texture model using gray-level co-occurrence matrix. Neural Comput. Appl. 31(6): 1835-1853 (2019) - [j16]Fuad A. Ghaleb, Mohd Aizaini Maarof, Anazida Binti Zainal, Bander Ali Saleh Al-rimy, Abdullah Alsaeedi, Wadii Boulila:
Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network. Remote. Sens. 11(23): 2852 (2019) - [j15]Fuad A. Ghaleb, Mohd Aizaini Maarof, Anazida Zainal, Murad A. Rassam, Faisal Saeed, Mohammed Alsaedi:
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between the cooperative awareness messages. Veh. Commun. 20 (2019) - [c42]Huda Osman, Mohd Aizaini Maarof, Maheyzah Md Siraj:
Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing. IRICT 2019: 748-758 - [c41]Yoong Jien Chiam, Mohd Aizaini Maarof, Mohamad Nizam Kassim, Anazida Zainal:
Malware Behavior Profiling from Unstructured Data. SoCPaR 2019: 130-140 - [c40]Eric Khoo, Anazida Zainal, Nurfadilah Ariffin, Mohd Nizam Kassim, Mohd Aizaini Maarof, Majid Bakhtiari:
Fraudulent e-Commerce Website Detection Model Using HTML, Text and Image Features. SoCPaR 2019: 177-186 - 2018
- [j14]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Comput. Secur. 74: 144-166 (2018) - [j13]Murad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal:
A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier. Int. J. Sens. Networks 27(3): 200-214 (2018) - [i1]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection. CoRR abs/1807.09574 (2018) - 2017
- [j12]Behrang Barekatain, Dariush Khezrimotlagh, Mohd Aizaini Maarof, Alfonso Ariza-Quintana, Alicia Triviño-Cabrera:
GAZELLE: An Enhanced Random Network Coding Based Framework for Efficient P2P Live Video Streaming Over Hybrid WMNs. Wirel. Pers. Commun. 95(3): 2485-2505 (2017) - [c39]Mahdi Maktabar, Anazida Zainal, Mohd Aizaini Maarof, Mohamad Nizam Kassim:
Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques. HIS 2017: 294-304 - 2016
- [j11]Aisha Abdallah, Mohd Aizaini Maarof, Anazida Zainal:
Fraud detection system: A survey. J. Netw. Comput. Appl. 68: 90-113 (2016) - [c38]Mohamad Nizam Kassim, Mohd Aizaini Maarof, Anazida Zainal, Amirudin Abdul Wahab:
Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media. DMBD 2016: 391-400 - [c37]Mohamad Nizam Kassim, Mohd Aizaini Maarof, Anazida Zainal, Amirudin Abdul Wahab:
Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts. PKAW 2016: 71-85 - 2015
- [j10]Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
Principal component analysis-based data reduction model for wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 85-101 (2015) - [j9]Behrang Barekatain, Dariush Khezrimotlagh, Mohd Aizaini Maarof, Hamid Reza Ghaeini, Alfonso Ariza-Quintana, Alicia Triviño-Cabrera:
Efficient P2P Live Video Streaming Over Hybrid WMNs Using Random Network Coding. Wirel. Pers. Commun. 80(4): 1761-1789 (2015) - 2014
- [j8]Ammar Ahmed E. Elhadi, Mohd Aizaini Maarof, Bazara I. A. Barry, Hamza Hentabli:
Enhancing the detection of metamorphic malware using call graphs. Comput. Secur. 46: 62-78 (2014) - [j7]Murad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal:
Adaptive and online data anomaly detection for wireless sensor systems. Knowl. Based Syst. 60: 44-57 (2014) - [c36]Mohd. Zamri Osman, Mohd Aizaini Maarof, Mohd. Foad Rohani:
Improved skin detection based on dynamic threshold using multi-colour space. ISBAST 2014: 29-34 - [c35]Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof:
Malware behavior image for malware variant identification. ISBAST 2014: 238-243 - [c34]Mohamad Nizam Kassim, Mohd Aizaini Maarof, Anazida Zainal:
Enhanced Rules Application Order Approach to Stem Reduplication Words in Malay Texts. SCDM 2014: 657-665 - [c33]Nurfazrina Mohd Zamry, Mohd Aizaini Maarof, Anazida Zainal:
Islamic Web Content Filtering and Categorization on Deviant Teaching. SCDM 2014: 667-678 - 2013
- [j6]Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications. Appl. Soft Comput. 13(4): 1978-1996 (2013) - [j5]Mohammad Akbarpour Sekeh, Mohd Aizaini Maarof, Mohd. Foad Rohani, Babak Mahdian:
Efficient image duplicated region detection model using sequential block clustering. Digit. Investig. 10(1): 73-84 (2013) - [j4]Behrang Barekatain, Mohd Aizaini Maarof, Alfonso Ariza-Quintana, Alicia Triviño-Cabrera:
GREENIE: a novel hybrid routing protocol for efficient video streaming over wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013: 168 (2013) - [j3]Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues. Sensors 13(8): 10087-10122 (2013) - [c32]Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:
Dynamic Innate Immune System Model for Malware Detection. ICITCS 2013: 1-4 - 2012
- [c31]Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Ajith Abraham:
Design of Adaptive IDS with Regulated Retraining Approach. AMLTA 2012: 590-600 - [c30]Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
One-Class Principal Component Classifier for anomaly detection in wireless sensor network. CASoN 2012: 271-276 - [c29]Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:
A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory. ICITCS 2012: 29-34 - [c28]Muhammad Najmi Ahmad Zabidi, Mohd Aizaini Maarof, Anazida Zainal:
Malware Analysis with Multiple Features. UKSim 2012: 231-235 - 2011
- [j2]Ali Selamat, Zhi-Sam Lee, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Improved Web Page Identification Method Using Neural Networks. Int. J. Comput. Intell. Appl. 10(1): 87-114 (2011) - [c27]Muhammad Najmi Ahmad Zabidi, Mohd Aizaini Maarof, Anazida Zainal:
Ensemble based categorization and adaptive model for malware detection. IAS 2011: 80-85 - [c26]Murad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal:
A novel intrusion detection framework for Wireless Sensor Networks. IAS 2011: 350-353 - [c25]Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:
Malware Detection Techniques Using Artificial Immune System. ICITCS 2011: 575-587 - [c24]Mohammadmehdi Bozorgi, Mohd Aizaini Maarof, Zhi-Sam Lee:
Multi-classifier Scheme with Low-Level Visual Feature for Adult Image Classification. ICSECS (3) 2011: 793-802 - [c23]Mohammad Akbarpour Sekeh, Mohd Aizaini Maarof, Mohd. Foad Rohani, Malihe Motiei:
Spiral unique sequence: A new rotation invariant feature for small-size image block matching. ICSIPA 2011: 535-540
2000 – 2009
- 2009
- [c22]Rashidah Kadir, Mohd Aizaini Maarof:
A Comparative Statistical Analysis of Pseudorandom Bit Sequences. IAS 2009: 91-94 - [c21]Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof:
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls. IAS 2009: 154-157 - [c20]Maheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim:
Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation. IAS 2009: 679-682 - [c19]Anazida Zainal, Den Fairol Samaon, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection. IAS 2009: 683-686 - [c18]Ali Selamat, Mohd Aizaini Maarof, Tey Yi Chin:
Fuzzy Mamdani Inference System Skin Detection. HIS (3) 2009: 57-62 - [c17]Abdolreza Rasouli, Mohd Aizaini Maarof, Mahboubeh Shamsi:
A New Clustering Method Based on Weighted Kernel K-Means for Non-linear Data. SoCPaR 2009: 19-24 - 2008
- [c16]Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin, Ajith Abraham:
Ensemble of One-Class Classifiers for Network Intrusion Detection System. IAS 2008: 180-185 - [c15]Mohd. Foad Rohani, Mohd Aizaini Maarof, Ali Selamat, Houssain Kettani:
LoSS Detection Approach Based on ESOSS and ASOSS Models. IAS 2008: 192-197 - [c14]Shukor Abd Razak, Normalia Samian, Mohd Aizaini Maarof:
A Friend Mechanism for Mobile Ad Hoc Networks. IAS 2008: 243-248 - [c13]Normalia Samian, Mohd Aizaini Maarof, Shukor Abd Razak:
Towards Identifying Features of Trust in Mobile Ad Hoc Network. Asia International Conference on Modelling and Simulation 2008: 271-276 - [c12]Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Data Reduction and Ensemble Classifiers in Intrusion Detection. Asia International Conference on Modelling and Simulation 2008: 591-596 - [c11]Anjum Iqbal, Mohd Aizaini Maarof, Safaai Deris:
The Concept of Bio-fitness in Bio-inspired Computational Metaphor Abstraction. IMTIC 2008: 215-226 - [c10]Zhi-Sam Lee, Mohd Aizaini Maarof, Ali Selamat, Siti Mariyam Hj. Shamsuddin:
Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content Classification. ISDA (2) 2008: 145-150 - 2007
- [c9]Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection. ICCSA (1) 2007: 512-524 - 2005
- [c8]Anjum Iqbal, Mohd Aizaini Maarof:
Polymorphism and Danger Susceptibility of System Call DASTONs. ICARIS 2005: 366-374 - [c7]Subariah Ibrahim, Mohd Aizaini Maarof:
Diffusion Analysis of a Scalable Fiestel Network. WEC (5) 2005: 98-101 - 2004
- [c6]Mohd Nizam Omar, Mohd Aizaini Maarof, Anazida Zainal:
Solving Time Gap Problems through the Optimization of Detecting Stepping Stone Algorithm. CIT 2004: 391-396 - [c5]Anjum Iqbal, Mohd Aizaini Maarof:
Towards Danger Theory Based Artificial APC Model: Novel Metaphor for Danger Susceptible Data Codons. ICARIS 2004: 161-174 - 2003
- [j1]Kanagaraj Krishna, Mohd. Aizani Bin Maarof:
A Hybrid Trust Management Model for MAS Based Trading Society. Int. Arab J. Inf. Technol. 1(0) (2003) - [c4]Mohd Nizam Omar, Mohd Aizaini Maarof, Subariah Ibrahim:
Towards Solving Time Gap Problems through the Optimization of Packet Capture Technique. CITA 2003: 76-81 - [c3]Cahyo Crysdian, Abdul Hanan Abdullah, Mohd Aizaini Maarof:
Enforcing Multilevel Security Policies for Network Firewall. CITA 2003: 244-246 - [c2]Aliza Yusny Daud, Mohd Aizaini Maarof, Norliza Katuk, Anazida Zainal:
Attack on Intrusion Detection System Host: Simulation and Analysis. CITA 2003: 256-260 - 2000
- [b1]Mohd. Aizani Bin Maarof:
Integrating security services into computer supported cooperative work. Aston University, Birmingham, UK, 2000
1990 – 1999
- 1997
- [c1]Bernard S. Doherty, Mohd Aizaini Maarof:
Integrating Security Services Into Collaborative Systems. WebNet 1997
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint