default search action
Anazida Zainal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j30]Taqwa Ahmed Alhaj, Maheyzah Md Siraj, Anazida Zainal, Inshirah Idris, Anjum Nazir, Fatin A. Elhaj, Tasneem Darwish:
An effective attack scenario construction model based on identification of attack steps and stages. Int. J. Inf. Sec. 22(5): 1481-1496 (2023) - [j29]Faitouri A. Aboaoja, Anazida Zainal, Fuad A. Ghaleb, Norah Saleh Alghamdi, Faisal Saeed, Husayn Alhuwayji:
A Kullback-Liebler divergence-based representation algorithm for malware detection. PeerJ Comput. Sci. 9: e1492 (2023) - [c38]Nurfazrina Mohd Zamry, Anazida Zainal, Eric Khoo, Mohamad Nizam Kassim, Zanariah Zainudin:
Fraudulent E-Commerce Website Detection Using Convolutional Neural Network Based on Image Features. DaSET 2023: 123-136 - 2022
- [j28]Danlami Gabi, Nasiru Muhammed Dankolo, Abubakar Atiku Muslim, Ajith Abraham, Mohammed Joda Usman, Anazida Zainal, Zalmiyah Zakaria:
Dynamic scheduling of heterogeneous resources across mobile edge-cloud continuum using fruit fly-based simulated annealing optimization scheme. Neural Comput. Appl. 34(16): 14085-14105 (2022) - [j27]Hashim Albasheer, Maheyzah Md Siraj, Azath Mubarakali, Omer Elsier Tayfour, Sayeed Haider Salih, Mosab Hamdan, Suleman Khan, Anazida Zainal, Sameer Kamarudeen:
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. Sensors 22(4): 1494 (2022) - [j26]Muhammad Zafran Bin Muhammad Zaly Shah, Anazida Zainal, Fuad A. Ghaleb, Abdulrahman Alqarafi, Faisal Saeed:
Prototype Regularized Manifold Regularization Technique for Semi-Supervised Online Extreme Learning Machine. Sensors 22(9): 3113 (2022) - [j25]Mohammad Ali Nassiri Abrishamchi, Anazida Zainal, Fuad A. Ghaleb, Sultan Noman Qasem, Abdullah M. Albarrak:
Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack. Sensors 22(21): 8564 (2022) - [c37]Mohammad Ali Nassiri Abrishamchi, Anazida Zainal:
Review of Smart Home Privacy-Protecting Strategies from a Wireless Eavesdropping Attack. DaSET 2022: 154-167 - [c36]Norhayati Daut, Naomie Salim, Weng Howe Chan, Anazida Zainal, Sharin Hazlin Huspi, Masitah Ghazali, Fatimah Shafinaz Ahmad:
ADiBA Big Data Adoption Framework: Accelerating Big Data Revolution 5.0. DATA 2022: 549-556 - [c35]Eric Khoo Jiun Hooi, Anazida Zainal, Mohamad Nizam Kassim, Zaily Ayub:
Feature Encoding For High Cardinality Categorical Variables Using Entity Embeddings: A Case Study in Customs Fraud Detection. ICCR 2022: 1-5 - 2021
- [j24]Nurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam, Eman H. Alkhammash, Fuad A. Ghaleb, Faisal Saeed:
Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine. Sensors 21(23): 8017 (2021) - [c34]Noor Azeera Abdul Aziz, Mohd Aizaini Maarof, Anazida Zainal:
Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature Selection. CRC 2021: 1-6 - [c33]Koh Leong Chien, Anazida Zainal, Fuad A. Ghaleb, Mohd Nizam Kassim:
Application of Knowledge-oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues. CRC 2021: 1-7 - [c32]Adam Khalid, Anazida Zainal, Mohd Aizaini Maarof, Fuad A. Ghaleb:
Advanced Persistent Threat Detection: A Survey. CRC 2021: 1-6 - [c31]Teo Wen Long, Anazida Zainal, Mohd Nizam Kassim:
News Event Prediction using Causality Approach on South China Sea Conflict. CRC 2021: 1-6 - [c30]Nurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam:
LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks. CRC 2021: 1-6 - [i1]Taqwa Ahmed Alhaj, Maheyzah Md Siraj, Anazida Zainal, Inshirah Idris, Anjum Nazir, Fatin A. Elhaj, Tasneem Darwish:
An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification. CoRR abs/2110.08662 (2021) - 2020
- [j23]Nurudeen Mahmud Ibrahim, Anazida Zainal:
A Distributed Intrusion Detection Scheme for Cloud Computing. Int. J. Distributed Syst. Technol. 11(1): 68-82 (2020) - [j22]Danlami Gabi, Abdul Samad Ismail, Anazida Zainal, Zalmiyah Zakaria, Ajith Abraham, Nasiru Muhammed Dankolo:
Cloud customers service selection scheme based on improved conventional cat swarm optimization. Neural Comput. Appl. 32(18): 14817-14838 (2020) - [c29]Raja Waseem Anwar, Anazida Zainal, Tariq Abdullah, Saleem Iqbal:
Security Threats and Challenges to IoT and its Applications: A Review. FMEC 2020: 301-305 - [c28]Samuel-Soma M. Ajibade, Nor Bahiah Binti Ahmad, Anazida Zainal:
Analysis of Metaheuristics Feature Selection Algorithm for Classification. HIS 2020: 214-222
2010 – 2019
- 2019
- [j21]Raja Waseem Anwar, Anazida Zainal, Fatma Outay, Ansar-Ul-Haque Yasar, Saleem Iqbal:
BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks. Future Gener. Comput. Syst. 96: 605-616 (2019) - [j20]Danlami Gabi, Abdul Samad Ismail, Anazida Zainal, Zalmiyah Zakaria:
Quality of service task scheduling algorithm for time-cost trade off scheduling problem in cloud computing environment. Int. J. Intell. Syst. Technol. Appl. 18(5): 448-469 (2019) - [j19]Nurudeen Mahmud Ibrahim, Anazida Zainal:
An Adaptive Intrusion Detection Scheme for Cloud Computing. Int. J. Swarm Intell. Res. 10(4): 53-70 (2019) - [j18]Mahdi Maktab Dar Oghaz, Mohd Aizaini Maarof, Mohd. Foad Rohani, Anazida Zainal, Syed Zainudeen Mohd Shaid:
An optimized skin texture model using gray-level co-occurrence matrix. Neural Comput. Appl. 31(6): 1835-1853 (2019) - [j17]Fuad A. Ghaleb, Mohd Aizaini Maarof, Anazida Zainal, Murad A. Rassam, Faisal Saeed, Mohammed Alsaedi:
Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between the cooperative awareness messages. Veh. Commun. 20 (2019) - [c27]Yoong Jien Chiam, Mohd Aizaini Maarof, Mohamad Nizam Kassim, Anazida Zainal:
Malware Behavior Profiling from Unstructured Data. SoCPaR 2019: 130-140 - [c26]Eric Khoo, Anazida Zainal, Nurfadilah Ariffin, Mohd Nizam Kassim, Mohd Aizaini Maarof, Majid Bakhtiari:
Fraudulent e-Commerce Website Detection Model Using HTML, Text and Image Features. SoCPaR 2019: 177-186 - 2018
- [j16]Murad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal:
A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier. Int. J. Sens. Networks 27(3): 200-214 (2018) - [j15]Ahmed Nour Moussa, Norafida Ithnin, Anazida Zainal:
CFaaS: bilaterally agreed evidence collection. J. Cloud Comput. 7: 1 (2018) - [j14]Fuad A. Ghaleb, Anazida Zainal, Murad A. Rassam, Faisal Saeed:
Driving-situation-aware adaptive broadcasting rate scheme for vehicular ad hoc network. J. Intell. Fuzzy Syst. 35(1): 423-438 (2018) - [j13]Danlami Gabi, Abdul Samad Ismail, Anazida Zainal, Zalmiyah Zakaria, Ajith Abraham:
Orthogonal Taguchi-based cat algorithm for solving task scheduling problem in cloud computing. Neural Comput. Appl. 30(6): 1845-1863 (2018) - [j12]Ali Hamdi, Khaled B. Shaban, Anazida Zainal:
CLASENTI: A Class-Specific Sentiment Analysis Framework. ACM Trans. Asian Low Resour. Lang. Inf. Process. 17(4): 32:1-32:28 (2018) - [j11]Ahlam Hashim Mohsin, Kamalrulnizam Abu Bakar, Anazida Zainal:
Optimal control overhead based multi-metric routing for MANET. Wirel. Networks 24(6): 2319-2335 (2018) - [j10]Ahlam Hashim Mohsin, Anazida Zainal, Kamalrulnizam Abu Bakar:
Optimized Reliable Hybrid Routing Protocol Based Link Stability for Mobile Wireless Networks. Wirel. Pers. Commun. 102(1): 473-493 (2018) - 2017
- [j9]Fuad A. Ghaleb, Anazida Zainal, Murad A. Rassam, Ajith Abraham:
Improved vehicle positioning algorithm using enhanced innovation-based adaptive Kalman filter. Pervasive Mob. Comput. 40: 139-155 (2017) - [c25]Mahdi Maktabar, Anazida Zainal, Mohd Aizaini Maarof, Mohamad Nizam Kassim:
Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques. HIS 2017: 294-304 - [c24]Siti Salmah Md. Kassim, Mazleena Salleh, Anazida Zainal, Abd Razak Che Husin:
Risk tolerance and trust issues in cloud-based E-learning. ICC 2017: 73:1-73:11 - 2016
- [j8]Fuad A. Ghaleb, Anazida Zainal, Murad A. Rassam:
Mobility information estimation algorithm using Kalman-filter for vehicular ad hoc networks. Int. J. Inf. Comput. Secur. 8(3): 221-240 (2016) - [j7]Ali Hamdi, Khaled Bashir Shaban, Anazida Zainal:
A Review on Challenging Issues in Arabic Sentiment Analysis. J. Comput. Sci. 12(9): 471-481 (2016) - [j6]Aisha Abdallah, Mohd Aizaini Maarof, Anazida Zainal:
Fraud detection system: A survey. J. Netw. Comput. Appl. 68: 90-113 (2016) - [c23]Mohamad Nizam Kassim, Mohd Aizaini Maarof, Anazida Zainal, Amirudin Abdul Wahab:
Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media. DMBD 2016: 391-400 - [c22]Mohamad Nizam Kassim, Mohd Aizaini Maarof, Anazida Zainal, Amirudin Abdul Wahab:
Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts. PKAW 2016: 71-85 - 2015
- [j5]Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
Principal component analysis-based data reduction model for wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 85-101 (2015) - 2014
- [j4]Murad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal:
Adaptive and online data anomaly detection for wireless sensor systems. Knowl. Based Syst. 60: 44-57 (2014) - [c21]Fuad A. Ghaleb, Mohammad Abdur Razzaque, Anazida Zainal:
Mobility pattern based misbehavior detection in vehicular adhoc networks to enhance safety. ICCVE 2014: 894-901 - [c20]Taqwa Ahmed, Maheyzah Md Siraj, Anazida Zainal, Mazura Mat Din:
A taxonomy on intrusion alert aggregation techniques. ISBAST 2014: 244-249 - [c19]Mohammed Faez Al-Jaberi, Anazida Zainal:
Data integrity and privacy model in cloud computing. ISBAST 2014: 280-284 - [c18]Mohamad Nizam Kassim, Mohd Aizaini Maarof, Anazida Zainal:
Enhanced Rules Application Order Approach to Stem Reduplication Words in Malay Texts. SCDM 2014: 657-665 - [c17]Nurfazrina Mohd Zamry, Mohd Aizaini Maarof, Anazida Zainal:
Islamic Web Content Filtering and Categorization on Deviant Teaching. SCDM 2014: 667-678 - [c16]Mohammad Abdur Razzaque, Fuad A. Ghaleb, Anazida Zainal:
Mobility Pattern Based Misbehavior Detection to Avoid Collision in Vehicular Adhoc Networks. UCAmI 2014: 300-303 - 2013
- [j3]Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications. Appl. Soft Comput. 13(4): 1978-1996 (2013) - [j2]Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues. Sensors 13(8): 10087-10122 (2013) - [c15]Ahmad Abunadi, Oluwatobi Akanbi, Anazida Zainal:
Feature extraction process: A phishing detection approach. ISDA 2013: 331-335 - [c14]Anas Arram, Hisham Mousa, Anazida Zainal:
Spam detection using hybrid Artificial Neural Network and Genetic algorithm. ISDA 2013: 336-340 - 2012
- [j1]D. F. Sameon, Siti Mariyam Shamsuddin, Roselina Sallehuddin, Anazida Zainal:
Compact classification of optimized Boolean reasoning with Particle Swarm Optimization. Intell. Data Anal. 16(6): 915-931 (2012) - [c13]Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Ajith Abraham:
Design of Adaptive IDS with Regulated Retraining Approach. AMLTA 2012: 590-600 - [c12]Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
One-Class Principal Component Classifier for anomaly detection in wireless sensor network. CASoN 2012: 271-276 - [c11]Muhammad Najmi Ahmad Zabidi, Mohd Aizaini Maarof, Anazida Zainal:
Malware Analysis with Multiple Features. UKSim 2012: 231-235 - 2011
- [c10]Muhammad Najmi Ahmad Zabidi, Mohd Aizaini Maarof, Anazida Zainal:
Ensemble based categorization and adaptive model for malware detection. IAS 2011: 80-85 - [c9]Murad A. Rassam, Mohd Aizaini Maarof, Anazida Zainal:
A novel intrusion detection framework for Wireless Sensor Networks. IAS 2011: 350-353
2000 – 2009
- 2009
- [c8]Anazida Zainal, Den Fairol Samaon, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection. IAS 2009: 683-686 - [c7]Mohd Saberi Mohamad, Sigeru Omatu, Safaai Deris, Michifumi Yoshioka, Anazida Zainal:
An Improved Binary Particle Swarm Optimisation for Gene Selection in Classifying Cancer Classes. IWANN (2) 2009: 495-502 - [c6]Babak Behravesh, Siti Mariyam Shamsuddin, Anazida Zainal:
Rule Modeling Engine for Optimizing Complex Event Processing Patterns. SoCPaR 2009: 128-135 - 2008
- [c5]Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin, Ajith Abraham:
Ensemble of One-Class Classifiers for Network Intrusion Detection System. IAS 2008: 180-185 - [c4]Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Data Reduction and Ensemble Classifiers in Intrusion Detection. Asia International Conference on Modelling and Simulation 2008: 591-596 - 2007
- [c3]Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection. ICCSA (1) 2007: 512-524 - 2004
- [c2]Mohd Nizam Omar, Mohd Aizaini Maarof, Anazida Zainal:
Solving Time Gap Problems through the Optimization of Detecting Stepping Stone Algorithm. CIT 2004: 391-396 - 2003
- [c1]Aliza Yusny Daud, Mohd Aizaini Maarof, Norliza Katuk, Anazida Zainal:
Attack on Intrusion Detection System Host: Simulation and Analysis. CITA 2003: 256-260
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint