default search action
Ramlan Mahmod
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j9]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
State of the Art in Biometric Key Binding and Key Generation Schemes. Int. J. Commun. Networks Inf. Secur. 9(3) (2017) - [p2]Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod:
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 41-62 - [p1]Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod:
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 63-78 - [i7]Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod:
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies. CoRR abs/1706.08056 (2017) - [i6]Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod:
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies. CoRR abs/1706.08062 (2017) - 2016
- [j8]Mohsen Bafandehkar, Sharifah Md Yasin, Ramlan Mahmod:
Optimizing {0, 1, 3}-NAF Recoding Algorithm Using Block-Method Technique in Elliptic Curve Cryptosystem. J. Comput. Sci. 12(11): 534-544 (2016) - [c30]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
A Hybrid Scheme for Face Template Protection. IMCOM 2016: 6:1-6:7 - [c29]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation. WISA 2016: 341-352 - [i5]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Ali Dehghan Tanha:
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation. CoRR abs/1604.00980 (2016) - [i4]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Audun Jøsang, Ali Dehghan Tanha:
A Formal Calculus for International Relations Computation and Evaluation. CoRR abs/1606.02239 (2016) - 2015
- [c28]Waleed Halboob, Ramlan Mahmod, Nur Izura Udzir, Mohd Taufik Abdullah:
Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation. FNC/MobiSPC 2015: 370-375 - [c27]Waleed Halboob, Ramlan Mahmod, Muhammad Abulaish, Haider Abbas, Kashif Saleem:
Data Warehousing Based Computer Forensics Investigation Framework. ITNG 2015: 163-168 - [i3]Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain, Nur Izura Udzir:
A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation. CoRR abs/1502.03544 (2015) - 2014
- [j7]NorazahAbd Aziz, Nur Izura Udzir, Ramlan Mahmod:
Extending TLS with Mutual Attestation for Platform Integrity Assurance. J. Commun. 9(1): 63-72 (2014) - [j6]Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Mostafa Behzadi, Ramlan Mahmod, Norwati Mustapha:
Intrusion Detection System in Secure Shell Traffic in Cloud Environment. J. Comput. Sci. 10(10): 2029-2036 (2014) - [c26]Mohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah:
An approach for forensic investigation in Firefox OS. CyberSec 2014: 22-26 - [c25]Mohd Najwadi Yusoff, Ramlan Mahmod, Mohd Taufik Abdullah, Ali Dehghantanha:
Mobile forensic data acquisition in Firefox OS. CyberSec 2014: 27-31 - [c24]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod:
RF simulator for cryptographic protocol. ICCSCE 2014: 518-523 - [c23]Waleed Halboob, Ali Mamat, Ramlan Mahmod:
Push-based XML access control policy languages: A review. ISBAST 2014: 182-187 - [c22]Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Ramlan Mahmod, Norwati Mustapha:
Distributed Denial of Service detection using hybrid machine learning technique. ISBAST 2014: 268-273 - [c21]Javad Talebi, Ali Dehghantanha, Ramlan Mahmoud:
Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes. IWCF 2014: 145-162 - [i2]Mohd Anuar Mat Isa, Habibah Hashim, Syed Farid Syed Adnan, Jamalul-lail Ab Manan, Ramlan Mahmod:
A Secure TFTP Protocol with Security Proofs. CoRR abs/1409.0060 (2014) - [i1]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod:
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices. CoRR abs/1409.0065 (2014) - 2013
- [j5]Waleed Halboob, Ali Mamat, Ramlan Mahmod, Muhammad Khurram Khan:
Temporal, Delegable and Cheap Update Access control to published XML Documents. J. Comput. Sci. 9(4): 427-432 (2013) - [j4]Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod:
Trends In Android Malware Detection. J. Digit. Forensics Secur. Law 8(3): 21-40 (2013) - [c20]Mohsen Bafandehkar, Sharifah Md Yasin, Ramlan Mahmod, Zurina Mohd Hanapi:
Comparison of ECC and RSA Algorithm in Resource Constrained Devices. ICITCS 2013: 1-3 - 2012
- [j3]Suriyani Ariffin, Ramlan Mahmod, Azmi Jaafar, Muhammad Rezal Kamel Ariffin:
Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems. Int. J. Nat. Comput. Res. 3(1): 56-72 (2012) - [c19]Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman:
A proposal for improving AES S-box with rotation and key-dependent. CyberSec 2012: 38-42 - [c18]Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha:
Finest authorizing member of common criteria certification. CyberSec 2012: 155-160 - [c17]Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin:
Volatile memory acquisition using backup for forensic investigation. CyberSec 2012: 186-189 - [c16]Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, Solahuddin bin Shamsuddin:
Forensics investigation challenges in cloud computing environments. CyberSec 2012: 190-194 - [c15]Mas Rina Mustaffa, Fatimah Ahmad, Ramlan Mahmod, Shyamala Doraisamy:
Multi-resolution Joint Auto Correlograms: Determining the distance function. CAMP 2012: 198-202 - [c14]M. N. Zawawi, Ramlan Mahmod, Nur Izura Udzir, Fatimah Ahmad, J. M. Desa:
Active warden as the main hindrance for steganography information retrieval. CAMP 2012: 277-280 - [c13]Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman:
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System. TrustCom 2012: 1304-1309 - [e1]Ramlan Mahmod, Rusli Abdullah, Lili Nurliyana Abdullah, Tengku Mohd Tengku Sembok, Alan F. Smeaton, Fabio Crestani, Shyamala Doraisamy, Rabiah Abdul Kadir, Mahamod Ismail:
2012 International Conference on Information Retrieval & Knowledge Management, Kuala Lumpur, Malaysia, March 13-15, 2012. IEEE 2012, ISBN 978-1-4673-1091-8 [contents] - 2011
- [c12]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Towards data centric mobile security. IAS 2011: 62-67 - [c11]Suriyani Ariffin, Ramlan Mahmod, Azmi Jaafar, Muhammad Rezal Kamel Ariffin:
Immune Systems Approaches for Cryptographic Algorithm. BIC-TA 2011: 231-235 - [c10]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems. CISIS 2011: 272-284 - [c9]Zul Hilmi Abdullah, Nur Izura Udzir, Ramlan Mahmod, Khairulmizam Samsudin:
File Integrity Monitor Scheduling Based on File Security Level Classification. ICSECS (2) 2011: 177-189 - 2010
- [j2]Anwar Ali Yahya, Ramlan Mahmod, Abd. Rahman Ramli:
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition. Comput. Speech Lang. 24(2): 190-218 (2010) - [c8]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Towards a Pervasive Formal Privacy Language. AINA Workshops 2010: 1085-1091
2000 – 2009
- 2008
- [c7]Majid Javid Moayed, Abdul Azim Abdul Ghani, Ramlan Mahmod:
A Survey on Cryptography Algorithms in Security of Voting System Approaches. ICCSA Workshops 2008: 190-200 - 2007
- [c6]Mas Rina Mustaffa, Fatimah Ahmad, Rahmita Wirza O. K. Rahmat, Ramlan Mahmod:
An Integrated Color-Spatial Approach for Content-Based Image Retrieval. MSA 2007: 23-29 - 2006
- [c5]Nurazlin Zainal Azmi, Rahmita Wirza O. K. Rahmat, Ramlan Mahmod:
Modeling expressive wrinkle on human face. GRAPHITE 2006: 425-427 - 2005
- [c4]Muhamad Taufik Abdullah, Fatimah Ahmad, Ramlan Mahmod, Tengku M. T. Sembok:
A Stemming Algorithm for Malay Language. CITA 2005: 181-186 - [c3]Mohd Juzaiddin Ab Aziz, Fatimah Dato' Ahmad, Abdul Azim Abdul Ghani, Ramlan Mahmod:
Pola Grammar Technique to Identify Subject and Predicate in Malaysian Language. IJCNLP (companion) 2005 - 2003
- [c2]Muhamad Taufik Abdullah, Fatimah Ahmad, Ramlan Mahmod, Tengku M. T. Sembok:
Application of Latent Semantic Indexing on Malay-English Cross Language Information Retrieval. ICADL 2003: 663-665 - 2002
- [j1]Essam Al-Daoud, Ramlan Mahmod, Mohammad Rushdan, Adem Kiliçman:
A New Addition Formula for Elliptic Curves over GF(2n). IEEE Trans. Computers 51(8): 972-975 (2002) - 2001
- [c1]Moawia Elfaki Yahia, Ramlan Mahmod:
Neural Expert System with Two Engines of Rough Set. AICCSA 2001: 52-58
Coauthor Index
aka: Ali Dehghan Tanha
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint