| A review of bring your own device on security issues M Olalere, MT Abdullah, R Mahmod, A Abdullah Sage Open 5 (2), 2158244015580372, 2015 | 142 | 2015 |
| An efficient anomaly intrusion detection method with feature selection and evolutionary neural network S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah IEEE Access 8, 70651-70663, 2020 | 94 | 2020 |
| A survey on privacy issues in digital forensics A Aminnezhad, A Dehghantanha, MT Abdullah International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (4 …, 2012 | 94 | 2012 |
| A cloud-based intrusion detection service framework W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 88 | 2012 |
| An intelligent DDoS attack detection tree-based model using Gini index feature selection method MA Bouke, A Abdullah, SH ALshatebi, MT Abdullah, H El Atigh Microprocessors and Microsystems 98, 104823, 2023 | 80 | 2023 |
| An effective security alert mechanism for real-time phishing tweet detection on Twitter SW Liew, NFM Sani, MT Abdullah, R Yaakob, MY Sharum Computers & security 83, 201-207, 2019 | 70 | 2019 |
| Adaptive feature selection for denial of services (DoS) attack AR Yusof, NI Udzir, A Selamat, H Hamdan, MT Abdullah 2017 IEEE conference on application, information and network security (AINS …, 2017 | 65 | 2017 |
| A review on feature selection and ensemble techniques for intrusion detection system M Torabi, NI Udzir, MT Abdullah, R Yaakob International Journal of Advanced Computer Science and Applications 12 (5), 2021 | 61 | 2021 |
| Analysis of evidence using formal event reconstruction J James, P Gladyshev, MT Abdullah, Y Zhu International Conference on Digital Forensics and Cyber Crime, 85-98, 2009 | 47 | 2009 |
| An overview of attacks against digital watermarking and their respective countermeasures M Tanha, SDS Torshizi, MT Abdullah, F Hashim Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 45 | 2012 |
| Cloud forensics issues and opportunities A Aminnezhad, A Dehghantanha, MT Abdullah, M Damshenas International Journal of Information Processing and Management 4 (4), 76, 2013 | 40 | 2013 |
| Greening cloud-enabled big data storage forensics: Syncany as a case study YY Teing, A Dehghantanha, KKR Choo, Z Muda, MT Abdullah IEEE Transactions on Sustainable Computing 4 (2), 204-216, 2017 | 37 | 2017 |
| VoIP evidence model: A new forensic method for investigating VoIP malicious attacks M Ibrahim, MT Abdullah, A Dehghantanha Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 32 | 2012 |
| Signature-Based Anomaly intrusion detection using Integrated data mining classifiers W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda 2014 International symposium on biometrics and security technologies (ISBAST …, 2014 | 31 | 2014 |
| Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation W Halboob, R Mahmod, NI Udzir, MT Abdullah Procedia Computer Science 56, 370-375, 2015 | 30 | 2015 |
| Research Article A Review on Mobile Device's Digital Forensic Process Models A Farjamfar, MT Abdullah, R Mahmod, NI Udzir Research Journal of Applied Sciences, Engineering and Technology 8 (3), 358-366, 2014 | 26 | 2014 |
| Enhance Luhn algorithm for validation of credit cards numbers KW Hussein, NFM Sani, R Mahmod, MT Abdullah Int. J. Comput. Sci. Mob. Comput 2 (7), 262-272, 2013 | 26 | 2013 |
| E2IDS: An enhanced intelligent intrusion detection system based on decision tree algorithm MA Bouke, A Abdullah, SH ALshatebi, MT Abdullah Journal of Applied Artificial Intelligence 3 (1), 1-16, 2022 | 25 | 2022 |
| Identification and evaluation of discriminative lexical features of malware URL for real-time classification M Olalere, MT Abdullah, R Mahmod, A Abdullah 2016 International Conference on Computer and Communication Engineering …, 2016 | 23 | 2016 |
| Advances in computer forensics MT Abdullah, R Mahmod, AAA Ghani, MZ Abdullah, ABM Sultan International Journal of Computer Science and Network Security 8 (2), 215-219, 2008 | 23 | 2008 |