Sign in
ACeS
2019
2020
2021
2019
2021
Keyphrases
Publications
volume 1347, 2021
Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers
ACeS
1347 (2021)
2020
Jun-Ming Gan
,
Hang-Yek Ling
,
Yu-Beng Leau
A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security.
ACeS
(2020)
Yichiet Aun
,
Yen-Min Jasmina Khaw
,
Ming-Lee Gan
,
Vasaki a/p Ponnusamy
Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud.
ACeS
(2020)
Kean-Wah Cheng
,
Swee-Huay Heng
Blockchain-Based Content Sharing and Data Repository System.
ACeS
(2020)
Abhilash Kumar Das
,
Nirmalya Kar
A Novel Approach of Text Encryption Using Random Numbers and Hash Table.
ACeS
(2020)
Nazrool Omar
,
Selvakumar Manickam
Rule-Based SLAAC Attack Detection Mechanism.
ACeS
(2020)
Mahmood Al Shareeda
,
Mohammed Anbar
,
Selvakumar Manickam
,
Iznan Husainy Hasbullah
,
Ayman Khalil
,
Murtadha A. Alazzawi
,
Ahmed Shakir Al-Hiti
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks.
ACeS
(2020)
Tohari Ahmad
,
Herdito Ibnu Dewangkoro
,
Waskitho Wibisono
,
Royyana Muslim Ijtihadie
Protecting Data by Improving the Performance of Controlling Expansion Method.
ACeS
(2020)
Aws Naser Jaber
,
Shahid Anwar
,
Nik Zulkarnaen Bin Khidzir
,
Mohammed Anbar
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions.
ACeS
(2020)
Amir Zulhilmi
,
Salama A. Mostafa
,
Bashar Ahmed Khalaf
,
Aida Mustapha
,
Siti Solehah Tenah
A Comparison of Three Machine Learning Algorithms in the Classification of Network Intrusion.
ACeS
(2020)
Victor Elijah Adeyemo
,
Abdullateef Oluwagbemiga Balogun
,
Hammed A. Mojeed
,
Noah Oluwatobi Akande
,
Kayode S. Adewole
Ensemble-Based Logistic Model Trees for Website Phishing Detection.
ACeS
(2020)
Azmi Shawkat Abdulbaqi
,
Salwa Mohammed Nejrs
,
Sawsan D. Mahmood
,
Ismail Yusuf Panessai
A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption.
ACeS
(2020)
Yudhi Fajar Saputra
,
Mahmoud Ahmad Al-Khasawneh
Big Data Analytics: Schizophrenia Prediction on Apache Spark.
ACeS
(2020)
Minhaz Bin Farukee
,
M. S. Zaman Shabit
,
Md. Rakibul Haque
,
A. H. M. Sarowar Sattar
DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector.
ACeS
(2020)
Collins Uchenna Chimeleze
,
Norziana Jamil
,
Roslan Ismail
,
Kwok-Yan Lam
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction.
ACeS
(2020)
Poornima Mahadevappa
,
Raja Kumar Murugesan
Study of Container-Based Virtualisation and Threats in Fog Computing.
ACeS
(2020)
Assim Sulaiman Khaled
,
Yvonne Hwei-Syn Kam
Face-Based Graphical Authentication System Using Hybrid Images.
ACeS
(2020)
Salam Al-Emari
,
Mohammed Anbar
,
Yousef K. Sanjalawe
,
Selvakumar Manickam
A Labeled Transactions-Based Dataset on the Ethereum Network.
ACeS
(2020)
Waheed Ali H. M. Ghanem
,
Yousef A. Baker El-Ebiary
,
Mohamed Abdulnab
,
Mohammad Tubishat
,
Nayef Abdulwahab Mohammed Alduais
,
Abdullah B. Nasser
,
Nibras Abdullah
,
Ola Ahmed Al-wesabi
Metaheuristic Based IDS Using Multi-objective Wrapper Feature Selection and Neural Network Classification.
ACeS
(2020)
Catherine Lim Siew-Hong
,
Yu-Beng Leau
A Performance Study of a Modified Grey Network Traffic Prediction Mechanism.
ACeS
(2020)
Murtadha A. Alazzawi
,
Hasanain A. H. Al-behadili
,
Mohsin N. Srayyih Almalki
,
Aqeel Luaibi Challoob
,
Mahmood Al Shareeda
ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network.
ACeS
(2020)
Antony Taurshia
,
G. Jaspher W. Kathrine
Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications.
ACeS
(2020)
Zi Hau Chin
,
Timothy Tzen Vun Yap
,
Ian K. T. Tan
Proof-of-Work Difficulty Readjustment with Genetic Algorithm.
ACeS
(2020)
Sarah K. Taylor
,
M. Sharizuan M. Omar
,
Nooraiman Noorashid
,
Aswami Ariffin
,
K. Akram Z. Ariffin
,
S. N. Huda S. Abdullah
People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study.
ACeS
(2020)
Usman Mohammed Gana
,
Aman Jantan
,
Mohd Najwadi Yusoff
,
Ibrahim Abdullahi
,
Muhammad Ubale Kiru
,
Abdullahi Aminu Kazaure
Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review.
ACeS
(2020)
Jetli Chung
,
Jing-Zhi Koay
,
Yu-Beng Leau
A Review on Social Media Phishing: Factors and Countermeasures.
ACeS
(2020)
Riya Khan
,
Nitesh Kumar
,
Anand Handa
,
Sandeep K. Shukla
Malware Detection in Word Documents Using Machine Learning.
ACeS
(2020)
W. Q. Janie Lee
,
Thian Song Ong
,
Tee Connie
,
H. T. Jackson
Finger Vein Presentation Attack Detection with Optimized LBP Variants.
ACeS
(2020)
Jason Chia
,
Ji-Jian Chin
,
Sook-Chin Yip
Evaluating Pairing-Free Identity-Based Identification Using Curve25519.
ACeS
(2020)
Ranil Lee Kotalawela
,
Jun Hong Lee
,
Wan Wah Chuah
,
Kai Wen Luo
,
Lokman Mohd Fadzil
Proposal for Physiological-Resilience Usability Model in Security-Enhanced Mobile Application for Secure Travel.
ACeS
(2020)
Qais Saif Qassim
,
Norziana Jamil
,
Maslina Daud
,
Norhamadi Ja'affar
,
Wan Azlan Wan Kamarulzaman
,
Mohammed Najah Mahdi
Compromising the Data Integrity of an Electrical Power Grid SCADA System.
ACeS
(2020)
Mohammed Shuaib
,
Shadab Alam
,
Salwani Mohd Daud
Improving the Authenticity of Real Estate Land Transaction Data Using Blockchain-Based Security Scheme.
ACeS
(2020)
Abdul Alif Zakaria
,
A. H. Azni
,
Farida Ridzuan
,
Nur Hafiza Zakaria
,
Maslina Daud
Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher.
ACeS
(2020)
Tee Wee Jing
,
Raja Kumar Murugesan
Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology.
ACeS
(2020)
Bahareh Pahlevanzadeh
,
Sara Koleini
,
Suzi Iryanti Fadilah
Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions.
ACeS
(2020)
Uzma Jafar
,
Mohd Juzaiddin Ab Aziz
A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System.
ACeS
(2020)
Yean Li Ho
,
Michael Teck Hong Gan
,
Siong-Hoe Lau
,
Afizan Azman
Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired.
ACeS
(2020)
Abdulla J. Y. Aldarwish
,
Ali A. Yassin
,
Abdullah Mohammed Rashid
,
Aqeel A. Yaseen
,
Hamid Alasadi
,
Ahmed A. Alkadhmawee
Multi-factor Authentication for an Administrator's Devices in an IoT Environment.
ACeS
(2020)
Abdulaziz Aborujilah
,
Rasheed Mohammad Nassr
,
AbdulAleem Al-Othmani
,
Nor Azlina Ali
,
Zalizah Awang Long
,
Mohd Nizam Husen
,
Tawfik Al Hadhrami
,
Hideya Ochiai
SMOTE-Based Framework for IoT Botnet Attack Detection.
ACeS
(2020)
Abdullateef Oluwagbemiga Balogun
,
Shuib Basri
,
Said Jadid Abdulkadir
,
Saipunidzam Mahamad
,
Malek Ahmad Theeb Almomani
,
Abdullahi Abubakar Imam
,
Ganesh M. Kumar
Rank Aggregation Based Multi-filter Feature Selection Method for Software Defect Prediction.
ACeS
(2020)
Shatha A. Baker
,
Ahmed S. Nori
Internet of Things Security: A Survey.
ACeS
(2020)
Kartikeya Gaur
,
Nitesh Kumar
,
Anand Handa
,
Sandeep K. Shukla
Static Ransomware Analysis Using Machine Learning and Deep Learning Models.
ACeS
(2020)
Sanaa Abduljabbar Ahmed Ghaleb
,
Mumtazimah Mohamad
,
Engku Fadzli Hasan Syed Abdullah
,
Waheed Ali H. M. Ghanem
Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network.
ACeS
(2020)
Aws Naser Jaber
,
Shahid Anwar
,
Nik Zulkarnaen Bin Khidzir
,
Mohammed Anbar
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets.
ACeS
(2020)
Ali Abdulrazzaq
,
Awos Kh. Ali
,
Supriyanto Praptodiyono
The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server.
ACeS
(2020)
Sanaa Abduljabbar Ahmed Ghaleb
,
Mumtazimah Mohamad
,
Engku Fadzli Hasan Syed Abdullah
,
Waheed Ali H. M. Ghanem
An Integrated Model to Email Spam Classification Using an Enhanced Grasshopper Optimization Algorithm to Train a Multilayer Perceptron Neural Network.
ACeS
(2020)
Hasanen Alyasiri
Evolving Rules for Detecting Cross-Site Scripting Attacks Using Genetic Programming.
ACeS
(2020)
volume 1132, 2020
Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers
ACeS
1132 (2020)
2019
Taha H. Rassem
,
Nasrin M. Makbol
,
Bee Ee Khoo
Performance Evaluation of Wavelet SVD-Based Watermarking Schemes for Color Images.
ACeS
(2019)
Vasaki Ponnusamy
,
Chan Mee Yee
,
Adnan Bin Amanat Ali
Mobile Authentication Using Tapping Behavior.
ACeS
(2019)