ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Web content topic modeling using LDA and HTML tags
2023
Author(s) : Nor Badrul Anuar Bin Juma'at Source : PEERJ COMPUTER SCIENCE DOI : 10.7717/peerj-cs.1459 |
2. |
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
2023
Author(s) : Amirrudin Bin Kamsin,Nor Badrul Anuar Bin Juma'at Source : PEERJ COMPUTER SCIENCE DOI : 10.7717/peerj-cs.1309 |
3. |
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions
2023
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2023.103582 |
4. |
A bibliometric and content analysis of technological advancement applications in agricultural e-commerce
2023
Source : ELECTRONIC COMMERCE RESEARCH DOI : 10.1007/s10660-023-09670-z |
5. |
Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-022-13908-7 |
6. |
A new deep model for family and non-family photo identification
2022
Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-021-11631-3 |
7. |
Self-Configured Framework for scalable link prediction in twitter: Towards autonomous spark framework
2022
Author(s) : Siti Hafizah Binti Ab Hamid,Nor Badrul Anuar Bin Juma'at,Zati Hakim Binti Azizul Hasan,Nur Nasuha Binti Mohd Daud Source : KNOWLEDGE-BASED SYSTEMS DOI : 10.1016/j.knosys.2022.109713 |
8. |
The rise of obfuscated Android malware and impacts on detection methods
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source : PEERJ COMPUTER SCIENCE DOI : 10.7717/peerj-cs.907 |
9. |
Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source : PLOS ONE DOI : 10.1371/journal.pone.0264683 |
10. |
GRAIN: Granular multi-label encrypted traffic classification using classifier chain
2022
Source : COMPUTER NETWORKS DOI : 10.1016/j.comnet.2022.109084 |
11. |
GRANULAR NETWORK TRAFFIC CLASSIFICATION FOR STREAMING TRAFFIC USING INCREMENTAL LEARNING AND CLASSIFIER CHAIN
2022
Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE DOI : 10.22452/mjcs.vol35no3.5 |
12. |
A systematic review of routing attacks detection in wireless sensor networks
2022
Author(s) : Amirrudin Bin Kamsin,Nor Badrul Anuar Bin Juma'at Source : PEERJ COMPUTER SCIENCE DOI : 10.7717/peerj-cs.1135 |
13. |
Understanding COVID-19 Halal Vaccination Discourse on Facebook and Twitter Using Aspect-Based Sentiment Analysis and Text Emotion Analysis
2022
Author(s) : Nor Badrul Anuar Bin Juma'at,Ali Feizollah Source : INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH DOI : 10.3390/ijerph19106269 |
14. |
ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source : ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING DOI : 10.1007/s13369-022-06949-5 |
15. |
TWO-STEP MODEL FOR EMOTION DETECTION ON TWITTER USERS: A COVID-19 CASE STUDY IN MALAYSIA
2021
Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE DOI : 10.22452/mjcs.vol34no4.4 |
16. |
Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic
2021
Source : COMPUTER NETWORKS DOI : 10.1016/j.comnet.2020.107617 |
17. |
A survey on video content rating: taxonomy, challenges and open issues
2021
Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-021-10838-8 |
18. |
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
2021
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2021.103009 |
19. |
MapReduce scheduling algorithms: a review
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source : JOURNAL OF SUPERCOMPUTING DOI : 10.1007/s11227-018-2719-5 |
20. |
Blending Big Data Analytics: Review on Challenges and a Recent Study
2020
Source : IEEE ACCESS DOI : 10.1109/ACCESS.2019.2923270 |
21. |
Cyber parental control: A bibliometric study
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source : CHILDREN AND YOUTH SERVICES REVIEW DOI : 10.1016/j.childyouth.2020.105134 |
22. |
MapReduce scheduling algorithms: a review
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source : JOURNAL OF SUPERCOMPUTING |
23. |
Sentiment analyses of multilingual tweets on halal tourism
2020
Author(s) : Nor Aniza Binti Abdullah,Ainin Binti Sulaiman,Nor Badrul Anuar Bin Juma'at,Ali Feizollah Source : TOURISM MANAGEMENT PERSPECTIVES |
24. |
Sentiment analyses of multilingual tweets on halal tourism
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source : TOURISM MANAGEMENT PERSPECTIVES DOI : 10.1016/j.tmp.2020.100658 |
25. |
The rise of traffic classification in IoT networks: A survey
2020
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2020.102538 |
26. |
Examining what people tweet in relation to halal cosmetics-related topics
2020
Author(s) : Nor Aniza Binti Abdullah,Nor Badrul Anuar Bin Juma'at Source : COGENT ARTS & HUMANITIES DOI : 10.1080/23311983.2020.1724593 |
27. |
The rise of traffic classification in IoT networks: A survey
2020
Author(s) : Nor Badrul Anuar Bin Juma'at,Adeleh Asemi Zavareh Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS |
28. |
Applications of link prediction in social networks: A review
2020
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2020.102716 |
29. |
Multi-objective scheduling of MapReduce jobs in big data processing. Multimedia Tools and Applications
2018
Source : Multimedia Tools and Applications DOI : 10.1007/s11042-017-4685-y |
30. |
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
2018
Source : Journal of Medical System DOI : 10.1007/s10916-018-0966-x |
31. |
Performance Evaluation of Machine Learning Algorithms for Spam Profile Detection on Twitter Using WEKA and RapidMiner
2018
Source : Advanced Science Letters DOI : doi:10.1166/asl.2018.10683 |
32. |
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
2018
Source : IEEE Access DOI : 10.1109/access.2017.2789281 |
33. |
Evaluation of Network Traffic Analysis Using Fuzzy C-Means Clustering Algorithm in Mobile Malware Detection
2018
Source : Advanced Science Letters DOI : 10.1166/asl.2018.10660 |
34. |
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
2017
Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2017.06.001 |
35. |
Malicious accounts: Dark of the social networks
2017
Author(s) : Wan Mohd Ashri Bin Wan Daud Source : Journal of Network and Computer Applications |
36. |
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
2017
Source : Computers Security |
37. |
The Evolution of Android Malware and Android Analysis Techniques
2017
Source : ACM Computing Surveys DOI : 10.1145/3017427 |
38. |
Blind source computer device identification from recorded VoIP calls for forensic investigation
2017
Author(s) : Mohamad Nizam Bin Ayub,Mohd Yamani Idna Bin Idris Source : Forensic Science International DOI : 10.1016/j.forsciint.2017.01.010 |
39. |
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
2017
Author(s) : Norasmatul Akma Binti Ahmad Source : Arabian Journal for Science and Engineering DOI : 10.1007/s13369-016-2400-3 |
40. |
A multi-objective software defined network traffic measurement
2017
Author(s) : Nurul Ashikin Binti Abdullah Source : Measurement DOI : 10.1016/j.measurement.2016.10.0 |
41. |
Big data: From beginning to future
2016
Author(s) : Hany Mohamed Aly Ahmed Source : International Journal of Information Management DOI : 10.1016/j.ijinfomgt.2016.07.009 |
42. |
The rise of "malware": Bibliometric analysis of malware study
2016
Source : Journal of Network and Computer Applications DOI : 10.1016/j.jnca.2016.08.022 |
43. |
MapReduce: Review and open challenges
2016
Source : Scientometrics DOI : 10.1007/s11192-016-1945-y |
44. |
Secure and dependable software defined networks
2016
Source : Journal of Network and Computer Applications |
45. |
High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices
2016
Source : Forensic Science International DOI : 10.1016/j.forsciint.2016.07.001 |
46. |
Service delivery models of cloud computing: security issues and open challenges
2016
Author(s) : Muhamad Aqmal Bin Othman Source : Security and Communication Networks DOI : 10.1002/sec.1585 |
47. |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
2016
Source : Pervasive and Mobile Computing |
48. |
Evaluation of machine learning classifiers for mobile malware detection
2016
Author(s) : Nor Badrul Anuar Bin Juma'at Source : Soft Computing |
49. |
Intrusion response systems: Foundations, design, and challenges
2016
Author(s) : Mohideen Salihu Farook Source : Journal of Network and Computer Applications |
50. |
An evolution of image source camera attribution approaches
2016
Author(s) : Hasniza Binti Zaman Huri,Izyan Binti A Wahab Source : Forensic Science International |
51. |
The role of big data in smart city
2016
Author(s) : Rosazlin Binti Abdullah,Ling Tau Chuan Source : International Journal of Information Management DOI : 10.1016/j.ijinfomgt.2016.05.002 |
52. |
The Feasibility Of Employing Ieee802.11p In Electronic-Based Congestion Pricing Zone: A Comparative Study With RFID
2016
Author(s) : Mohd Shahnaz Bin Hasan,Lee Zheng Yii Source : Malaysian Journal of Computer Science |
53. |
Survey of secure multipath routing protocols for WSNs
2015
Source : Journal of Network and Computer Applications |
54. |
A review on feature selection in mobile malware detection
2015
Author(s) : Dharmani Devi A/p Murugan Source : Digital Investigation |
55. |
The rise of Big Data on cloud computing: Review and open research issues
2015
Source : Information Systems |
56. |
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
2015
Author(s) : Hany Mohamed Aly Ahmed Source : Journal of Network and Computer Applications |
57. |
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations
2015
Author(s) : Mohd Fakhrul Zamani Bin Abdul Kadir Source : Computer Methods and Programs in Biomedicine |
58. |
Towards Dynamic Remote Data Auditing in Computational Clouds
2014
Author(s) : Md Mahfuzur Rahman Source : Scientific World Journal |
59. |
Ant-based vehicle congestion avoidance system using vehicular networks
2014
Source : Engineering Applications of Artificial Intelligence |
60. |
Blind source mobile device identification based on recorded call
2014
Source : Engineering Applications of Artificial Intelligence |
61. |
A single Journal Study: Malaysian Journal of Computer Science
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source : Malaysian Journal of Computer Science |
62. |
Multi-Bandwidth Data Path Design for 5G Wireless
Mobile Internets
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source : WSEAS TRANSACTIONS ON INFORMATION SCIENCE & APPLICATIONS |
63. |
Implementing Lightweight Reservation Protocol for
Mobile
Network Using Hybrid Schema
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source : WSEAS Transactions on Computers |
64. |
Bibliometric studies on single journals: a review
2009
Source : Malaysian Journal of Library & information Science |
65. |
Usability and Performance of Secure Mobile
Messaging: M-PKI
2009
Author(s) : Nor Badrul Anuar Bin Juma'at |
66. |
Enhancing DSR Protocol Performance in Mobile Ad Hoc
Network Using ACK Reply
2009
Author(s) : Nor Badrul Anuar Bin Juma'at |
67. |
GSM mobile SMS/MMS using public key infrastructure:
m-PKI
2008
Source : WSEAS Transaction on Computer |
68. |
Identifying False Alarm for Network Intrusion
Detection System Using Hybrid Data Mining and
Decision Tree
2008
Author(s) : Nor Badrul Anuar Bin Juma'at Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
69. |
Honeypot through Web (Honeyd@WEB): The Emerging of
Security Application Integration
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
70. |
Building Online Historical Resources
Collaboratively: Making the Most of a Digital
Library to Reinforce ICT Skills in Malaysia
2004
Author(s) : Nor Badrul Anuar Bin Juma'at Source : Journal of Information Development |
71. |
A Markov Decision Process Model for Traffic
Prioritisation Provision
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
72. |
RedAlert: Approach for Firewall Policies Update
Mechanism
2004
Author(s) : Nor Badrul Anuar Bin Juma'at Source : Wseas Transaction on Computer |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
Evaluation of IoT-based computational intelligence tools for DNA sequence analysis in bioinformatics
2019
Author(s) : Nor Badrul Anuar Bin Juma'at |
2. |
User profiling in anomaly detection of authorization logs
2019
Author(s) : Nor Badrul Anuar Bin Juma'at |
3. |
Challenges of Internet of Things and Big Data Integration
2018
Author(s) : Amirrudin Bin Kamsin,Nor Badrul Anuar Bin Juma'at |
4. |
Blind Source Computer Device Identification from Recorded Calls
2015
Author(s) : Nor Badrul Anuar Bin Juma'at |
5. |
Comparative evaluation of ensemble learning and supervised learning in android malwares using network-based analysis
2015
Author(s) : Nor Badrul Anuar Bin Juma'at |
6. |
Anomaly Detection Using Cooperative Fuzzy Logic Controller
2013
Author(s) : Nor Badrul Anuar Bin Juma'at |
7. |
A Response Strategy Model for Intrusion Response
Systems
2012
Author(s) : Nor Badrul Anuar Bin Juma'at |
8. |
Firewall
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
Computational intelligence tools and databases in bioinformatics
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
2. |
The Internet of Things adoption in healthcare applications.
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
3. |
Performance evaluation of virtual desktop operating systems in virtual desktop infrastructure
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
4. |
Pixel value differencing steganography techniques: Analysis and open challenge
2015
Author(s) : Rafidah Binti Md Noor,Nor Badrul Anuar Bin Juma'at |
5. |
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis
2014
Author(s) : Nor Badrul Anuar Bin Juma'at |
6. |
Bots and Botnets: An Overview of Characteristics,
Detection and Challenges
2012
Author(s) : Nor Badrul Anuar Bin Juma'at |
7. |
MoBots: A New Generation of Botnets on Mobile
Devices and Networks
Networks
2012
Author(s) : Rosli Bin Salleh,Nor Badrul Anuar Bin Juma'at |
8. |
A Risk Index Model for Security Incident
Prioritisation
2011
Author(s) : Nor Badrul Anuar Bin Juma'at |
9. |
An investigation and survey of response options for
Intrusion Response Systems (IRSs)
2010
Author(s) : Nor Badrul Anuar Bin Juma'at |
10. |
Mix-Bandwidth Data Path Design for 5G Real Wireless
World
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
11. |
Usability and Performance of Secure Mobile Messaging
using Public Key Infrastructure
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
12. |
SANAsms: Secure Short Messaging System for Secure
GSM Mobile Communication
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
13. |
Secure Mobile Messaging using Public Key
Infrastructure: m-PKI
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
14. |
Dynamic Network Traffic Per Host Controlling System Using Normal Prediction Interval
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
15. |
Reengineering Information Security Culture Formulation Through Management Perspective
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
16. |
Integrating Agent Technology In Teaching And Learning Of Computer Security Course In Tertiary Level
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
17. |
Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
18. |
An FPGA Implementation Of Stream Cipher Encryption Based On Statistical Approach
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
19. |
Integrated Approach for the Multimedia Retrieval and Database Management of a Collaborative Digital Library
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
20. |
Dynamic and Manageable Honeypot: Honeyd@WEB
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
21. |
RedAlert: Approach for Firewall Policies Update Mechanism
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
22. |
Open-Source Approach in Developing a Collaborative Digital Library for School Projects
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
23. |
Malaysian usage of Open Source in Local Residential College Network Management
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
24. |
A Markov Decision Process Model for Traffic Prioritisation Provision
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
25. |
Inculcating ICT Skills through a Collabrative Digital Library Initiative for Education Use
2003
Author(s) : Nor Badrul Anuar Bin Juma'at |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Diffusion Of Innovation: Electronic Journals Publishing
Researcher(s) : -Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - HNE (Humanities & Ethics)) |
|
end |
Specialization Inforstructure- Programme
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - HNE (Humanities & Ethics)) |
|
end |
Intelligent Event Correlation for End-to-End Internet Performance Monitoring
Researcher(s) : Johari Abdullah,Adib Monzer Habbal
(Program Rakan Penyelidikan UM) |
|
end |
User Authentication using Hybrid Graphical Images
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Dr Mohd Zalisham Bin Jali
(Geran Penyelidikan Universiti Malaya (UMRG) - AET (Innovative Technology (ITRC))) |
|
end |
Mobile Botnet
(Geran Penyelidikan Universiti Malaya (UMRG) - ICT) |
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Diffusion Of Innovation: Electronic Journals Publishing
Warning: Undefined array key "name" in /var/www/html/umexpertv3/included_view/vw_collaborator_research.php on line 159 Deprecated: strtolower(): Passing null to parameter #1 ($string) of type string is deprecated in /var/www/html/umexpertv3/included_view/vw_collaborator_research.php on line 159 Researcher(s) : ,Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - HNE (Humanities & Ethics)) |
|
end |
User Authentication using Hybrid Graphical Images
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Dr Mohd Zalisham Bin Jali
(Geran Penyelidikan Universiti Malaya (UMRG) - AET (Innovative Technology (ITRC))) |
|
end |