[go: up one dir, main page]

Follow
Rosli Salleh
Rosli Salleh
Associate Professor
Verified email at um.edu.my
Title
Cited by
Cited by
Year
The evolution of android malware and android analysis techniques
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro
ACM Computing Surveys (CSUR) 49 (4), 1-41, 2017
5032017
A review on feature selection in mobile malware detection
A Feizollah, NB Anuar, R Salleh, AWA Wahab
Digital investigation 13, 22-37, 2015
3152015
Androdialysis: Analysis of android intent effectiveness in malware detection
A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell
computers & security 65, 121-134, 2017
3122017
Copy-move forgery detection: survey, challenges and future directions
NB Abd Warif, AWA Wahab, MYI Idris, R Ramli, R Salleh, ...
Journal of Network and Computer Applications 75, 259-278, 2016
2692016
Overview of security issues in wireless sensor networks
H Modares, R Salleh, A Moravejosharieh
2011 third international conference on computational intelligence, modelling …, 2011
2192011
The future of mobile wireless communication networks
X Li, A Gani, R Salleh, O Zakaria
2009 International Conference on Communication Software and Networks, 554-557, 2009
2042009
Botnet detection techniques: review, future trends, and issues
A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar
Journal of Zhejiang University SCIENCE C 15 (11), 943-983, 2014
2022014
The rise of “malware”: Bibliometric analysis of malware study
MF Ab Razak, NB Anuar, R Salleh, A Firdaus
Journal of Network and Computer Applications 75, 58-76, 2016
1622016
A study of machine learning classifiers for anomaly-based mobile botnet detection
A Feizollah, NB Anuar, R Salleh, F Amalina, S Shamshirband
Malaysian Journal of Computer Science 26 (4), 251-265, 2013
1412013
Bots and botnets: An overview of characteristics, detection and challenges
M Eslahi, R Salleh, NB Anuar
2012 IEEE International Conference on Control System, Computing and …, 2012
1312012
Off-line handwriting text line segmentation: A review
Z Razak, K Zulkiflee, MYI Idris, EM Tamil, MNM Noor, R Salleh, M Yaakob, ...
International journal of computer science and network security 8 (7), 12-20, 2008
1272008
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis
A Feizollah, NB Anuar, R Salleh, F Amalina
2014 international symposium on biometrics and security technologies (ISBAST …, 2014
1132014
Heterogeneous energy and traffic aware sleep-awake cluster-based routing protocol for wireless sensor network
NM Shagari, MYI Idris, RB Salleh, I Ahmedy, G Murtaza, HA Shehadeh
IEEE Access 8, 12232-12252, 2020
1002020
Global insights and the impact of generative AI-ChatGPT on multidisciplinary: a systematic review and bibliometric analysis
N Khan, Z Khan, A Koubaa, MK Khan, RB Salleh
Connection science 36 (1), 2353630, 2024
922024
SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack
NBA Warif, AWA Wahab, MYI Idris, R Salleh, F Othman
Journal of Visual Communication and Image Representation 46, 219-232, 2017
852017
SMARTbot: A behavioral analysis framework augmented with machine learning to identify mobile botnet applications
A Karim, R Salleh, MK Khan
PloS one 11 (3), e0150077, 2016
802016
Bio-inspired for features optimization and malware detection
MFA Razak, NB Anuar, F Othman, A Firdaus, F Afifi, R Salleh
Arabian Journal for Science and Engineering 43 (12), 6963-6979, 2018
712018
MoBots: A new generation of botnets on mobile devices and networks
M Eslahi, R Salleh, NB Anuar
2012 International Symposium on Computer Applications and Industrial …, 2012
702012
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
A Bello Tambawal, R Md Noor, R Salleh, C Chembe, M Oche
PloS one 14 (4), e0214664, 2019
662019
Role of device identification and manufacturer usage description in IoT security: a survey
N Mazhar, R Salleh, M Zeeshan, MM Hameed
Ieee Access 9, 41757-41786, 2021
582021
The system can't perform the operation now. Try again later.
Articles 1–20