Nur Izura Udzir
Nur Izura Udzir
Associate Professor, Faculty of Computer Science and Information Technology, Universiti Putra
Verified email at upm.edu.my - Homepage
Title
Cited by
Cited by
Year
Intrusion detection based on K-Means clustering and Naďve Bayes classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th International Conference on Information Technology in Asia, 1-6, 2011
1342011
Anomaly-based intrusion detection through k-means clustering and naives bayes classification
W Yassin, NI Udzir, Z Muda, MN Sulaiman
Proc. 4th Int. Conf. Comput. Informatics, ICOCI 49, 2013
782013
A Study on Feature Selection and Classification Techniques for Automatic Genre Classification of Traditional Malay Music.
S Doraisamy, S Golzari, N Mohd, MN Sulaiman, NI Udzir
ISMIR, 331-336, 2008
752008
A K-Means and Naive Bayes learning approach for better intrusion detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Information technology journal 10 (3), 648-655, 2011
742011
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
582012
A survey about impacts of cloud computing on digital forensics
F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin, ...
International Journal of Cyber-Security and Digital Forensics 2 (2), 77-95, 2013
57*2013
A hybrid face detection system using combination of appearance-based and feature-based methods
ZS Tabatabaie, RW Rahmat, NIB Udzir, E Kheirkhah
International Journal of Computer Science and Network Security 9 (5), 181-185, 2009
532009
Intrusion detection based on k-means clustering and OneR classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
502011
Investigation of bypassing malware defences and malware detections
F Daryabar, A Dehghantanha, NI Udzir
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
352011
Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks
H Barjini, M Othman, H Ibrahim, NI Udzir
Peer-to-Peer Networking and Applications 5 (1), 1-13, 2012
332012
Towards secure model for SCADA systems
F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
282012
Extract of facial feature point
E Bagherian, RW Rahmat, NI Udzir
IJCSNS International Journal of Computer Science and Network Security 9 (1 …, 2009
272009
IPACT: Improved web page recommendation system using profile aggregation based on clustering of transactions
M Yahya AlMurtadha, NB Sulaiman, N Mustapha, NI Udzir
American Journal of Applied Sciences 8 (3), 277-283, 2011
262011
Towards a pervasive formal privacy language
A Dehghantanha, NI Udzir, R Mahmod
2010 IEEE 24th international conference on advanced information networking …, 2010
262010
Distributed Denial of Service detection using hybrid machine learning technique
M Barati, A Abdullah, NI Udzir, R Mahmod, N Mustapha
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
252014
Coordination with multicapabilities
NI Udzir, AM Wood, JL Jacob
Science of Computer Programming 64 (2), 205-222, 2007
252007
Adaptable decentralized service oriented architecture
FS Esfahani, MAA Murad, MNB Sulaiman, NI Udzir
Journal of Systems and Software 84 (10), 1591-1617, 2011
232011
A review on soft computing techniques in automated negotiation
H Jazayeriy, M Azmi-Murad, MN Sulaiman, NI Udzir
Scientific Research and Essays 6 (24), 5100-5106, 2011
212011
K-means clustering and naive bayes classification for intrusion detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Journal of IT in Asia 4 (1), 13-25, 2014
202014
Mining web navigation profiles for recommendation system
YM AlMurtadha, MNB Sulaiman, N Mustapha, NI Udzir
Information Technology Journal 9 (4), 790-796, 2010
182010
The system can't perform the operation now. Try again later.
Articles 1–20