Centre of Research for Cyber Security & Network (CSNET)

List of Publication

Bil Title Corresponding Authors
1 Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade Alsehani F.N.; Wahab A.W.B.A.; Shuib L.,
2 Mobile Phone Data: A Survey of Techniques, Features, and Applications Okmi M., Por L.Y., Ang T.F.,
3 Characteristics of Blockchain and Its Relationship With Trust Ali V.; Norman A.A.; Azzuhri S.R.B.,
4 Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics Feizollah A., Anuar N.B.,
5 ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms Elsersy W.F., Anuar N.B., Razak M.F.A.,
6 Secure PIN-Entry Method Using One-Time PIN (OTP) Binbeshr F., Por L.Y., Kiah M.L.M.,
7 The rise of website fingerprinting on Tor: Analysis on techniques and assumptions Zaki F., Anuar N.B.,
8 The rise of website fingerprinting on Tor: Analysis on techniques and assumptions Zaki F., Anuar N.B.,
9 A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions Okmi, M (Okmi, Mohammed) [1] , [2] ; Por, LY (Por, Lip Yee) [1] ; Ang, TF (Ang, Tan Fong) [1] ; Al-Hussein, W (Al-Hussein, Ward) [1] ; Ku, CS (Ku, Chin Soon) [3]
10 RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things Alansari, Zainab; Anuar, Nor Badrul; Kamsin, Amirrudin; Belgaum, Mohammad Riyaz
11 Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption Alexan, Wassim; Chen, Yen-Lin; Por, Lip Yee; Gabr, Mohamed
12 A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations Alshahrani, NM; Kiah, MLM; Saif, A
13 A Systematic Literature Review of Information Security in Chatbots Yang, Jing; Chen, Yen-Lin; Por, Lip Yee; Ku, Chin Soon
14 Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection Jimale, MA (Jimale, Mohamud Ahmed) [1] ; Abdullah, NA (Abdullah, Nor Aniza) [1] ; Kiah, MLBM (Kiah, Miss Laiha Binti Mat) [1] ; Idris, MYI (Idris, Mohd Yamani Idna) [1] ; Z'Aba, MR (Z'Aba, Muhammad Reza) [2] ; Jamil, N (Jamil, Norziana) [3] ; Rohmad, MS (Rohmad, Mohd Saufy) [4]/td>
15 OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification Hameed, MM (Hameed, M. Muzaffar) [1] , [2] ; Ahmad, R (Ahmad, Rodina) [1] ; Kiah, LM (Kiah, Laiha Mat) [1] ; Murtaza, G (Murtaza, Ghulam) [3] ; Mazhar, N (Mazhar, Noman) [1]
16 Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions Ayedh, Aljuaid Turkea M.; Wahab, Ainuddin Wahid Abdul; Idris, Mohd Yamani Idna
17 Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges Norman, Azah Anir; Marzuki, Athirah Husna; Faith, Fatokun; Hamid, Suraya; Ghani, Norjihan Abdul; Ravana, Sri Devi; Arshad, Noreen Izza
18 An Automated Precise Authentication of Vehicles for Enhancing the Visual Security Protocols Roy, Kumarmangal; Ahmad, Muneer; Ghani, Norjihan Abdul; Uddin, Jia; Shin, Jungpil
19 Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment Ayedh, MAT (Ayedh, M. Aljuaid Turkea); Wahab, AWA (Wahab, Ainuddin Wahid Abdul); Idris, MYI (Idris, Mohd Yamani Idna)
20 An Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review Eke C.I.; Norman A.A.;
21 Exploring Manet Security Aspects: Analysis Of Attacks And Node Misbehaviour Issues Khan, Burhan Ul Islam; Anwar, Farhat; Rahman, Farah Diyana Bt. Abdul; Olanrewaju, Rashidah Funke; Kiah, Laiha B. Mat; Rahman, Md Arafatur; Janin, Zuriati
22 A An Empirical Examination of Formation of Trust in Blockchain Ali, V (Ali, Vizaad) [1] ; Norman, AA (Norman, Azah Anir) [1] ; Azzuhri, SRB (Azzuhri, Saaidal Razalli Bin) [2]
23 The rise of user profiling in social media: review, challenges and future direction Gilbert, Justin; Hamid, Suraya; Hashem, Ibrahim Abaker Targio; Ghani, Norjihan Abdul; Boluwatife, Fatokun Faith
24 R3-Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems Gabr, M (Gabr, Mohamed) [1] ; Korayem, Y (Korayem, Yousef) [1] ; Chen, YL (Chen, Yen-Lin) [2] ; Yee, PL (Yee, Por Lip) [3] ; Ku, CS (Ku, Chin Soon) [4] ; Alexan, W (Alexan, Wassim) [5] , [6]
25 Exploring the Landscape of AI-SDN: A Comprehensive Bibliometric Analysis and Future Perspectives Sahran, F (Sahran, Firdaus) [1]; Altarturi, HHM (Altarturi, Hamza H. M.) [1] ; Anuar, NB (Anuar, Nor Badrul) [1]