ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions
2023
Author(s) : Nor Badrul Anuar Bin Juma'at, Muhammad Faiz Bin Mohd Zaki Source :
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
DOI :
10.1016/j.jnca.2023.103582
|
2. |
A bibliometric and content analysis of technological advancement applications in agricultural e-commerce
2023
Source :
ELECTRONIC COMMERCE RESEARCH
DOI :
10.1007/s10660-023-09670-z
|
3. |
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
2023
Author(s) : Amirrudin Bin Kamsin, Nor Badrul Anuar Bin Juma'at Source :
PEERJ COMPUTER SCIENCE
DOI :
10.7717/peerj-cs.1309
|
4. |
Web content topic modeling using LDA and HTML tags
2023
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
PEERJ COMPUTER SCIENCE
DOI :
10.7717/peerj-cs.1459
|
5. |
GRAIN: Granular multi-label encrypted traffic classification using classifier chain
2022
Author(s) : Nor Badrul Anuar Bin Juma'at, Muhammad Faiz Bin Mohd Zaki Source :
COMPUTER NETWORKS
DOI :
10.1016/j.comnet.2022.109084
|
6. |
Self-Configured Framework for scalable link prediction in twitter: Towards autonomous spark framework
2022
Author(s) : Siti Hafizah Binti Ab Hamid, Nor Badrul Anuar Bin Juma'at, Zati Hakim Binti Azizul Hasan, Nur Nasuha Binti Mohd Daud Source :
KNOWLEDGE-BASED SYSTEMS
DOI :
10.1016/j.knosys.2022.109713
|
7. |
Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
PLOS ONE
DOI :
10.1371/journal.pone.0264683
|
8. |
The rise of obfuscated Android malware and impacts on detection methods
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
PEERJ COMPUTER SCIENCE
DOI :
10.7717/peerj-cs.907
|
9. |
Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
MULTIMEDIA TOOLS AND APPLICATIONS
DOI :
10.1007/s11042-022-13908-7
|
10. |
Understanding COVID-19 Halal Vaccination Discourse on Facebook and Twitter Using Aspect-Based Sentiment Analysis and Text Emotion Analysis
2022
Author(s) : Nor Badrul Anuar Bin Juma'at, Ali Feizollah Source :
INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH
DOI :
10.3390/ijerph19106269
|
11. |
ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms
2022
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
DOI :
10.1007/s13369-022-06949-5
|
12. |
GRANULAR NETWORK TRAFFIC CLASSIFICATION FOR STREAMING TRAFFIC USING INCREMENTAL LEARNING AND CLASSIFIER CHAIN
2022
Author(s) : Nor Badrul Anuar Bin Juma'at, Muhammad Faiz Bin Mohd Zaki Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
DOI :
10.22452/mjcs.vol35no3.5
|
13. |
A new deep model for family and non-family photo identification
2022
Author(s) : Nor Badrul Anuar Bin Juma'at, Shivakumara Palaiahnakote Source :
MULTIMEDIA TOOLS AND APPLICATIONS
DOI :
10.1007/s11042-021-11631-3
|
14. |
A systematic review of routing attacks detection in wireless sensor networks
2022
Author(s) : Amirrudin Bin Kamsin, Nor Badrul Anuar Bin Juma'at Source :
PEERJ COMPUTER SCIENCE
DOI :
10.7717/peerj-cs.1135
|
15. |
A survey on video content rating: taxonomy, challenges and open issues
2021
Source :
MULTIMEDIA TOOLS AND APPLICATIONS
DOI :
10.1007/s11042-021-10838-8
|
16. |
Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic
2021
Author(s) : Nor Badrul Anuar Bin Juma'at, Muhammad Faiz Bin Mohd Zaki Source :
COMPUTER NETWORKS
DOI :
10.1016/j.comnet.2020.107617
|
17. |
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
2021
Author(s) : Nor Badrul Anuar Bin Juma'at, Mohd Hairul Nizam Bin Md Nasir, Mohamad Hazim Bin Md Hanif Source :
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
DOI :
10.1016/j.jnca.2021.103009
|
18. |
TWO-STEP MODEL FOR EMOTION DETECTION ON TWITTER USERS: A COVID-19 CASE STUDY IN MALAYSIA
2021
Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
DOI :
10.22452/mjcs.vol34no4.4
|
19. |
Applications of link prediction in social networks: A review
2020
Author(s) : Siti Hafizah Binti Ab Hamid, Nor Badrul Anuar Bin Juma'at, Muhammad Nur Firdaus Bin Sahran, Nur Nasuha Binti Mohd Daud Source :
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
DOI :
10.1016/j.jnca.2020.102716
|
20. |
Sentiment analyses of multilingual tweets on halal tourism
2020
Author(s) : Nor Aniza Binti Abdullah, Ainin Binti Sulaiman, Nor Badrul Anuar Bin Juma'at, Ali Feizollah Source :
TOURISM MANAGEMENT PERSPECTIVES
|
21. |
MapReduce scheduling algorithms: a review
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
JOURNAL OF SUPERCOMPUTING
DOI :
10.1007/s11227-018-2719-5
|
22. |
Sentiment analyses of multilingual tweets on halal tourism
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
TOURISM MANAGEMENT PERSPECTIVES
DOI :
10.1016/j.tmp.2020.100658
|
23. |
Examining what people tweet in relation to halal cosmetics-related topics
2020
Source :
COGENT ARTS & HUMANITIES
DOI :
10.1080/23311983.2020.1724593
|
24. |
The rise of traffic classification in IoT networks: A survey
2020
Source :
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
DOI :
10.1016/j.jnca.2020.102538
|
25. |
The rise of traffic classification in IoT networks: A survey
2020
Author(s) : Nor Badrul Anuar Bin Juma'at, Adeleh Asemi Zavareh Source :
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
|
26. |
Blending Big Data Analytics: Review on Challenges and a Recent Study
2020
Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2019.2923270
|
27. |
Cyber parental control: A bibliometric study
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
CHILDREN AND YOUTH SERVICES REVIEW
DOI :
10.1016/j.childyouth.2020.105134
|
28. |
MapReduce scheduling algorithms: a review
2020
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
JOURNAL OF SUPERCOMPUTING
|
29. |
Multi-objective scheduling of MapReduce jobs in big data processing. Multimedia Tools and Applications
2018
Author(s) : Ponmalar A/p N Alagappar Source :
Multimedia Tools and Applications
DOI :
10.1007/s11042-017-4685-y
|
30. |
Performance Evaluation of Machine Learning Algorithms for Spam Profile Detection on Twitter Using WEKA and RapidMiner
2018
Author(s) : April Camilla Roslani Source :
Advanced Science Letters
DOI :
doi:10.1166/asl.2018.10683
|
31. |
Evaluation of Network Traffic Analysis Using Fuzzy C-Means Clustering Algorithm in Mobile Malware Detection
2018
Author(s) : Yap Teng Teng Source :
Advanced Science Letters
DOI :
10.1166/asl.2018.10660
|
32. |
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
2018
Author(s) : Ponmalar A/p N Alagappar Source :
IEEE Access
DOI :
10.1109/access.2017.2789281
|
33. |
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
2018
Author(s) : Nikman Adli Bin Nor Hashim Source :
Journal of Medical System
DOI :
10.1007/s10916-018-0966-x
|
34. |
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
2017
Author(s) : Norasmatul Akma Binti Ahmad Source :
Arabian Journal for Science and Engineering
DOI :
10.1007/s13369-016-2400-3
|
35. |
The Evolution of Android Malware and Android Analysis Techniques
2017
Source :
ACM Computing Surveys
DOI :
10.1145/3017427
|
36. |
A multi-objective software defined network traffic measurement
2017
Author(s) : Nurul Ashikin Binti Abdullah Source :
Measurement
DOI :
10.1016/j.measurement.2016.10.0
|
37. |
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
2017
Author(s) : Evelyn Shyamala A/p Paul Devadason Source :
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
DOI :
10.1016/j.jnca.2017.06.001
|
38. |
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
2017
Source :
Computers Security
|
39. |
Blind source computer device identification from recorded VoIP calls for forensic investigation
2017
Author(s) : Mohamad Nizam Bin Ayub, Mohd Yamani Idna Bin Idris Source :
Forensic Science International
DOI :
10.1016/j.forsciint.2017.01.010
|
40. |
Malicious accounts: Dark of the social networks
2017
Author(s) : Wan Mohd Ashri Bin Wan Daud Source :
Journal of Network and Computer Applications
|
41. |
An evolution of image source camera attribution approaches
2016
Author(s) : Hasniza Binti Zaman Huri, Izyan Binti A Wahab Source :
Forensic Science International
|
42. |
Service delivery models of cloud computing: security issues and open challenges
2016
Author(s) : Muhamad Aqmal Bin Othman Source :
Security and Communication Networks
DOI :
10.1002/sec.1585
|
43. |
High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices
2016
Author(s) : Khoo Ee Ming, Norita Binti Hussein, Nik Sherina Haidi Binti Hanafi, Rizawati Binti Ramli Source :
Forensic Science International
DOI :
10.1016/j.forsciint.2016.07.001
|
44. |
Big data: From beginning to future
2016
Author(s) : Hany Mohamed Aly Ahmed Source :
International Journal of Information Management
DOI :
10.1016/j.ijinfomgt.2016.07.009
|
45. |
The rise of "malware": Bibliometric analysis of malware study
2016
Source :
Journal of Network and Computer Applications
DOI :
10.1016/j.jnca.2016.08.022
|
46. |
The Feasibility Of Employing Ieee802.11p In Electronic-Based Congestion Pricing Zone: A Comparative Study With RFID
2016
Author(s) : Mohd Shahnaz Bin Hasan, Lee Zheng Yii Source :
Malaysian Journal of Computer Science
|
47. |
MapReduce: Review and open challenges
2016
Source :
Scientometrics
DOI :
10.1007/s11192-016-1945-y
|
48. |
The role of big data in smart city
2016
Author(s) : Rosazlin Binti Abdullah, Ling Tau Chuan Source :
International Journal of Information Management
DOI :
10.1016/j.ijinfomgt.2016.05.002
|
49. |
Secure and dependable software defined networks
2016
Source :
Journal of Network and Computer Applications
|
50. |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
2016
Source :
Pervasive and Mobile Computing
|
51. |
Evaluation of machine learning classifiers for mobile malware detection
2016
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
Soft Computing
|
52. |
Intrusion response systems: Foundations, design, and challenges
2016
Author(s) : Mohideen Salihu Farook Source :
Journal of Network and Computer Applications
|
53. |
A review on feature selection in mobile malware detection
2015
Author(s) : Dharmani Devi A/p Murugan Source :
Digital Investigation
|
54. |
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations
2015
Author(s) : Mohd Fakhrul Zamani Bin Abdul Kadir Source :
Computer Methods and Programs in Biomedicine
|
55. |
Survey of secure multipath routing protocols for WSNs
2015
Source :
Journal of Network and Computer Applications
|
56. |
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
2015
Author(s) : Hany Mohamed Aly Ahmed Source :
Journal of Network and Computer Applications
|
57. |
The rise of Big Data on cloud computing: Review and open research issues
2015
Source :
Information Systems
|
58. |
Ant-based vehicle congestion avoidance system using vehicular networks
2014
Source :
Engineering Applications of Artificial Intelligence
|
59. |
Towards Dynamic Remote Data Auditing in Computational Clouds
2014
Author(s) : Md Mahfuzur Rahman Source :
Scientific World Journal
|
60. |
Blind source mobile device identification based on recorded call
2014
Source :
Engineering Applications of Artificial Intelligence
|
61. |
A single Journal Study: Malaysian Journal of Computer Science
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
Malaysian Journal of Computer Science
|
62. |
Enhancing DSR Protocol Performance in Mobile Ad Hoc
Network Using ACK Reply
2009
Author(s) : Nor Badrul Anuar Bin Juma'at |
63. |
Multi-Bandwidth Data Path Design for 5G Wireless
Mobile Internets
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
WSEAS TRANSACTIONS ON INFORMATION SCIENCE & APPLICATIONS
|
64. |
Usability and Performance of Secure Mobile
Messaging: M-PKI
2009
Author(s) : Nor Badrul Anuar Bin Juma'at |
65. |
Bibliometric studies on single journals: a review
2009
Source :
Malaysian Journal of Library & information Science
|
66. |
Implementing Lightweight Reservation Protocol for
Mobile
Network Using Hybrid Schema
2009
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
WSEAS Transactions on Computers
|
67. |
GSM mobile SMS/MMS using public key infrastructure:
m-PKI
2008
Source :
WSEAS Transaction on Computer
|
68. |
Identifying False Alarm for Network Intrusion
Detection System Using Hybrid Data Mining and
Decision Tree
2008
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
|
69. |
Honeypot through Web (Honeyd@WEB): The Emerging of
Security Application Integration
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
70. |
Building Online Historical Resources
Collaboratively: Making the Most of a Digital
Library to Reinforce ICT Skills in Malaysia
2004
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
Journal of Information Development
|
71. |
A Markov Decision Process Model for Traffic
Prioritisation Provision
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
72. |
RedAlert: Approach for Firewall Policies Update
Mechanism
2004
Author(s) : Nor Badrul Anuar Bin Juma'at Source :
Wseas Transaction on Computer
|
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
Evaluation of IoT-based computational intelligence tools for DNA sequence analysis in bioinformatics
2019
Author(s) : Nor Badrul Anuar Bin Juma'at |
2. |
User profiling in anomaly detection of authorization logs
2019
Author(s) : Nor Badrul Anuar Bin Juma'at |
3. |
Challenges of Internet of Things and Big Data Integration
2018
Author(s) : Amirrudin Bin Kamsin, Nor Badrul Anuar Bin Juma'at |
4. |
Blind Source Computer Device Identification from Recorded Calls
2015
Author(s) : Nor Badrul Anuar Bin Juma'at |
5. |
Comparative evaluation of ensemble learning and supervised learning in android malwares using network-based analysis
2015
Author(s) : Nor Badrul Anuar Bin Juma'at |
6. |
Anomaly Detection Using Cooperative Fuzzy Logic Controller
2013
Author(s) : Nor Badrul Anuar Bin Juma'at |
7. |
A Response Strategy Model for Intrusion Response
Systems
2012
Author(s) : Nor Badrul Anuar Bin Juma'at |
8. |
Firewall
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
Computational intelligence tools and databases in bioinformatics
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
2. |
The Internet of Things adoption in healthcare applications.
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
3. |
Performance evaluation of virtual desktop operating systems in virtual desktop infrastructure
2017
Author(s) : Nor Badrul Anuar Bin Juma'at |
4. |
Pixel value differencing steganography techniques: Analysis and open challenge
2015
Author(s) : Rafidah Binti Md Noor, Nor Badrul Anuar Bin Juma'at |
5. |
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis
2014
Author(s) : Nor Badrul Anuar Bin Juma'at |
6. |
MoBots: A New Generation of Botnets on Mobile
Devices and Networks
Networks
2012
Author(s) : Nor Badrul Anuar Bin Juma'at, Rosli Bin Salleh |
7. |
Bots and Botnets: An Overview of Characteristics,
Detection and Challenges
2012
Author(s) : Nor Badrul Anuar Bin Juma'at |
8. |
A Risk Index Model for Security Incident
Prioritisation
2011
Author(s) : Nor Badrul Anuar Bin Juma'at |
9. |
An investigation and survey of response options for
Intrusion Response Systems (IRSs)
2010
Author(s) : Nor Badrul Anuar Bin Juma'at |
10. |
Mix-Bandwidth Data Path Design for 5G Real Wireless
World
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
11. |
SANAsms: Secure Short Messaging System for Secure
GSM Mobile Communication
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
12. |
Usability and Performance of Secure Mobile Messaging
using Public Key Infrastructure
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
13. |
Secure Mobile Messaging using Public Key
Infrastructure: m-PKI
2008
Author(s) : Nor Badrul Anuar Bin Juma'at |
14. |
Reengineering Information Security Culture Formulation Through Management Perspective
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
15. |
Integrating Agent Technology In Teaching And Learning Of Computer Security Course In Tertiary Level
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
16. |
Dynamic Network Traffic Per Host Controlling System Using Normal Prediction Interval
2007
Author(s) : Nor Badrul Anuar Bin Juma'at |
17. |
Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
18. |
An FPGA Implementation Of Stream Cipher Encryption Based On Statistical Approach
2006
Author(s) : Nor Badrul Anuar Bin Juma'at |
19. |
RedAlert: Approach for Firewall Policies Update Mechanism
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
20. |
Integrated Approach for the Multimedia Retrieval and Database Management of a Collaborative Digital Library
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
21. |
A Markov Decision Process Model for Traffic Prioritisation Provision
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
22. |
Malaysian usage of Open Source in Local Residential College Network Management
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
23. |
Dynamic and Manageable Honeypot: Honeyd@WEB
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
24. |
Open-Source Approach in Developing a Collaborative Digital Library for School Projects
2004
Author(s) : Nor Badrul Anuar Bin Juma'at |
25. |
Inculcating ICT Skills through a Collabrative Digital Library Initiative for Education Use
2003
Author(s) : Nor Badrul Anuar Bin Juma'at |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Specialization Inforstructure- Programme
|
|
end |
Diffusion Of Innovation: Electronic Journals Publishing
Researcher(s) : -, Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at |
|
end |
Intelligent Event Correlation for End-to-End Internet Performance Monitoring
Researcher(s) : Johari Abdullah, Adib Monzer Habbal |
|
end |
User Authentication using Hybrid Graphical Images
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at, Dr Mohd Zalisham Bin Jali |
|
end |
Mobile Botnet
|
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Diffusion Of Innovation: Electronic Journals Publishing
Researcher(s) : -, Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at |
|
end |
User Authentication using Hybrid Graphical Images
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at, Dr Mohd Zalisham Bin Jali |
|
end |