Follow
Nor Badrul Anuar
Title
Cited by
Cited by
Year
The rise of “big data” on cloud computing: Review and open research issues
IAT Hashem, I Yaqoob, NB Anuar, S Mokhtar, A Gani, SU Khan
Information systems 47, 98-115, 2015
29862015
The role of big data in smart city
IAT Hashem, V Chang, NB Anuar, K Adewole, I Yaqoob, A Gani, E Ahmed, ...
International Journal of information management 36 (5), 748-758, 2016
9812016
Evaluation of machine learning classifiers for mobile malware detection
FA Narudin, A Feizollah, NB Anuar, A Gani
Soft Computing 20 (1), 343-357, 2016
3862016
Big data: From beginning to future
I Yaqoob, IAT Hashem, A Gani, S Mokhtar, E Ahmed, NB Anuar, ...
International Journal of Information Management 36 (6), 1231-1247, 2016
3802016
The evolution of android malware and android analysis techniques
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro
ACM Computing Surveys (CSUR) 49 (4), 1-41, 2017
3422017
A review on feature selection in mobile malware detection
A Feizollah, NB Anuar, R Salleh, AWA Wahab
Digital investigation 13, 22-37, 2015
2302015
Cloud Service Selection using Multi-Criteria Decision Analysis
M Whaiduzzaman, A Gani, NB Anuar, M Shiraz, MN Haque, IT Haque
The Scientific World Journal, 2014
2102014
Androdialysis: Analysis of android intent effectiveness in malware detection
A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell
computers & security 65, 121-134, 2017
2052017
Bibliometric studies on single journals: A review.
WUA Kevin, AN Zainab, NB Anuar
Malaysian Journal of Library & Information Science 14 (1), 17-55, 2009
1642009
Malicious accounts: Dark of the social networks
KS Adewole, NB Anuar, A Kamsin, KD Varathan, SA Razak
Journal of Network and Computer Applications 79, 41-67, 2017
1562017
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham
Engineering Applications of Artificial Intelligence 32, 228-241, 2014
1552014
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations
M Hussain, A Al-Haiqi, AA Zaidan, BB Zaidan, MLM Kiah, NB Anuar, ...
Computer methods and programs in biomedicine 122 (3), 393-408, 2015
1512015
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
S Shamshirband, NB Anuar, MLM Kiah, A Patel
Engineering Applications of Artificial Intelligence 26 (9), 2105–2127, 2013
1492013
Botnet detection techniques: review, future trends and issues
A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar
1462014
Secure and dependable software defined networks
A Akhunzada, A Gani, NB Anuar, A Abdelaziz, MK Khan, A Hayat, ...
Journal of Network and Computer Applications 61, 199-221, 2016
1192016
D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
S Shamshirband, A Amini, NB Anuar, MLM Kiah, YW Teh, S Furnell
Measurement 55, 212-226, 2014
1182014
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ...
Journal of Network and Computer Applications 42, 102-117, 2014
1162014
Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission
S Shamshirband, D Petković, A Amini, NB Anuar, V Nikolić, Ž Ćojbašić, ...
Energy 67, 623-630, 2014
1122014
A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection
A Feizollah, NB Anuar, R Salleh, F Amalina, RR Ma’arof, S Shamshirband
Malaysian Journal of Computer Science 26 (4), 251-265, 2013
1102013
The rise of traffic classification in IoT networks: A survey
H Tahaei, F Afifi, A Asemi, F Zaki, NB Anuar
Journal of Network and Computer Applications 154, 102538, 2020
1072020
The system can't perform the operation now. Try again later.
Articles 1–20