Dr. Mohd. Faizal Abdollah
Associate ProfessorUniversity Teknikal Malaysia Melaka, Malaysia
Highest Degree
Ph.D. in Computer Network and Security from Universiti Teknikal Malaysia Melaka, Malaysia
Share this Profile
Biography
Dr. Mohd Faizal Abdollah is currently working as Associate Professor at University Teknikal Malaysia Melaka, Malaysia. He has completed his Ph.D. in Computer and Network Security from same University. His main area of expertise includes Intrusion Detection System, Network security, Malware Detection Analysis, Network Management, and Wireless Security. He has 84 publications in journals contributed as author/co-author.
Area of Interest:
Selected Publications
- Ahmad, N.M., A.H.M. Amin, M.F. Abdollah and R. Yusof, 2015. An empirical investigation of RSSI-based distance estimation for wireless indoor positioning system. Int. J. Wireless Mobile Comput., 8: 206-212.
- Zainuddin, N.B., M.F.B. Abdollah, R.B. Yusof, S.B. Sahib, 2014. A study on abnormal behaviour in mobile application. Open Access Lib. J., Vol. 1. 10.4236/oalib.1101229.
CrossRef | - Ramli, S.N., R. Ahmad and M.F. Abdollah, 2014. Hybrid authentication protocol framework using Wireless Body Area Network (WBAN) for multiple concurrent health monitoring. Int. Rev. Comput. Software, 9: 1971-1976.
- Mas'ud, M.Z., S. Sahib, M.F. Abdollah, S.R. Selamat and R. Yusof, 2014. Android malware detection system classification. Res. J. Inform. Technol., 6: 325-341.
CrossRef | - Mahalingam, S., M.F. Abdollah and S. bin Sahibuddin, 2014. Designing ensemble based security framework for M-learning system. Int. J. Distance Edu. Technol., 12: 66-82.
- Foozy, M., C. Feresa, R. Ahmad and M.F. Abdollah, 2014. A framework for SMS spam and phishing detection in Malay Language: A case study. Int. Rev. Comput. Software, 9: 1248-1254.
Direct Link | - Foozy, C.F.M., R. Ahmad and M.A. Faizal, 2014. A practical rule based technique by splitting SMS phishing from SMS spam for better accuracy in mobile device. Int. Rev. Comput. Software, 9: 1776-1782.
Direct Link | - Ahmad, N.M., A.H.M. Amin, S. Kannan, M.F. Abdollah and R. Yusof, 2014. Detecting access point spoofing attacks using partitioning-based clustering. J. Networks, 9: 3470-3477.
Direct Link | - Abdullah, R.S., N.A. Abu, M.A. Faizal and Z.A.M. Noh, 2014. Understanding the threats of botnets detection: A wide scale survey. Res. J. Inform. Technol. 6: 135-153.
CrossRef | Direct Link | - Abdullah, R.S., M.A. Faizal, M. Noh and Z. Azri, 2014. Enhanced P2P botnets detection framework architecture with hybrid analysis approach. J. Inform. Assur. Security, 9: 62-71.
Direct Link | - Abdullah, R.S., M.A. Faizal and Z.A.M. Noh, 2014. Tracing the P2P botnets behavior hybrid analysis approach. Eur. J. Scient. Res., 118: 75-85.
- Sheila, M., M.A. Faizal and S. Shahrin, 2013. Systematic review on mobile learning research initiatives and implementation. Int. Rev. Comput. Software, 114: 408-422.
- Selamat, S.R., S. Sahib, N. Hafiezah, R. Yusof and M.F. Abdollah, 2013. A forensic tracebility index in digital forensix investigation. J. Inform. Security, 4: 19-32.
CrossRef | Direct Link | - Foozy, C.F.M., R. Ahmad and M.F. Abdollah, 2013. Phishing detection taxonomy for mobile device. Int. J. Comput. Sci. Iss., 10: 338-344.
Direct Link | - Abdullah, R.S., M.F. Abdollah, Z.A.M. Noh, M.Z. Mas'ud, S.R. Selamat, R. Yusof and U.T.M. Melaka, 2013. Revealing the criterion on Botnet detection technique. Int. J. Comput. Sci. Iss., 10: 208-215.
Direct Link | - Abdullah, R.S., M.F. Abdollah, M.A. Faizal, Z.A.M. Noh and Z.A.M. Noh, 2013. Analysis and improvement design on P2P botnets detection framework. Int. Rev. Comput. Software, 8: 2859-2867.
- Mohd, O., N. Suryanna, S.S. Sahibuddin, M.F. Abdollah and S.R. Selamat, 2012. Thresholding and fuzzy rule-based classification approaches in handling mangrove forest mixed pixel problems associated with in quickbird remote sensing image analysis. Int. J. Agric. For., 2: 300-306.
CrossRef | Direct Link | - Faizal, M.A., H.B. Rahmalan, E.H. Rachmawanto and C.A. Sari, 2012. Impact analysis for securing image data using hybrid SLT and DCT. Int. J. Future Comput. Commun., 1: 308-311.
Direct Link | - Bahaman, N., A.S. Prabuwono, M.Z. Mas'ud and M.F. Abdollah, 2012. Effectiveness of security tools to anomalies on tunneled traffic. Inform. Technol. J., 11: 191-199.
CrossRef | Direct Link | - Rafrastara, F.A. and M.A. Faizal, 2011. Advanced virus monitoring and analysis system. Int. J. Comput. Sci. Informat. Security, Vol. 9. .
Direct Link | - Robiah, Y., S.S. Rahayu, S. Shahrin, M.A. Faizal, M.M. Zaki and R. Marliza, 2010. New multi-step worm attack model, J. Comput., 2: 2-8.
Direct Link | - Rahayu, S.S., Y. Robiah, S. Shahrin, M.M. Zaki, M.A. Faizal and Z.A. Zaheera, 2010. Advanced trace pattern for computer intrusion discovery. J. Comput., 2: 200-207.
Direct Link | - Rahayu, S.S., Y. Robiah, S. Shahrin, M.M. Zak, R. Irda and M.A. Faizal, 2010. Scenario based worm trace pattern. Int. J. Comput. Sci. Inf. Secu., 7: 1-9.
Direct Link | - Bahaman, N., M.M. Zaki, E. Hamid, M.F. Abdullah and A.M. Ariff, 2010. Establishment of IPv6 network on intranet environment. Int. J. Network Mobile Technol., 1: 67-73.
Direct Link | - Abdollah, M.F., M.Z. Masud, R. Yusof and S.R. Selamat, 2010. Statistical approach for validating static threshold in fast attack detection. J. Adv. Manuf. Technol., 4: 53-71.
Direct Link | - Robiah, Y., S.S. Rahayu, M.M. Zaki, S. Shahrin, M.A. Faizal and R. Marliza, 2009. A new generic taxonomy on hybrid malware detection technique. Int. J. Comput. Sci. Inform. Secur., 5: 56-61.
Direct Link | - Rahayu, S.S., Y. Robiah, S. Shahrin, M.A. Faizal, M.M. Zaki and R. Irda, 2009. Tracing technique for blaster attack. Int. J. Comput. Sci. Inf. Secu., 4: 1-8.
Direct Link | - Faizal, M.A., M.M. Zaki, S. Shahrin, Y. Robiah, S.S. Rahayu and B. Nazrulazhar, 2009. Threshold verification technique for network intrusion detection system. Int. J. Comput. Sci. Inform. Security, 2: 1-8.
Direct Link | - Yusof, R., S.R. Selamat, S. Sahib and M.F. Abdollah, 2008. Alert correlation technique analysis for diverse log. J. Adv. Manufact. Technol., 2: 65-76.
- Abdollah, M.F., S. Sahib, A.H. Yaacub, M.F.I. Othman and R. Yusof, 2008. Feature selection for detecting fast attack in network intrusion detection. J. Adv. Manufact. Technol., 2: 39-56.
- Abdollah, M. F., A.H. Yaacob, S. Sahib, I. Mohamad and M.F. Iskandar, 2008. Revealing the influence of feature selection for fast attack detection. Int. J. Comput. Sci. Network Security, 8: 107-115.