Personal information

Activities

Works (24)

Comparison of malware detection techniques using machine learning algorithm

Indonesian Journal of Electrical Engineering and Computer Science
2019 | Journal article
EID:

2-s2.0-85079857391

Part of ISSN: 25024760 25024752
Contributors: Selamat, N.S.; Ali, F.H.M.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Detection and Defense Algorithms of Different Types of DDoS Attacks Using Machine Learning

Lecture Notes in Electrical Engineering
2018 | Book
EID:

2-s2.0-85043340051

Part of ISSN: 18761119 18761100
Contributors: Yusof, M.A.M.; Ali, F.H.M.; Darus, M.Y.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Directional Based Graphical Authentication Method with Shoulder Surfing Resistant

Proceedings - 2018 IEEE Conference on Systems, Process and Control, ICSPC 2018
2018 | Conference paper
EID:

2-s2.0-85065996948

Contributors: Othman, N.A.A.; Rahman, M.A.A.; Sani, A.S.A.; Ali, F.H.M.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Secret sharing deniable encryption technique

Lecture Notes in Electrical Engineering
2017 | Book
EID:

2-s2.0-85016102333

Part of ISSN: 18761119 18761100
Contributors: Hata, M.M.; Ali, F.H.M.; Aljunid, S.A.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Notice of Removal: Holistic-based feature extraction and error correcting code biometric template protection technique

2016 6th International Conference on IT Convergence and Security, ICITCS 2016
2016 | Conference paper
EID:

2-s2.0-85006310620

Contributors: Ismail, S.B.; Ali, F.H.M.; Aljunid, S.A.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Polymorphic malware detection

2016 6th International Conference on IT Convergence and Security, ICITCS 2016
2016 | Conference paper
EID:

2-s2.0-85006263452

Contributors: Selamat, N.S.; Ali, F.H.M.; Othman, N.A.A.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Rules and results for SSL/TLS nonintrusive proxy based on JSON data

2016 6th International Conference on IT Convergence and Security, ICITCS 2016
2016 | Conference paper
EID:

2-s2.0-85006314649

Contributors: Jawi, S.M.; Ali, F.H.M.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

A Method for Web Application Vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm

Procedia Computer Science
2015 | Conference paper
EID:

2-s2.0-84964027577

Part of ISSN: 18770509
Contributors: Saleh, A.Z.M.; Rozali, N.A.; Buja, A.G.; Jalil, K.A.; Ali, F.H.M.; Rahman, T.F.A.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack

ISCAIE 2014 - 2014 IEEE Symposium on Computer Applications and Industrial Electronics
2015 | Conference paper
EID:

2-s2.0-84922513946

Contributors: Buja, G.; Jalil, K.B.A.; Ali, F.B.H.M.; Rahman, T.F.A.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Linearity test framework for S-box in block cipher

2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings
2015 | Conference paper
EID:

2-s2.0-84961707353

Contributors: Mohamed, K.; Pauzi, M.N.M.; Ali, F.H.H.M.; Ariffin, S.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Non-intrusive SSL/TLS proxy implementation and issues

2015 IEEE Student Conference on Research and Development, SCOReD 2015
2015 | Conference paper
EID:

2-s2.0-84966602618

Contributors: Jawi, S.M.; Ali, F.H.M.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Nonintrusive SSL/TLS proxy with JSON-based policy

Lecture Notes in Electrical Engineering
2015 | Book
EID:

2-s2.0-84923171713

Part of ISSN: 18761119 18761100
Contributors: Jawi, S.M.; Ali, F.H.M.; Zulkipli, N.H.N.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11

2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings
2015 | Conference paper
EID:

2-s2.0-84961753627

Contributors: Baharudin, N.; Ali, F.H.M.; Darus, M.Y.; Awang, N.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Analysis performance on contention-based MAC protocols in MANETs

2014 4th World Congress on Information and Communication Technologies, WICT 2014
2014 | Conference paper
EID:

2-s2.0-84983120183

Contributors: Darus, M.Y.; Kamarudin, A.; Awang, N.; Ali, F.H.M.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Performance enhancement of wireless sensor network (WSN) with the implementation of Hybrid ARQ (HARQ) and Transmission Power Control (TPC)

ICWiSe 2014 - 2014 IEEE Conference on Wireless Sensors
2014 | Conference paper
EID:

2-s2.0-84988269526

Contributors: Razali, S.M.; Mamat, K.; Abdul-Basit, K.; Ali, F.H.M.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Profiling and mitigating brute force attack in home wireless LAN

2014 International Conference on Computational Science and Technology, ICCST 2014
2014 | Conference paper
EID:

2-s2.0-84988268753

Contributors: Hafiz, M.Y.M.; Mohd Ali, F.H.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Secured web application using combination of Query Tokenization and Adaptive Method in preventing SQL Injection Attacks

I4CT 2014 - 1st International Conference on Computer, Communications, and Control Technology, Proceedings
2014 | Conference paper
EID:

2-s2.0-84925938896

Contributors: Abu Othman, N.A.; Mohd Ali, F.H.; Mohd Noh, M.B.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Study of S-box properties in block cipher

I4CT 2014 - 1st International Conference on Computer, Communications, and Control Technology, Proceedings
2014 | Conference paper
EID:

2-s2.0-84925964728

Contributors: Mohamed, K.; Mohammed Pauzi, M.N.; Hj Mohd Ali, F.H.; Ariffin, S.; Nik Zulkipli, N.H.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

IDS using mitigation rules approach to mitigate ICMP attacks

Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013
2013 | Conference paper
EID:

2-s2.0-84904169931

Contributors: Hadi, A.D.A.; Azmat, F.H.; Ali, F.H.M.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Risk assessment for cisco PIX-525 firewall: Fuzzy logic approach

Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013
2013 | Conference paper
EID:

2-s2.0-84904189370

Contributors: Othman, N.A.A.; Ali, F.H.M.; Latif, N.A.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Evaluation effectiveness of hybrid IDS using snort with Naïve Bayes to detect attacks

2012 2nd International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2012
2012 | Conference paper
EID:

2-s2.0-84863697493

Contributors: Hussein, S.M.; Ali, F.H.M.; Kasiran, Z.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Simple port knocking method: Against TCP replay attack and port scanning

Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012
2012 | Conference paper
EID:

2-s2.0-84866702137

Contributors: Mohd Ali, F.H.; Yunos, R.; Mohamad Alias, M.A.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

Network security threat assessment model based on fuzzy algorithm

Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011
2011 | Conference paper
EID:

2-s2.0-80051864534

Contributors: Mohd Ali, F.H.; Wan Ismail, W.M.N.H.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier

A novel hybrid fuzzy-SVM image steganographic model

Proceedings 2010 International Symposium on Information Technology - Visual Informatics, ITSim'10
2010 | Conference paper
EID:

2-s2.0-78049402029

Contributors: Hussain, H.S.; Aljunid, S.A.; Yahya, S.; Ali, F.H.M.
Source: Self-asserted source
Fakariah Hani Mohd Ali via Scopus - Elsevier