Big data: survey, technologies, opportunities, and challenges N Khan, I Yaqoob, IAT Hashem, Z Inayat, WK Mahmoud Ali, M Alam, ... The scientific world journal 2014 (1), 712826, 2014 | 863 | 2014 |
From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat, S Khan, B Anthony, ... algorithms 10 (2), 39, 2017 | 250 | 2017 |
Intrusion response systems: Foundations, design, and challenges Z Inayat, A Gani, NB Anuar, MK Khan, S Anwar Journal of Network and Computer Applications 62, 53-74, 2016 | 157 | 2016 |
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey S Anwar, Z Inayat, MF Zolkipli, JM Zain, A Gani, NB Anuar, MK Khan, ... Journal of Network and Computer Applications 93, 259-279, 2017 | 64 | 2017 |
A static approach towards mobile botnet detection S Anwar, JM Zain, Z Inayat, RU Haq, A Karim, AN Jabir 2016 3rd International Conference on Electronic Design (ICED), 563-567, 2016 | 55 | 2016 |
Cloud-based intrusion detection and response system: open research issues, and solutions Z Inayat, A Gani, NB Anuar, S Anwar, MK Khan Arabian Journal for Science and Engineering 42, 399-423, 2017 | 54 | 2017 |
Response option for attacks detected by intrusion detection system S Anwar, JM Zain, MF Zolkipli, Z Inayat, AN Jabir, JB Odili 2015 4th International Conference on Software Engineering and Computer …, 2015 | 35 | 2015 |
Android botnets: a serious threat to android devices. S Anwar, MF Zolkipli, Z Inayat, J Odili, M Ali, JM Zain Pertanika Journal of Science & Technology 26 (1), 2018 | 23 | 2018 |
A review paper on botnet and botnet detection techniques in cloud computing S Anwar, JM Zain, F Zolkipli, Z Inayat Proceedings of the ISCI, 28-29, 2014 | 20 | 2014 |
Cloud computing: Locally sub-clouds instead of globally one cloud N Khan, N Ahmad, T Herawan, Z Inayat International Journal of Cloud Applications and Computing (IJCAC) 2 (3), 68-85, 2012 | 11 | 2012 |
A smart framework for mobile botnet detection using static analysis S Anwar, MF Zolkipli, V Mezhuyev, Z Inayat KSII Transactions on Internet and Information Systems (TIIS) 14 (6), 2591-2611, 2020 | 6 | 2020 |
Cloud Computing: Architecture for efficient provision of services N Khan, A Noraziah, T Herawan, E Ismail, Z Inayat 2012 15th International Conference on Network-Based Information Systems, 18-23, 2012 | 6 | 2012 |
On the Prevention of Cross-VM Cache-based Side Channel Attacks Z Inayat PQDT-Global, 2017 | | 2017 |
Quality of Service of Signature Based Intrusion Detection System D Pervez, Z Inayat, A Ahmad Available at SSRN 4812276, 0 | | |