Showing
1 - 6
results of
6
for search '
Mohd Faizal , Abdollah
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Mohd Faizal , Abdollah
Showing
1 - 6
results of
6
for search '
Mohd Faizal , Abdollah
'
, query time: 0.03s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Remote sensing image classification using soft computing approach
by
Mohd
Faizal
,
Abdollah
,
Shahrin , Prof. Dr. , Sahib
,
Nanna , Prof. Dr, Suryana
,
Othman , Mohd
Published 2013
Get full text
Get full text
Get full text
Technical Report
Save to List
Saved in:
2
An Evaluation Of N-gram System Call Sequence In Mobile Malware Detection
by
Mohd Zaki, Mas'ud
,
Shahrin, Sahib
,
Mohd
Faizal
,
Abdollah
,
Siti Rahayu, Selamat
,
Robiah, Yusof
Published 2016
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
3
Behavioral analysis on IPv4 malware in both IPv4 and IPv6 network environment
by
M., Zulkiflee
,
Mohd
Faizal
Abdollah
, Faizal M.A.
,
IOM, Fairuz
,
Abu, Nur Azman
,
Sahib@Sahibuddin, Shahrin
Published 2011
Get full text
Article
Save to List
Saved in:
4
Analysis and Improvement Design on P2P Botnets Detection Framework
by
Raihana Syahirah Abdullah, RS Abdullah
,
Mohd
Faizal
Abdollah
, Faizal M.A.
,
Zul Azri Muhamad Noh, ZAM Noh
Published 2013
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
5
Tracing the P2P Botnets Behaviours via Hybrid Analysis Approach
by
Raihana Syahirah Abdullah, RS Abdullah
,
Mohd
Faizal
ABdollah
, Faizal M.A.
,
Zul Azri Muhamad Noh, ZAM Noh
Published 2014
Get full text
Get full text
Article
Save to List
Saved in:
6
Formulating Generalize Malware Attack Pattern Using Features Selection
by
Robiah, Yusof
,
Mohd Zaki, Mas'ud
,
Siti Rahayu, Selamat
,
Mohd
Faizal
,
Abdollah
,
Shahrin, Sahib
,
Rudy Fadhlee, Mohd Dollah
Published 2016
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...