| The evolution of android malware and android analysis techniques K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro ACM Computing Surveys (CSUR) 49 (4), 1-41, 2017 | 503 | 2017 |
| A review on feature selection in mobile malware detection A Feizollah, NB Anuar, R Salleh, AWA Wahab Digital investigation 13, 22-37, 2015 | 315 | 2015 |
| Androdialysis: Analysis of android intent effectiveness in malware detection A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell computers & security 65, 121-134, 2017 | 312 | 2017 |
| Copy-move forgery detection: survey, challenges and future directions NB Abd Warif, AWA Wahab, MYI Idris, R Ramli, R Salleh, ... Journal of Network and Computer Applications 75, 259-278, 2016 | 269 | 2016 |
| Overview of security issues in wireless sensor networks H Modares, R Salleh, A Moravejosharieh 2011 third international conference on computational intelligence, modelling …, 2011 | 219 | 2011 |
| The future of mobile wireless communication networks X Li, A Gani, R Salleh, O Zakaria 2009 International Conference on Communication Software and Networks, 554-557, 2009 | 204 | 2009 |
| Botnet detection techniques: review, future trends, and issues A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar Journal of Zhejiang University SCIENCE C 15 (11), 943-983, 2014 | 202 | 2014 |
| The rise of “malware”: Bibliometric analysis of malware study MF Ab Razak, NB Anuar, R Salleh, A Firdaus Journal of Network and Computer Applications 75, 58-76, 2016 | 162 | 2016 |
| A study of machine learning classifiers for anomaly-based mobile botnet detection A Feizollah, NB Anuar, R Salleh, F Amalina, S Shamshirband Malaysian Journal of Computer Science 26 (4), 251-265, 2013 | 141 | 2013 |
| Bots and botnets: An overview of characteristics, detection and challenges M Eslahi, R Salleh, NB Anuar 2012 IEEE International Conference on Control System, Computing and …, 2012 | 131 | 2012 |
| Off-line handwriting text line segmentation: A review Z Razak, K Zulkiflee, MYI Idris, EM Tamil, MNM Noor, R Salleh, M Yaakob, ... International journal of computer science and network security 8 (7), 12-20, 2008 | 127 | 2008 |
| Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis A Feizollah, NB Anuar, R Salleh, F Amalina 2014 international symposium on biometrics and security technologies (ISBAST …, 2014 | 113 | 2014 |
| Heterogeneous energy and traffic aware sleep-awake cluster-based routing protocol for wireless sensor network NM Shagari, MYI Idris, RB Salleh, I Ahmedy, G Murtaza, HA Shehadeh IEEE Access 8, 12232-12252, 2020 | 100 | 2020 |
| Global insights and the impact of generative AI-ChatGPT on multidisciplinary: a systematic review and bibliometric analysis N Khan, Z Khan, A Koubaa, MK Khan, RB Salleh Connection science 36 (1), 2353630, 2024 | 92 | 2024 |
| SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack NBA Warif, AWA Wahab, MYI Idris, R Salleh, F Othman Journal of Visual Communication and Image Representation 46, 219-232, 2017 | 85 | 2017 |
| SMARTbot: A behavioral analysis framework augmented with machine learning to identify mobile botnet applications A Karim, R Salleh, MK Khan PloS one 11 (3), e0150077, 2016 | 80 | 2016 |
| Bio-inspired for features optimization and malware detection MFA Razak, NB Anuar, F Othman, A Firdaus, F Afifi, R Salleh Arabian Journal for Science and Engineering 43 (12), 6963-6979, 2018 | 71 | 2018 |
| MoBots: A new generation of botnets on mobile devices and networks M Eslahi, R Salleh, NB Anuar 2012 International Symposium on Computer Applications and Industrial …, 2012 | 70 | 2012 |
| Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications A Bello Tambawal, R Md Noor, R Salleh, C Chembe, M Oche PloS one 14 (4), e0214664, 2019 | 66 | 2019 |
| Role of device identification and manufacturer usage description in IoT security: a survey N Mazhar, R Salleh, M Zeeshan, MM Hameed Ieee Access 9, 41757-41786, 2021 | 58 | 2021 |