Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Syed Zainudeen Mohd Shaid"'
Autor:
Fuad A. Ghaleb, Bander Ali Saleh Al-Rimy, Abdulmohsen Almalawi, Abdullah Marish Ali, Anazida Zainal, Murad A. Rassam, Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof
Publikováno v:
IEEE Access, Vol 8, Pp 217744-217761 (2020)
Vehicular Ad Hoc Networks (VANETs) are among the main enablers for future Intelligent Transportation Systems (ITSs) as they facilitate information sharing, which improves road safety, traffic efficiency, and provides passengers' comfort. Due to the d
Externí odkaz:
https://doaj.org/article/663cee4a427a4d13b98f3f45ee91b850
Autor:
Bander Ali Saleh Al-Rimy, Mohd Aiziani Maarof, Mamoun Alazab, Fawaz Alsolami, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Tawfik Al-Hadhrami, Abdullah Marish Ali
Publikováno v:
IEEE Access, Vol 8, Pp 140586-140598 (2020)
The cryptography employed against user files makes the effect of crypto-ransomware attacks irreversible even after detection and removal. Thus, detecting such attacks early, i.e. during pre-encryption phase before the encryption takes place is necess
Externí odkaz:
https://doaj.org/article/8afdf01bc84d4d60aa6ddcb7e1f77087
Autor:
Fuad A. Ghaleb, Fawaz Alsolami, Mohd Aiziani Maarof, Abdullah Marish Ali, Mamoun Alazab, Syed Zainudeen Mohd Shaid, Bander Ali Saleh Al-rimy, Tawfik Al-Hadhrami
Publikováno v:
IEEE Access, Vol 8, Pp 140586-140598 (2020)
The cryptography employed against user files makes the effect of crypto-ransomware attacks irreversible even after detection and removal. Thus, detecting such attacks early, i.e. during pre-encryption phase before the encryption takes place is necess
Autor:
Murad A. Rassam, Mohd Aizaini Maarof, Abdulmohsen Almalawi, Syed Zainudeen Mohd Shaid, Bander Ali Saleh Al-rimy, Fuad A. Ghaleb, Anazida Zainal, Abdullah Marish Ali
Publikováno v:
IEEE Access, Vol 8, Pp 217744-217761 (2020)
Vehicular Ad Hoc Networks (VANETs) are among the main enablers for future Intelligent Transportation Systems (ITSs) as they facilitate information sharing, which improves road safety, traffic efficiency, and provides passengers’ comfort. Due to the
Publikováno v:
Future Generation Computer Systems. 101:476-491
The irreversible effect is what characterizes crypto-ransomware and distinguishes it from traditional malware. That is, even after neutralizing the attack, the targeted files remain encrypted and cannot be accessed without the decryption key. Thus, i
Autor:
Mamoun Alazab, Abdullah Marish Ali, Tawfik Al-Hadhrami, Syed Zainudeen Mohd Shaid, Bander Ali Saleh Al-rimy, Abdulmohsen Almalawi, Fuad A. Ghaleb, Mohd Aizaini Maarof
Crypto-ransomware is a type of malware whose effect is irreversible even after detection and removal. Thus, early detection is crucial to protect user files from being encrypted and held to ransom. Several studies have proposed early detection soluti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::861c5c0b74ad8eacdd03718a4082aa3a
https://irep.ntu.ac.uk/id/eprint/41317/1/1377205_a1171_Al-Hadhrami.pdf
https://irep.ntu.ac.uk/id/eprint/41317/1/1377205_a1171_Al-Hadhrami.pdf
Publikováno v:
Computers & Security. 74:144-166
The paper surveys state-of-the-art studies on ransomware analysis, detection, and prediction.The work describes the enabling technologies and factors that contribute to successful ransomware attacks.The paper proposes a general taxonomy for the diffe
Autor:
Mahdi Maktab Dar Oghaz, Mohd Foad Rohani, Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof, Anazida Zainal
Publikováno v:
Neural Computing and Applications. 31:1835-1853
Texture analysis is devised to address the weakness of color-based image segmentation models by considering the statistical and spatial relations among the group of neighbor pixels in the image instead of relying on color information of individual pi
Autor:
Anazida Zainal, Syed Zainudeen Mohd Shaid, Mahdi Maktab Dar Oghaz, Mohd Foad Rohani, Mohd Aizaini Maarof
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 14:1852-1861
Color space conversion utilized by many researchers in order to enhance skin recognition performance by projecting the skin color cluster to a more distinctive distribution. In spite of the substantial research effort in this area, finding a suitable
Publikováno v:
International Journal of Innovative Computing. 8
Automated web application penetration testing has emerged as a trend. The computer was assigned the task of penetrating web application security with penetration testing technique. Relevant computer program reduces time, cost, and resources required