{"id":84,"date":"2019-02-13T02:15:49","date_gmt":"2019-02-13T02:15:49","guid":{"rendered":"https:\/\/people.utm.my\/myazid\/?page_id=84"},"modified":"2019-02-13T07:37:31","modified_gmt":"2019-02-13T07:37:31","slug":"conference-proceedings","status":"publish","type":"page","link":"https:\/\/people.utm.my\/myazid\/publication\/conference-proceedings\/","title":{"rendered":"Conference Proceedings"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.0.48&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.17.6&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]<\/p>\n<p><strong>Conference and Proceeding<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cFile Access Permission Change Detection Using Immunological Negative Selection Approach&#8221;, Proceeding of the International Arab Conference on Information Technology 2002, Doha, Qatar, Dec 16-19th 2002.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cAn Iterative Estimation of Data Window Size for Anomaly Detection using Self-Similar Feature in Network Traffic\u201d, Proceeding of the Conference on Telematics System, Services and Applications. ITB Bandung, Indonesia, Mei 15th 2004.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cNormal and Anomalous Network Traffic Modeling: A Synthetic Data Generator Tool\u201d, Brunei International Conference on Engineering and Technology\u00a0 (BICET),\u00a0 Brunei Darussalam, August 15-18 th 2005.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cSelf-Boundary Analyzing Method in Self-Similar Network Traffic for Anomaly Detection\u201d, International Symposium on Bio-Inspired Computing\u00a0 (BIC\u201905),\u00a0 Johor Bahru, Sept. 5-7 th 2005.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"5\">\n<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cNetwork Anomaly Detection on Self-Similar Network Traffic Using the Optimization and Sliding Window Methods\u201d, International Conference on Intelligent System (ICIS2005), Kuala Lumpur, Dec. 1-3 rd 2005.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"6\">\n<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cQoS Anomaly Detector based on Self-Similar Network Traffic \u201d, 4th International Workshop on Frontiers of Information Technology\u00a0 (FIT \u201806), COMSAT Islamabad, Dec. 20-21 th 2006.\u00a0 (Invited Speaker)<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"7\">\n<li>Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris , \u201cResearch on Heteregeneous Data for Recognizing Threat\u201d. International Conference on Software &amp; Data Technologies (ICSOFT), Spain.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"8\">\n<li>Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris,\u201cPitcher Flow: Unified Integration for Intrusion Prevention System\u201d, International Conference on Computer Communication and Management \u2013 ICCCM 2011, Sydney, May 2-4 2011, pp. 368-373.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"9\">\n<li>Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris , \u201cThe Trends of Intrusion Prevention System Network\u201d, ICETC 2010 Shanghai China, 4(C), pp.217-221<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"10\">\n<li>Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris, \u201cReliability Measurement of Internet Services\u201d. 1st International Conference on Green Computing and The Second AUN\/SEED-Net Regional Conference on ICT,pp. 225-229.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"11\">\n<li>Yazid Idris, Deris Stiawan, Nik Mohd Habibullah, Abdul Hadi Fikri, Mohd Rozaini Abd Rahim, Massolehin Dasuki, \u201cIoT Smart Device for e-Learning Content Sharing onHybrid Cloud Environment\u201d, 4th International Conference On Electrical Engineering, Computer Science And Informatics, Jogjakarta, September 19-21 2017, pp. 25-29.<\/li>\n<\/ol>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conference and Proceeding &nbsp; Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cFile Access Permission Change Detection Using Immunological Negative Selection Approach&#8221;, Proceeding of the International Arab Conference on Information Technology 2002, Doha, Qatar, Dec 16-19th 2002. &nbsp; Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cAn Iterative Estimation of Data Window Size for Anomaly Detection using Self-Similar Feature [&hellip;]<\/p>\n","protected":false},"author":560,"featured_media":0,"parent":80,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<ol>\r\n \t<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cFile Access Permission Change Detection Using Immunological Negative Selection Approach\", Proceeding of the International Arab Conference on Information Technology 2002, Doha, Qatar, Dec 16-19th 2002.<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"2\">\r\n \t<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cAn Iterative Estimation of Data Window Size for Anomaly Detection using Self-Similar Feature in Network Traffic\u201d, Proceeding of the Conference on Telematics System, Services and Applications. ITB Bandung, Indonesia, Mei 15th 2004.<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"3\">\r\n \t<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cNormal and Anomalous Network Traffic Modeling: A Synthetic Data Generator Tool\u201d, Brunei International Conference on Engineering and Technology\u00a0 (BICET),\u00a0 Brunei Darussalam, August 15-18 th 2005.<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"4\">\r\n \t<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cSelf-Boundary Analyzing Method in Self-Similar Network Traffic for Anomaly Detection\u201d, International Symposium on Bio-Inspired Computing\u00a0 (BIC\u201905),\u00a0 Johor Bahru, Sept. 5-7 th 2005.<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"5\">\r\n \t<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cNetwork Anomaly Detection on Self-Similar Network Traffic Using the Optimization and Sliding Window Methods\u201d, International Conference on Intelligent System (ICIS2005), Kuala Lumpur, Dec. 1-3 rd 2005.<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"6\">\r\n \t<li>Mohd Yazid, Abdul Hanan, Mohd Aizaini, \u201cQoS Anomaly Detector based on Self-Similar Network Traffic \u201d, 4th International Workshop on Frontiers of Information Technology\u00a0 (FIT \u201806), COMSAT Islamabad, Dec. 20-21 th 2006.\u00a0 (Invited Speaker)<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"7\">\r\n \t<li>Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris , \u201cResearch on Heteregeneous Data for Recognizing Threat\u201d. International Conference on Software &amp; Data Technologies (ICSOFT), Spain.<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"8\">\r\n \t<li>Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris,\u201cPitcher Flow: Unified Integration for Intrusion Prevention System\u201d, International Conference on Computer Communication and Management \u2013 ICCCM 2011, Sydney, May 2-4 2011, pp. 368-373.<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"9\">\r\n \t<li>Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris , \u201cThe Trends of Intrusion Prevention System Network\u201d, ICETC 2010 Shanghai China, 4(C), pp.217-221<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"10\">\r\n \t<li>Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris, \u201cReliability Measurement of Internet Services\u201d. 1st International Conference on Green Computing and The Second AUN\/SEED-Net Regional Conference on ICT,pp. 225-229.<\/li>\r\n<\/ol>\r\n&nbsp;\r\n<ol start=\"11\">\r\n \t<li>Yazid Idris, Deris Stiawan, Nik Mohd Habibullah, Abdul Hadi Fikri, Mohd Rozaini Abd Rahim, Massolehin Dasuki, \u201cIoT Smart Device for e-Learning Content Sharing onHybrid Cloud Environment\u201d, 4th International Conference On Electrical Engineering, Computer Science And Informatics, Jogjakarta, September 19-21 2017, pp. 25-29.<\/li>\r\n<\/ol>","_et_gb_content_width":"","footnotes":""},"class_list":["post-84","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/myazid\/wp-json\/wp\/v2\/pages\/84","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/myazid\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.utm.my\/myazid\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/myazid\/wp-json\/wp\/v2\/users\/560"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/myazid\/wp-json\/wp\/v2\/comments?post=84"}],"version-history":[{"count":0,"href":"https:\/\/people.utm.my\/myazid\/wp-json\/wp\/v2\/pages\/84\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/people.utm.my\/myazid\/wp-json\/wp\/v2\/pages\/80"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/myazid\/wp-json\/wp\/v2\/media?parent=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}