ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
The rise of obfuscated Android malware and impacts on detection methods
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source : PEERJ COMPUTER SCIENCE DOI : 10.7717/peerj-cs.907 |
2. |
A systematic review of routing attacks detection in wireless sensor networks
2022
Author(s) : Amirrudin Bin Kamsin,Nor Badrul Anuar Bin Juma'at Source : PEERJ COMPUTER SCIENCE DOI : 10.7717/peerj-cs.1135 |
3. |
A new deep model for family and non-family photo identification
2022
Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-021-11631-3 |
4. |
Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-022-13908-7 |
5. |
Self-Configured Framework for scalable link prediction in twitter: Towards autonomous spark framework
2022
Author(s) : Siti Hafizah Binti Ab Hamid,Nor Badrul Anuar Bin Juma'at,Zati Hakim Binti Azizul Hasan,Nur Nasuha Binti Mohd Daud Source : KNOWLEDGE-BASED SYSTEMS DOI : 10.1016/j.knosys.2022.109713 |
6. |
GRAIN: Granular multi-label encrypted traffic classification using classifier chain
2022
Source : COMPUTER NETWORKS DOI : 10.1016/j.comnet.2022.109084 |
7. |
ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source : ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING DOI : 10.1007/s13369-022-06949-5 |
8. |
Understanding COVID-19 Halal Vaccination Discourse on Facebook and Twitter Using Aspect-Based Sentiment Analysis and Text Emotion Analysis
2022
Author(s) : Nor Badrul Anuar Bin Juma'at,Ali Feizollah Source : INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH DOI : 10.3390/ijerph19106269 |
9. |
Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source : PLOS ONE DOI : 10.1371/journal.pone.0264683 |
10. |
GRANULAR NETWORK TRAFFIC CLASSIFICATION FOR STREAMING TRAFFIC USING INCREMENTAL LEARNING AND CLASSIFIER CHAIN
2022
Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE DOI : 10.22452/mjcs.vol35no3.5 |
11. |
A survey on video content rating: taxonomy, challenges and open issues
2021
Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-021-10838-8 |
12. |
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
2021
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2021.103009 |
13. |
TWO-STEP MODEL FOR EMOTION DETECTION ON TWITTER USERS: A COVID-19 CASE STUDY IN MALAYSIA
2021
Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE DOI : 10.22452/mjcs.vol34no4.4 |
14. |
Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic
2021
Source : COMPUTER NETWORKS DOI : 10.1016/j.comnet.2020.107617 |
15. |
Cyber parental control: A bibliometric study
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source : CHILDREN AND YOUTH SERVICES REVIEW DOI : 10.1016/j.childyouth.2020.105134 |
16. |
MapReduce scheduling algorithms: a review
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source : JOURNAL OF SUPERCOMPUTING |
17. |
Sentiment analyses of multilingual tweets on halal tourism
2020
Author(s) : Nor Aniza Binti Abdullah,Ainin Binti Sulaiman,Nor Badrul Anuar Bin Juma'at,Ali Feizollah Source : TOURISM MANAGEMENT PERSPECTIVES |
18. |
MapReduce scheduling algorithms: a review
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source : JOURNAL OF SUPERCOMPUTING DOI : 10.1007/s11227-018-2719-5 |
19. |
Sentiment analyses of multilingual tweets on halal tourism
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source : TOURISM MANAGEMENT PERSPECTIVES DOI : 10.1016/j.tmp.2020.100658 |
20. |
The rise of traffic classification in IoT networks: A survey
2020
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2020.102538 |
21. |
Examining what people tweet in relation to halal cosmetics-related topics
2020
Author(s) : Nor Aniza Binti Abdullah,Nor Badrul Anuar Bin Juma'at Source : COGENT ARTS & HUMANITIES DOI : 10.1080/23311983.2020.1724593 |
22. |
The rise of traffic classification in IoT networks: A survey
2020
Author(s) : Nor Badrul Anuar Bin Juma'at,Adeleh Asemi Zavareh Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS |
23. |
Blending Big Data Analytics: Review on Challenges and a Recent Study
2020
Source : IEEE ACCESS DOI : 10.1109/ACCESS.2019.2923270 |
24. |
Applications of link prediction in social networks: A review
2020
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2020.102716 |
25. |
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
2018
Source : Journal of Medical System DOI : 10.1007/s10916-018-0966-x |
26. |
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
2018
Source : IEEE Access DOI : 10.1109/access.2017.2789281 |
27. |
Multi-objective scheduling of MapReduce jobs in big data processing. Multimedia Tools and Applications
2018
Source : Multimedia Tools and Applications DOI : 10.1007/s11042-017-4685-y |
28. |
Performance Evaluation of Machine Learning Algorithms for Spam Profile Detection on Twitter Using WEKA and RapidMiner
2018
Source : Advanced Science Letters DOI : doi:10.1166/asl.2018.10683 |
29. |
Evaluation of Network Traffic Analysis Using Fuzzy C-Means Clustering Algorithm in Mobile Malware Detection
2018
Source : Advanced Science Letters DOI : 10.1166/asl.2018.10660 |
30. |
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
2017
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2017.06.001 |
31. |
Malicious accounts: Dark of the social networks
2017
Source : Journal of Network and Computer Applications |
32. |
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
2017
Source : Arabian Journal for Science and Engineering DOI : 10.1007/s13369-016-2400-3 |
33. |
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
2017
Source : Computers Security |
34. |
Blind source computer device identification from recorded VoIP calls for forensic investigation
2017
Source : Forensic Science International DOI : 10.1016/j.forsciint.2017.01.010 |
35. |
The Evolution of Android Malware and Android Analysis Techniques
2017
Source : ACM Computing Surveys DOI : 10.1145/3017427 |
36. |
A multi-objective software defined network traffic measurement
2017
Source : Measurement DOI : 10.1016/j.measurement.2016.10.0 |
37. |
Intrusion response systems: Foundations, design, and challenges
2016
Author(s) : Mohideen Salihu Farook Source : Journal of Network and Computer Applications |
38. |
The rise of "malware": Bibliometric analysis of malware study
2016
Source : Journal of Network and Computer Applications DOI : 10.1016/j.jnca.2016.08.022 |
39. |
MapReduce: Review and open challenges
2016
Source : Scientometrics DOI : 10.1007/s11192-016-1945-y |
40. |
Secure and dependable software defined networks
2016
Source : Journal of Network and Computer Applications |
41. |
High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices
2016
Source : Forensic Science International DOI : 10.1016/j.forsciint.2016.07.001 |
42. |
Service delivery models of cloud computing: security issues and open challenges
2016
Source : Security and Communication Networks DOI : 10.1002/sec.1585 |
43. |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
2016
Source : Pervasive and Mobile Computing |
44. |
Evaluation of machine learning classifiers for mobile malware detection
2016
Author(s) : Nor Badrul Anuar Bin Juma'at Source : Soft Computing |
45. |
The role of big data in smart city
2016
Source : International Journal of Information Management DOI : 10.1016/j.ijinfomgt.2016.05.002 |
46. |
An evolution of image source camera attribution approaches
2016
Author(s) : Hasniza Binti Zaman Huri,Izyan Binti A Wahab Source : Forensic Science International |
47. |
Big data: From beginning to future
2016
Source : International Journal of Information Management DOI : 10.1016/j.ijinfomgt.2016.07.009 |
48. |
The Feasibility Of Employing Ieee802.11p In Electronic-Based Congestion Pricing Zone: A Comparative Study With RFID
2016
Source : Malaysian Journal of Computer Science |
49. |
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations
2015
Author(s) : Mohd Fakhrul Zamani Bin Abdul Kadir Source : Computer Methods and Programs in Biomedicine |
50. |
The rise of Big Data on cloud computing: Review and open research issues
2015
Source : Information Systems |
51. |
A review on feature selection in mobile malware detection
2015
Author(s) : Dharmani Devi A/p Murugan Source : Digital Investigation |
52. |
Survey of secure multipath routing protocols for WSNs
2015
Source : Journal of Network and Computer Applications |
53. |
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
2015
Author(s) : Hany Mohamed Aly Ahmed Source : Journal of Network and Computer Applications |
54. |
Blind source mobile device identification based on recorded call
2014
Source : Engineering Applications of Artificial Intelligence |
55. |
Ant-based vehicle congestion avoidance system using vehicular networks
2014
Source : Engineering Applications of Artificial Intelligence |
56. |
Towards Dynamic Remote Data Auditing in Computational Clouds
2014
Author(s) : Md Mahfuzur Rahman Source : Scientific World Journal |
57. |
Enhancing DSR Protocol Performance in Mobile Ad Hoc
Network Using ACK Reply
2009
Author(s) : Nor Badrul Anuar Bin Juma'at |
58. |
Multi-Bandwidth Data Path Design for 5G Wireless
Mobile Internets
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source : WSEAS TRANSACTIONS ON INFORMATION SCIENCE & APPLICATIONS |
59. |
Implementing Lightweight Reservation Protocol for
Mobile
Network Using Hybrid Schema
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source : WSEAS Transactions on Computers |
60. |
A single Journal Study: Malaysian Journal of Computer Science
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source : Malaysian Journal of Computer Science |
61. |
Bibliometric studies on single journals: a review
2009
Source : Malaysian Journal of Library & information Science |
62. |
Usability and Performance of Secure Mobile
Messaging: M-PKI
2009
Author(s) : Nor Badrul Anuar Bin Juma'at |
63. |
GSM mobile SMS/MMS using public key infrastructure:
m-PKI
2008
Source : WSEAS Transaction on Computer |
64. |
Identifying False Alarm for Network Intrusion
Detection System Using Hybrid Data Mining and
Decision Tree
2008
Author(s) : Nor Badrul Anuar Bin Juma'at Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
65. |
Honeypot through Web (Honeyd@WEB): The Emerging of
Security Application Integration
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
66. |
A Markov Decision Process Model for Traffic
Prioritisation Provision
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
67. |
RedAlert: Approach for Firewall Policies Update
Mechanism
2004
Author(s) : Nor Badrul Anuar Bin Juma'at Source : Wseas Transaction on Computer |
68. |
Building Online Historical Resources
Collaboratively: Making the Most of a Digital
Library to Reinforce ICT Skills in Malaysia
2004
Author(s) : Nor Badrul Anuar Bin Juma'at Source : Journal of Information Development |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
Evaluation of IoT-based computational intelligence tools for DNA sequence analysis in bioinformatics
2019
Author(s) : Nor Badrul Anuar Bin Juma'at |
2. |
User profiling in anomaly detection of authorization logs
2019
Author(s) : Nor Badrul Anuar Bin Juma'at |
3. |
Challenges of Internet of Things and Big Data Integration
2018
Author(s) : Amirrudin Bin Kamsin,Nor Badrul Anuar Bin Juma'at |
4. |
Blind Source Computer Device Identification from Recorded Calls
2015
Author(s) : Nor Badrul Anuar Bin Juma'at |
5. |
Comparative evaluation of ensemble learning and supervised learning in android malwares using network-based analysis
2015
Author(s) : Nor Badrul Anuar Bin Juma'at |
6. |
Anomaly Detection Using Cooperative Fuzzy Logic Controller
2013
Author(s) : Nor Badrul Anuar Bin Juma'at |
7. |
A Response Strategy Model for Intrusion Response
Systems
2012
Author(s) : Nor Badrul Anuar Bin Juma'at |
8. |
Firewall
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
Computational intelligence tools and databases in bioinformatics
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
2. |
The Internet of Things adoption in healthcare applications.
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
3. |
Performance evaluation of virtual desktop operating systems in virtual desktop infrastructure
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
4. |
Pixel value differencing steganography techniques: Analysis and open challenge
2015
Author(s) : Rafidah Binti Md Noor,Nor Badrul Anuar Bin Juma'at |
5. |
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis
2014
Author(s) : Nor Badrul Anuar Bin Juma'at |
6. |
Bots and Botnets: An Overview of Characteristics,
Detection and Challenges
2012
Author(s) : Nor Badrul Anuar Bin Juma'at |
7. |
MoBots: A New Generation of Botnets on Mobile
Devices and Networks
Networks
2012
Author(s) : Rosli Bin Salleh,Nor Badrul Anuar Bin Juma'at |
8. |
A Risk Index Model for Security Incident
Prioritisation
2011
Author(s) : Nor Badrul Anuar Bin Juma'at |
9. |
An investigation and survey of response options for
Intrusion Response Systems (IRSs)
2010
Author(s) : Nor Badrul Anuar Bin Juma'at |
10. |
Mix-Bandwidth Data Path Design for 5G Real Wireless
World
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
11. |
Usability and Performance of Secure Mobile Messaging
using Public Key Infrastructure
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
12. |
SANAsms: Secure Short Messaging System for Secure
GSM Mobile Communication
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
13. |
Secure Mobile Messaging using Public Key
Infrastructure: m-PKI
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
14. |
Dynamic Network Traffic Per Host Controlling System Using Normal Prediction Interval
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
15. |
Reengineering Information Security Culture Formulation Through Management Perspective
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
16. |
Integrating Agent Technology In Teaching And Learning Of Computer Security Course In Tertiary Level
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
17. |
Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
18. |
An FPGA Implementation Of Stream Cipher Encryption Based On Statistical Approach
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
19. |
Integrated Approach for the Multimedia Retrieval and Database Management of a Collaborative Digital Library
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
20. |
Dynamic and Manageable Honeypot: Honeyd@WEB
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
21. |
RedAlert: Approach for Firewall Policies Update Mechanism
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
22. |
Open-Source Approach in Developing a Collaborative Digital Library for School Projects
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
23. |
Malaysian usage of Open Source in Local Residential College Network Management
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
24. |
A Markov Decision Process Model for Traffic Prioritisation Provision
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
25. |
Inculcating ICT Skills through a Collabrative Digital Library Initiative for Education Use
2003
Author(s) : Nor Badrul Anuar Bin Juma'at |
TECHNICAL REPORT
NO | DETAILS OF TECHNICAL REPORT |
---|---|
1. |
Digital Rights Management for Cloud Based Storage Providers
2018
|
2. |
Anomaly Detection in Policy Authorisation Activity Log
2017
|
OTHERS
NO | DETAILS OF OTHERS |
---|---|
1. |
Visibility and Malaysian Scholarly Journals
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
2. |
Integrating Certified Information Systems Security Professional (CISSP) Domains Into Computer Security Course: A FCSIT\'S Experience
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
3. |
Integrated Security Framework For Mobile Learning Application In Wireless Classrooms
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
4. |
Wireless Local Area Network Security using Open Source Technologies: Wireless Authentication Management System (WAMS)
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
5. |
Tekanan Di Kalangan Pelajar Institusi Pendidikan Tinggi : Satu Tinjauan.
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Specialization Inforstructure- Programme
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - HNE (Humanities & Ethics)) |
|
end |
Diffusion Of Innovation: Electronic Journals Publishing
Researcher(s) : -Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - HNE (Humanities & Ethics)) |
|
end |
Intelligent Event Correlation for End-to-End Internet Performance Monitoring
Researcher(s) : Johari Abdullah,Adib Monzer Habbal
(Program Rakan Penyelidikan UM) |
|
end |
User Authentication using Hybrid Graphical Images
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Dr Mohd Zalisham Bin Jali
(Geran Penyelidikan Universiti Malaya (UMRG) - AET (Innovative Technology (ITRC))) |
|
end |
Mobile Botnet
Researcher(s) : Associate Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Associate Prof. Dr. Rosli Bin Salleh
(Geran Penyelidikan Universiti Malaya (UMRG) - ICT) |
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
An Investigation Of Resource Allocation For Multicell Device-to-device Communications Using Machine Learning Method And Big Data Analytics
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Associate Prof. Ir. Dr. Jeevan A/l Kanesan,Associate Prof. Ir. Dr. Chuah Joon Huang,Tham Mau Luen
(Fundamental Research Grant Scheme (FRGS)) |
|
on going |
Knowledge-based Tool For Um Nature Inspired Library
Researcher(s) : Associate Prof. Dr. Norisma Binti Idris,Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Associate Prof. Dr. Rozana Binti Othman,Associate Prof. Dr. Najihah Binti Mohd Hashim,Dr. Hoo Wai Lam,Dr. Ahmad Fadli Saad
(Others MOHE - Top 100 (IIRG)-FNW) |
|
on going |
Small Medium Enterprise's Internet Of Things (iot) Threats Landscape, Talent Development And Strategic Framework
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Associate Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Others MOHE) |
|
on going |
Smart And Security Enhanced Transportation Ecosystem For A Future Sustainable Smart City
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Associate Prof. Dr. Mohd Yamani Idna Bin Idris,Associate Prof. Dr. Norjihan Binti Abdul Ghani,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Associate Prof. Dr. Fariza Hanum Binti Md Nasaruddin,Associate Prof. Dr. Maizatul Akmar Binti Ismail
(Partnership Grant) |
|
end |
Scalable And Distributed Framework For Malicious Profile Detection On Twitter
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Mohd Zalisham Jali
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
Content Classification for Short Video Rating Using Machine Learning
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(RU Geran - Fakulti Program) |
|
end |
Anomaly Detection in Policy Authorization Activity Logs
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(Partnership Grant) |
|
end |
Drm For Cloud Based Storage Providers
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(Private Funding) |
|
end |
Diffusion Of Innovation: Electronic Journals Publishing
Notice: Undefined index: name in /var/www/html/umexpertv3/included_view/vw_collaborator_research.php on line 159 Researcher(s) : ,Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - HNE (Humanities & Ethics)) |
|
end |
User Authentication using Hybrid Graphical Images
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Dr Mohd Zalisham Bin Jali
(Geran Penyelidikan Universiti Malaya (UMRG) - AET (Innovative Technology (ITRC))) |
|
end |