Endpoint Detection and Response: Why Use Machine Learning?
Sjarif, Nilam Nur Amir, Chuprat, Suriayati, Mahrin, Mohd Naz'ri, Ahmad, Noor Azurati, Ariffin, Aswami, Senan, Firham M, Zamani, Nazri Ahmad, Saupi, Afifah
Published in 2019 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2019)
Published in 2019 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2019)
Get full text
Conference Proceeding
Classification of Malware Analytics Techniques: A Systematic Literature Review
Hordri, Nur Farhana, Ahmad, Noor Azurati, Yuhaniz, Siti Sophiayati, Sahibuddin, Shamsul, Ariffin, Aswami Fadillah Mohd, Saupi, Nur Afifah Mohd, Zamani, NazriAhmad, Jeffry, Yasmin, Senan, Mohamad Firham Efendy Md
Published in International Journal of Security and Its Applications (31.03.2018)
Published in International Journal of Security and Its Applications (31.03.2018)
Get full text
Journal Article
CCTV quality assessment for forensics facial recognition analysis
Senan, Mohamad Firham Efendy Md, Abdullah, Siti Norul Huda Sheikh, Kharudin, Wafa Mohd, Saupi, Nur Afifah Mohd
Published in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (01.01.2017)
Published in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (01.01.2017)
Get full text
Conference Proceeding