Seguir
Norbik Bashah Idris
Norbik Bashah Idris
Dirección de correo verificada de utm.my
Título
Citado por
Citado por
Año
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ...
Electronics 9 (7), 1120, 2020
1212020
Security risk assessment framework for cloud computing environments
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Security and Communication Networks 7 (11), 2114-2124, 2014
1052014
Artificial intelligence techniques applied to intrusion detection
NB Idris, B Shanmugam
2005 Annual IEEE India Conference-Indicon, 52-55, 2005
862005
Hybrid intelligent intrusion detection system
N Bashah, IB Shanmugam, AM Ahmed
World Academy of Science, Engineering and Technology 11, 23-26, 2005
682005
Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks
B Shanmugam, NB Idris
2009 International Conference of Soft Computing and Pattern Recognition, 212-217, 2009
662009
A parallel technique for improving the performance of signature-based network intrusion detection system
FI Shiri, B Shanmugam, NB Idris
2011 IEEE 3rd International Conference on Communication Software and …, 2011
462011
A requirements traceability to support change impact analysis
S Ibrahim, NB Idris, M Munro, A Deraman
Asian Journal of Information Tech 4 (4), 345-355, 2005
432005
A brief introduction to intrusion detection system
AB Mohamed, NB Idris, B Shanmugum
Trends in Intelligent Robotics, Automation, and Manufacturing: First …, 2012
292012
Hybrid intrusion detection systems (HIDS) using Fuzzy logic
B Shanmugam, NB Idris
Intrusion Detection Systems, 1-21, 2011
252011
Novel attack detection using fuzzy logic and data mining
NBIB Shanmugam
Proc. Security and Management, 26-31, 2006
242006
Integrating Software Traceability for Change Impact Analysis.
S Ibrahim, NB Idris, M Munro, A Deraman
Int. Arab J. Inf. Technol. 2 (4), 301-308, 2005
242005
Implementing a Document-based Requirements Traceability: A Case Study.
S Ibrahim, NB Idris, M Munro, A Deraman
IASTED Conf. on Software Engineering, 124-131, 2005
242005
A Software Traceability Validation For Change Impact Analysis of Object Oriented Software.
S Ibrahim, NB Idris, M Munro, A Deraman
Software Engineering Research and Practice, 453-459, 2006
222006
Signature-based hybrid Intrusion detection system (HIDS) for android devices
M Ghorbanian, B Shanmugam, G Narayansamy, NB Idris
2013 IEEE Business Engineering and Industrial Applications Colloquium (BEIAC …, 2013
202013
Cloudids: Cloud intrusion detection model inspired by dendritic cell mechanism
A Ahmad, NB Idris, MN Kama
International Journal of Communication Networks and Information Security …, 2017
192017
Alert correlation using a novel clustering approach
AB Mohamed, NB Idris, B Shanmugum
2012 International Conference on Communication Systems and Network …, 2012
182012
A systematic mapping study on cloud-based mobile application testing
BI Yaâ, N Salleh, A Nordin, NB Idris, H Abas, AA Alwan
Journal of Information and Communication Technology 18 (4), 485-527, 2019
142019
Production and maintenance of system documentation: what, why, when and how tools should support the practice
S Sulaiman, NB Idris, S Sahibuddin
Ninth Asia-Pacific Software Engineering Conference, 2002., 558-567, 2002
142002
Contemporary semantic web service frameworks: An overview and comparisons
K Mohebbi, S Ibrahim, NB Idris
arXiv preprint arXiv:1210.3320, 2012
132012
Analysis and detection of P2P botnet connections based on node behaviour
MR Rostami, B Shanmugam, NB Idris
2011 World Congress on Information and Communication Technologies, 928-933, 2011
132011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20