+6012 7307731 yazid@utm.my

Journal

 

ISI Journal :

  1. Maqsood Mahmud, Muhamad Khuram, Khaled Alghathbar, Abdul Hanan Abdullah, Mohd Yazid Idris (2012). Intrinsic Authentication of Multimedia Objects Using Biometric Data Manipulation, International Arab Journal of Information Technology, Vol. 9, Num. 4, pp. 336-342, ISI Impact Factor = 0.390
  2. Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris (2014). Threat and Vulnerability Penetration Testing: Linux. Journal of Internet Technology. Vol. 3, Num. 15, pp. 333-342. ISI Impact Factor=0.418
  3. Mohd Yazid Bin Idris, Omprakash, Abdul Hafidz Bin Abdul Hanan, Mukesh Prasad,Rajiv Rant Shah (2017). Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs. Digital Communications And Network, Vol. 3 Num. 3, pp. 195-200,
  4. Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah, Fahad Aljaber, Rahmat Budiarto (2017). Cyber-Attack Penetration Test and Vulnerability Analysis. International Journal Of Online Engineering. Vol. 13, Num. 1, pp. 125-132.
  5. Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah (2015). Penetration Testing And Network Auditing: Linux. Journal Of Information Processing Systems. Vol. 11, Num. 1, pp. 104-115.
  6. Wong Lih Fong , Mohd. Yazid Idris, Abdul Hanan Abdullah (2015). Text Localization In Images Using Reverse Thresholds Algorithm. Jurnal Teknologi. Vol. 75, Num. 2, pp. 71-76.

 

SCOPUS Journal :

  1. Maqsood Mahmud, Mohd Yazid Idris, Abdul Hanan Abdullah, AbdulRahman AbdulKarim Mirza, Ihsan Ullah, Naveed Khan (2010). Enhanced Technique For Secure Wireless Sensor Routing With Respect To Energy Conservation. Lecture Notes In Computer Science, Vol. 6485, pp. 376-382.
  2. Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, (2010) The Trends Of Intrusion Prevention System Network. 2nd International Conference On Education Technology And Computer (ICETC 2010), Vol. 4, pp. 217.
  3. Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, (2011). Survey on Heterogeneous Data for Recognizing Threat. Journal of Computational Information Systems, Vol. 7, Num. 12, pp. 4212-4224.
  4. Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, (2011) Research On Heteregeneous Data For Recognizing Threat. Proceedings Of The 6th International Conference On Software And Database Technologies (ICSOFT 2011), Vol. 1, pp. 222-225.
  5. Deris Stiawan, Mohd Yazid Idris, Zohair Ihsan, Khalid Husain., Abdul Hanan Abdullah (2011). Heterogeneous Parameters for Accuracy Threat. Journal of Theoritical and Applied Information Technology, Vol. 33, Num. 2, pp. 142- 154.
  6. Zohair Ihsan, Mohd Yazid Idris, Deris Stiawan, Khalid Husain (2011). Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack. Communications in Computer and Information Science (CCIS), Informatics Engineering and Information Science, Springer Vol. 251, pp 275-289.
  7. Deris Stiawan, Ala’ Yaseen, Mohd Yazid Idris, Kamalrulnizam Abu Bakar, Abdul Hanan Abdullah (2012). Intrusion Prevention System: A Survey. Journal Theoritical and Applied Information Technology. Vol. 40, Num. 1, pp. 44- 54.
  8. Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah (2013). Attack and Vulnerability Penetration Testing: FreeBSD. Telkomnika Telecommunication, Computing, Electronics and Control. Vol. 11, Num. 2, pp. 399-408.
  9. Zohair Ihsan, Mohd Yazid Idris, Abdul Hanan Abdullah (2013). Attribute Normalization Techniques and Performance of Intrusion Classifiers: A Comparative Analysis. Life Science Journal. Vol. 10, Num. 4, pp. 2568-2576.
  10. Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah (2016). Penetration Testing And Mitigation Of Vulnerabilities Windows Server. International Journal Of Network Security Vol. 18, Num 3,pp. 501-513
  11. Lih Fong Wong, Mohd Yazid Idris, Abdul Hanan Abdullah (2015). Text Localization in Images using Thresholds Algorithm. Jurnal Teknologi, Vol 75, Num 2, pp. 71-76
  12. Deris Stiawan, Mohd. Yazid Idris ,Reza Firsandaya Malik, Siti Nurmaini ; Rahmat Budiarto (2016). Anomaly detection and monitoring in Internet of Things communication. Jurnal Teknologi, Vol 76, Num 8-2, pp 50-56.
  13. M. Ridwan Zalbina,Tri Wanda Septian, Deris Stiawan, Mohd. Yazid Idris, Ahmad Heryanto, Rahmat Budiarto (2017). Payload Recognition And Detection Of Cross Site Scripting Attack, 2nd International Conference On Anti-Cyber Crimes (ICACC 2017). pp 172-176.

 

NON INDEXED Journal :

  1. Mohd Yazid Idris, Abdul Hanan Abdullah, and Mohd Aizaini Maarof (2004), Iterative Window Size Estimation on Self-Similarity Measurement for Network Traffic Anomaly Detection, International Journal of Computing and Information Sciences (IJCIS), Canada, Vol. 2 Num. 2, pp. 409-420.
  2. Mohd Yazid Idris, Abdul Hanan Abdullah, and Mohd Aizaini Maarof (2007), Fast Optimization Method: The Window Size and Hurst Estimator on Self-Similar Network Traffic, International Journal of Information and Optimization Science (JIOS), Vol. 28, Num. 3, pp. 83-91.
  3. Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris (2010). The Prevention Threat of Behavior-based Signature using Pitcher Flow Architecture. International Journal of Computer Science & Network Security, 10(4), pp.289-294.
  4. Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris (2010). Classification of Habitual Activities in Behavior-based Network Detection. Journal of Computing, 2(8), pp.1-7.
  5. Deris Stiawan., Abdul Hanan Abdullah, Mohd Yazid Idris (2011). Characterizing Network Intrusion Prevention System. International Journal of Computer Applications, 14(1), pp.11-18.
  6. Deris Stiawan, Mohd Yazid Idris, Md. Sah Hj Salam and Abdul Hanan Abdullah (2012). Intrusion Threat Detection from Insider Attack Using Learning Behavior-Based. International Journal of the Physical Sciences (IJPS). Vol. 7, Num. 4. pp. 624 – 637.
  7. Mohd Yazid Idris (2015). Telkomnika Telecommunication, Computing, Electronics And Control. ATLAS: Adaptive Text Localization Algorithmin High Color Similarity Background. Vol. 3, Num. 13. pp.
  8. Mohd Yazid Idris, Rafiq Ahmad Khan, Junfeng Wang, Muhammad Arif, Siffat Ullah Khan (2015). An Exploratory Study of Communication and Coordination Challenges in Offshore Software Development Outsourcing: Results of Systematic Literature Review and Empirical Study. Science International. Vol. 5, Num. 28. pp. 4819-4836.