Follow
Nor Badrul Anuar
Nor Badrul Anuar
Professor of Network and Cybersecurity, University of Malaya
Verified email at um.edu.my - Homepage
Title
Cited by
Cited by
Year
The rise of “big data” on cloud computing: Review and open research issues
IAT Hashem, I Yaqoob, NB Anuar, S Mokhtar, A Gani, SU Khan
Information systems 47, 98-115, 2015
31202015
The role of big data in smart city
IAT Hashem, V Chang, NB Anuar, K Adewole, I Yaqoob, A Gani, E Ahmed, ...
International Journal of information management 36 (5), 748-758, 2016
10782016
Big data: From beginning to future
I Yaqoob, IAT Hashem, A Gani, S Mokhtar, E Ahmed, NB Anuar, ...
International Journal of Information Management 36 (6), 1231-1247, 2016
4302016
Evaluation of machine learning classifiers for mobile malware detection
FA Narudin, A Feizollah, NB Anuar, A Gani
Soft Computing 20, 343-357, 2016
4142016
The evolution of android malware and android analysis techniques
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro
ACM Computing Surveys (CSUR) 49 (4), 1-41, 2017
3792017
A review on feature selection in mobile malware detection
A Feizollah, NB Anuar, R Salleh, AWA Wahab
Digital investigation 13, 22-37, 2015
2442015
Androdialysis: Analysis of android intent effectiveness in malware detection
A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell
computers & security 65, 121-134, 2017
2292017
Cloud Service Selection using Multi-Criteria Decision Analysis
M Whaiduzzaman, A Gani, NB Anuar, M Shiraz, MN Haque, IT Haque
The Scientific World Journal, 2014
2252014
Bibliometric studies on single journals: A review.
WUA Kevin, AN Zainab, NB Anuar
Malaysian Journal of Library & Information Science 14 (1), 17-55, 2009
1772009
Malicious accounts: Dark of the social networks
KS Adewole, NB Anuar, A Kamsin, KD Varathan, SA Razak
Journal of Network and Computer Applications 79, 41-67, 2017
1692017
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham
Engineering Applications of Artificial Intelligence 32, 228-241, 2014
1642014
Botnet detection techniques: review, future trends and issues
A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar
1612014
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations
M Hussain, A Al-Haiqi, AA Zaidan, BB Zaidan, MLM Kiah, NB Anuar, ...
Computer methods and programs in biomedicine 122 (3), 393-408, 2015
1572015
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
S Shamshirband, NB Anuar, MLM Kiah, A Patel
Engineering Applications of Artificial Intelligence 26 (9), 2105–2127, 2013
1562013
The rise of traffic classification in IoT networks: A survey
H Tahaei, F Afifi, A Asemi, F Zaki, NB Anuar
Journal of Network and Computer Applications 154, 102538, 2020
1512020
The rise of “blockchain”: bibliometric analysis of blockchain study
A Firdaus, MFA Razak, A Feizollah, IAT Hashem, M Hazim, NB Anuar
Scientometrics 120, 1289-1331, 2019
1302019
Secure and dependable software defined networks
A Akhunzada, A Gani, NB Anuar, A Abdelaziz, MK Khan, A Hayat, ...
Journal of Network and Computer Applications 61, 199-221, 2016
1252016
Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission
S Shamshirband, D Petković, A Amini, NB Anuar, V Nikolić, Ž Ćojbašić, ...
Energy 67, 623-630, 2014
1232014
Intrusion response systems: Foundations, design, and challenges
Z Inayat, A Gani, NB Anuar, MK Khan, S Anwar
Journal of Network and Computer Applications 62, 53-74, 2016
1202016
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ...
Journal of Network and Computer Applications 42, 102-117, 2014
1192014
The system can't perform the operation now. Try again later.
Articles 1–20