Follow
Zubaile Abdullah
Title
Cited by
Cited by
Year
Smart mirror for smart life
MM Yusri, S Kasim, R Hassan, Z Abdullah, H Ruslai, K Jahidin, ...
2017 6th ICT International Student Project Conference (ICT-ISPC), 1-5, 2017
702017
Android malware detection based on network traffic using decision tree algorithm
A Zulkifli, IRA Hamid, WM Shah, Z Abdullah
Recent Advances on Soft Computing and Data Mining: Proceedings of the Third …, 2018
632018
Mobile botnet detection: Proof of concept
Z Abdullah, MM Saudi, NB Anuar
2014 IEEE 5th control and system graduate research colloquium, 257-262, 2014
302014
Android ransomware detection based on dynamic obtained features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020
282020
ABC: android botnet classification using feature selection and classification algorithms
Z Abdullah, MM Saudi, NB Anuar
Advanced Science Letters 23 (5), 4717-4720, 2017
202017
RAPID-risk assessment of android permission and application programming interface (API) call for android botnet
Z Abdullah, MM Saudi
International Journal of Engineering and Technology (UAE), 2018
72018
Network Monitoring System to Detect Unauthorized Connection
IRA Hamid, NH Ab Sukor, CFM Foozy, Z Abdullah
72017
Comparison of Convolutional Neural Network and Artificial Neural Network for Android Botnet Attack Detection
S Balasunthar, Z Abdullah
Applied Information Technology And Computer Science 3 (2), 32-49, 2022
42022
A microarray data pre-processing method for cancer classification
TX Hui, S Kasim, MFM Fudzee, Z Abdullah, R Hassan, A Erianda
JOIV: International Journal on Informatics Visualization 6 (4), 784-790, 2022
32022
Classification of polymorphic virus based on integrated features
IRA Hamid, S Subramaniam, E Sutoyo, Z Abdullah
International Journal on Advanced Science, Engineering and Information …, 2018
32018
Feature selection approach to detect phishing website using machine learning algorithm
SNA Kamarudin, IRA Hamid, CFM Foozy, Z Abdullah
AIP Conference Proceedings 2644 (1), 2022
22022
A Comparative Study between Machine Learning and Deep Learning Algorithm for Network Intrusion Detection
AS Sha’ari, Z Abdullah
Journal of Soft Computing and Data Mining 3 (2), 43-51, 2022
22022
Android botnet detection based on network analysis using machine learning algorithm
MFAH Kamal, IRA Hamid, N Abdullah, Z Abdullah, M Ahmad, WM Shah
international conference on soft computing and data mining, 282-291, 2022
22022
Classification of Metamorphic Virus Using N-Grams Signatures
IRA Hamid, NSM Sani, Z Abdullah, CFM Foozy, K Kipli
Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020
12020
Food reserve composition in sago palm (Metroxylon sagu Rottb.) and influence of cluster age on survivability at the nursery stage
PS Howell, NAP Abdullah, N Busri, P Bulan, M Jiwan, ZC Abdullah, ...
Proceeding-Kuala Lumpur International Agriculture, Forestry and Plantation …, 2015
12015
DDoS Classification using Combined Techniques.
MAM Yusof, NZM Safar, Z Abdullah, FAH Ali, KAM Sukri, MH Jofri, ...
International Journal of Advanced Computer Science & Applications 15 (1), 2024
2024
Analysis of electric field distribution for polluted high voltage glass insulator using finite element method
Z Abdullah, IZ Abidin, M Osman, NA Rahman
AIP Conference Proceedings 2579 (1), 2023
2023
Analysis of electric field distribution for high voltage transmission line glass insulator in clean surface condition using finite element method
Z Abdullah, IZ Abidin, M Osman, NA Rahman
AIP Conference Proceedings 2579 (1), 2023
2023
Verification of Ph. D. Certificate using QR Code on Blockchain Ethereum
NK Noorhizama, Z Abdullah, S Kasim, IRA Hamid, MAM Isa
JOIV: International Journal on Informatics Visualization 7 (3), 716-725, 2023
2023
Client Management System with Two Factor Authentication and Anti Input Injection for Asian Life Travels Sdn Bhd
S Ramadas, Z Abdullah
Applied Information Technology And Computer Science 4 (1), 224-235, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20