
Warusia Mohamed- PhD
- Senior Lecturer at Technical University of Malaysia Malacca
Warusia Mohamed
- PhD
- Senior Lecturer at Technical University of Malaysia Malacca
Deepfake, Railway Cyber Security, Penetration Testing, Risk Management, Biometrics, IoT Cyber Security, Malware Analysis
About
56
Publications
53,787
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,034
Citations
Introduction
My research interests cover a fascinating and crucial area of computing security, Intrusion detection, malware analysis, and risk management are vital for protecting systems from threats. Machine learning and deep learning can enhance these processes by identifying patterns and predicting potential attacks. Deepfakes present unique challenges in security, and biometrics offer innovative ways to verify identities.
Current institution
Additional affiliations
Education
July 2011 - December 2014
July 2009 - February 2012
July 2006 - December 2008
Publications
Publications (56)
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect to the network using IPv6. This study fo...
The increasing prevalence of malware poses significant risks, including data loss and unauthorized access. These threats manifest in various forms, such as viruses, Trojans, worms, and ransomware. Each continually evolves to exploit system vulnerabilities. Ransomware has seen a particularly rapid increase, as evidenced by the devastating WannaCry a...
Intelligent vehicles rely on accurate perception systems for safe navigation under challenging environmental conditions. However, adverse weather phenomena such as haze and fog significantly degrade the quality of visual input captured by onboard cameras. In this study, we propose a novel deep-learning algorithm specifically utilizes an advanced co...
This chapter investigates the domain of unsupervised learning algorithms, delivering a detailed outline of its classifications and essential characteristics. Each algorithm is examined, assessing its appropriateness for different types of data. A systematic assessment is conducted with each algorithm and is checked using datasets that complement it...
Ransomware attacks are currently one of cybersecurity's greatest and most alluring threats. Antivirus software is frequently ineffective against zero-day malware and ransomware attacks; consequently, significant network infections could result in substantial data loss. Such attacks are also becoming more dynamic and capable of altering their signat...
Deepfakes have fascinated enormous attention in recent times ascribable to the consequences of threats in video manipulation. Consequently, such manipulation via intelligent algorithm contributes to more crucial circumstances as electronic media integrity become a challenging concern. Furthermore, such unauthentic content is being composed and outs...
This paper provides a comprehensive examination of ransomware behavior on Windows endpoints, exploring the intrusion mechanisms, proliferation methods, and the mitigating strategies that can be employed. It provides a comparative analysis of several ransomware families and their effects on Windows systems, culminating with suggestions for future re...
The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6...
Teaching lower school mathematic could be easy for everyone. For teaching in the situation that cannot speak, using sign language is the answer especially someone that have infected with vocal cord infection or critical spasmodic dysphonia or maybe disable people. However, the situation could be difficult, when the sign language is not understandab...
In this digital era, protecting an organisation's sensitive information system assets against cyberattacks is challenging. Globally, organisations spend heavily on information security (InfoSec) technological countermeasures. Public and private sectors often fail to secure their information assets because they depend primarily on technical solution...
Business in cloud computing is very popular among Small and Medium Enterprises (SMEs). By leveraging services from the cloud, such companies can migrate all of their in-house operations to cloud at low costs with minimum IT facility requirements such as desktop machines and the Internet. Even though the cloud promises tremendous advantages in terms...
Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber community due to several successful worldwide attacks. The encryption employed had caused irreversible damage to the victim’s digital files, even when the victim chose to pay the ransom. As...
Information security (IS) violations have a negative impact at both organisational and individual levels. Information security awareness (ISA) therefore plays a positive role in ensuring employees adhere to an organisation's security policies. The challenges that arise in protecting the information infrastructure in the Omani public sector are incr...
Computer and network threats are serious issues that are becoming prevalent in our daily life. IDS meanwhile, is a mechanism as countermeasure for network threats. Many studies were conducted to improve the capability of an IDS. However, there is a lack of analysis about the IDS architecture. The objective of this paper is to analyze the issues and...
Insider threat has become a widely accepted issue and one of the major challenges in cybersecurity. This phenomenon indicates that threats require special detection systems, methods, and tools, which entail the ability to facilitate accurate and fast detection of a malicious insider. Several studies on insider threat detection and related areas in...
Awareness plays an important role in the field of information security (IS) due to its positive impact on staff adherence to security policies. With the development and increase in cases of information piracy and phishing attempts, the challenges inherent in protecting the information infrastructure of Omani public sector institutions are drastical...
Insider threat is a significant challenge in cybersecurity. In comparison with
outside attackers, inside attackers have more privileges and legitimate access
to information and facilities that can cause considerable damage to an
organization. Most organizations that implement traditional cybersecurity
techniques, such as intrusion detection systems...
Ransomware has becoming a current trend of cyberattack where its reputation among malware that cause a massive amount recovery in terms of cost and time for ransomware victims. Previous studies and solutions have showed that when it comes to malware detection, malware behavior need to be prioritized and analyzed in order to recognize malware attack...
Ransomware has becoming a current trend of cyberattack where its reputation among malware that cause a massive amount recovery in terms of cost and time for ransomware victims. Previous studies and solutions have showed that when it comes to malware detection, malware behavior need to be prioritized and analyzed in order to recognize malware attack...
Information exchange is a key aspect of using technology in everyday life. Crimes associated with the lack of information security awareness (ISA), misuse and carelessness are on the increase and often result in heavy losses and serious consequences. In order for ISA campaigns and programmes to be effective, the most successful and influential fact...
Awareness plays an important role in the field of information security (IS) due to its positive impact on staff adherence to security policies. With the development and increase in cases of information piracy and phishing attempts, the challenges inherent in protecting the information infrastructure of Omani public sector institutions are drastical...
An intrusion detection system (IDS) is used to detect numerous kinds of malware attacks, and many classification methods have been introduced by the researcher to detect malware behavior. However, even though various classification method has been proposed, the detection of malware behavior remains a challenging task as the detection method focusin...
Numerous researchers have discovered multiple types of ransomware that has been rampaging in cybersecurity which is the main concern for business companies where most of their data has been digitalized. However, the main problem in detecting this type of malware, where it is known as sophisticated behavior is quite challenging since it capable to d...
Numerous researchers have discovered multiple types of ransomware that has been rampaging in cybersecurity which is the main concern for business companies where most of their data has been digitalized. However, the main problem in detecting this type of malware, where it is known as sophisticated behavior is quite challenging since it capable to d...
Insider threats become one of the most dangerous threats in the cyber world as compared to outsider as the insiders have knowledge of assets. In addition, the threats itself considered invisible and no one can predict what, when and how exactly the threat launched. Based on conducting literature, threat in Automated Manufacturing Execution Systems...
Malware is considered as one of most emerging threats due to Cybercriminals work diligently to make most of the part of the users’ network of computers as their target. A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the ru...
Anomaly Intrusion Detection Systems (ADSs) identify patterns of network data behaviour to determine whether they are normal or represent an attack using the learning detection model. Much research has been conducted on enhancing ADSs particularly in the area of data mining that focuses on intrusive behaviour detection. Unfortunately, the current de...
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi-layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning sy...
The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry. The malicious software which is specifically designed to disrupt, damage, or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still i...
The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry. The malicious software which is specifically designed to disrupt, damage, or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still i...
Insider threat represents one of the greatest challenges in the cyber security world. Insider attackers have more privileged and legitimate access to the information and facilities, compared to the outsider attackers. In fact, insider attacker has more accessibilities and higher potential to bring huge damage to the organization. However, the behav...
Cyber-Physical Systems refer to systems that have an interaction between computers, communication channels and physical devices to solve a real-world problem. Towards industry 4.0 revolution, Cyber-Physical Systems currently become one of the main targets of hackers and any damage to them lead to high losses to a nation. According to valid resource...
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi-layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning sy...
Data Mining algorithm which is applied as an anomaly detection system has been considered as one of the essential techniques in malicious behaviour detection. Unfortunately, such detection system is known for its inclination in detecting a cyber-malicious activity more accurately (i.e. maximizing malicious and non-malicious behaviours detection) an...
Intrusion detection systems (IDS) effectively complement other security mechanisms by detecting malicious activities on a computer or network, and their development is evolving at an extraordinary rate. The anomaly-based IDS, which uses learning algorithms, allows detection of unknown attacks. Unfortunately, the major challenge of this approach is...
As the influence of Internet and networking technologies as communication medium advance and expand across the globe, cyber attacks also grow accordingly. Anomaly detection systems (ADSs) are employed to scrutinize information such as packet behaviours coming from various locations on network to find those intrusive activities as fast as possible w...
Intrusion detection is considered as one of the foremost research areas in network security, the challenge is to recognize unusual access that could lead to compromising the interconnected nodes. Anomaly-based intrusion detection system, that utilizes machine learning techniques such as single classifier and hybrid classifier have the capability to...
In recent times, Intrusion Detection systems (IDSs) incarnate the high network security. Anomaly-based intrusion detection techniques, that utilize algorithms of machine learning, have the capability to recognize unpredicted malicious. Unluckily, an essential provocation of this method is to maximize accuracy, detection whereas minimize false alarm...
Due to the widespread use of Internet and communication networks, a reliable and secure network plays a crucial role for Information Technology (IT) service providers and users. The hardness of network attacks as well as their complexities has also increased lately. The anomaly-based Intrusion Detection Systems (IDS) are able to detect unknown atta...
The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modelling various statistical-based anomaly detection methods lately. Theoretically, the statistical-based anomaly detection method fascinates researcher’s attentiveness, but technologically, the fewer intrusion detection rates persist as vulnerable disput...
Intrusion Detection System (IDS) is one of the key security components in today's networking environment. A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to...
Intrusion Detection System (IDS) have become increasingly popular over the past years as an important network security technology to detect cyber attacks in a wide variety of network communication. IDS monitors' network or host system activities by collecting network information, and analyze this information for malicious activities. Cloud computin...
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected network. Many machine learning methods have also been introduced by researcher recently to obtain high accuracy and detection rate. Unfortunately, a potential drawback of all those methods is the rate of false alarm. However, our proposed approach shows be...
Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting malicious activities for a couple of years. Anomaly detection is one of intrusion detection system. Current anomaly detection is often associated with high false alarm with moderate accuracy and detection rates when it's unable to detect all types of att...
Intrusion Detection Systems (IDS) have become an important building block of any sound defense network infrastructure. Malicious attacks have brought more adverse impacts on the networks than before, increasing the need for an effective approach to detect and identify such attacks more effectively. In this study two learning approaches, K-Means Clu...