<?xml version="1.0"?>
<dblpperson name="Ramlan Mahmod" pid="80/4080" n="49">
<person key="homepages/80/4080" mdate="2013-04-24">
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="80/4080">Ramlan Mahmoud</author>
</person>
<r><article key="journals/ijcnis/JegedeUAM17" mdate="2021-02-16">
<author pid="177/2917">Abayomi Jegede</author>
<author pid="47/3573">Nur Izura Udzir</author>
<author pid="29/5266">Azizol Abdullah</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>State of the Art in Biometric Key Binding and Key Generation Schemes.</title>
<year>2017</year>
<volume>9</volume>
<journal>Int. J. Commun. Networks Inf. Secur.</journal>
<number>3</number>
<ee type="oa">http://www.ijcnis.org/index.php/ijcnis/article/view/2388</ee>
<url>db/journals/ijcnis/ijcnis9.html#JegedeUAM17</url>
</article>
</r>
<r><incollection key="books/el/17/YusoffDM17" mdate="2023-09-30">
<author orcid="0000-0002-1410-0315" pid="94/10128">Mohd Najwadi Yusoff</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<title>Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies.</title>
<pages>41-62</pages>
<year>2017</year>
<booktitle>Contemporary Digital Forensic Investigations of Cloud and Mobile Applications</booktitle>
<ee>https://doi.org/10.1016/b978-0-12-805303-4.00004-6</ee>
<crossref>books/el/17/CD2017</crossref>
<url>db/books/collections/CD2017.html#YusoffDM17</url>
</incollection>
</r>
<r><incollection key="books/el/17/YusoffDM17a" mdate="2023-09-30">
<author orcid="0000-0002-1410-0315" pid="94/10128">Mohd Najwadi Yusoff</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<title>Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies.</title>
<pages>63-78</pages>
<year>2017</year>
<booktitle>Contemporary Digital Forensic Investigations of Cloud and Mobile Applications</booktitle>
<ee>https://doi.org/10.1016/b978-0-12-805303-4.00005-8</ee>
<crossref>books/el/17/CD2017</crossref>
<url>db/books/collections/CD2017.html#YusoffDM17a</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/corr/YusoffDM17" mdate="2018-08-13">
<author pid="94/10128">Mohd Najwadi Yusoff</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies.</title>
<year>2017</year>
<volume>abs/1706.08056</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1706.08056</ee>
<url>db/journals/corr/corr1706.html#YusoffDM17</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/YusoffDM17a" mdate="2018-08-13">
<author pid="94/10128">Mohd Najwadi Yusoff</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies.</title>
<year>2017</year>
<volume>abs/1706.08062</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1706.08062</ee>
<url>db/journals/corr/corr1706.html#YusoffDM17a</url>
</article>
</r>
<r><article key="journals/jcsci/BafandehkarYM16" mdate="2020-04-25">
<author pid="191/1938">Mohsen Bafandehkar</author>
<author pid="191/2022">Sharifah Md Yasin</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Optimizing {0, 1, 3}-NAF Recoding Algorithm Using Block-Method Technique in Elliptic Curve Cryptosystem.</title>
<pages>534-544</pages>
<year>2016</year>
<volume>12</volume>
<journal>J. Comput. Sci.</journal>
<number>11</number>
<ee>https://doi.org/10.3844/jcssp.2016.534.544</ee>
<url>db/journals/jcsci/jcsci12.html#BafandehkarYM16</url>
</article>
</r>
<r><inproceedings key="conf/icuimc/JegedeUAM16" mdate="2021-10-14">
<author pid="177/2917">Abayomi Jegede</author>
<author orcid="0000-0002-0543-3329" pid="47/3573">Nur Izura Udzir</author>
<author orcid="0000-0001-8321-9259" pid="29/5266">Azizol Abdullah</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>A Hybrid Scheme for Face Template Protection.</title>
<pages>6:1-6:7</pages>
<year>2016</year>
<booktitle>IMCOM</booktitle>
<ee>https://doi.org/10.1145/2857546.2857553</ee>
<crossref>conf/icuimc/2016</crossref>
<url>db/conf/icuimc/imcom2016.html#JegedeUAM16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisa/JegedeUAM16" mdate="2023-09-30">
<author pid="177/2917">Abayomi Jegede</author>
<author pid="47/3573">Nur Izura Udzir</author>
<author orcid="0000-0001-8321-9259" pid="29/5266">Azizol Abdullah</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<title>A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation.</title>
<pages>341-352</pages>
<year>2016</year>
<booktitle>WISA</booktitle>
<ee>https://doi.org/10.1007/978-3-319-56549-1_29</ee>
<crossref>conf/wisa/2016</crossref>
<url>db/conf/wisa/wisa2016.html#JegedeUAM16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/IsaMUMT16" mdate="2018-08-13">
<author pid="118/8782">Mohd Anuar Mat Isa</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="47/3573">Nur Izura Udzir</author>
<author pid="13/8144">Jamalul-lail Ab Manan</author>
<author pid="54/8100">Ali Dehghan Tanha</author>
<title>A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.</title>
<year>2016</year>
<volume>abs/1604.00980</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1604.00980</ee>
<url>db/journals/corr/corr1604.html#IsaMUMT16</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/IsaMUMJT16" mdate="2018-08-13">
<author orcid="0000-0003-1231-8748" pid="118/8782">Mohd Anuar Mat Isa</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="47/3573">Nur Izura Udzir</author>
<author pid="13/8144">Jamalul-lail Ab Manan</author>
<author pid="j/AudunJosang">Audun J&#248;sang</author>
<author pid="54/8100">Ali Dehghan Tanha</author>
<title>A Formal Calculus for International Relations Computation and Evaluation.</title>
<year>2016</year>
<volume>abs/1606.02239</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1606.02239</ee>
<url>db/journals/corr/corr1606.html#IsaMUMJT16</url>
</article>
</r>
<r><inproceedings key="conf/fnc/HalboobMUA15" mdate="2023-09-30">
<author pid="127/2407">Waleed Halboob</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<author orcid="0000-0002-0543-3329" pid="47/3573">Nur Izura Udzir</author>
<author pid="84/9673">Mohd Taufik Abdullah</author>
<title>Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation.</title>
<pages>370-375</pages>
<year>2015</year>
<booktitle>FNC/MobiSPC</booktitle>
<ee type="oa">https://doi.org/10.1016/j.procs.2015.07.222</ee>
<crossref>conf/fnc/2015</crossref>
<url>db/conf/fnc/fnc2015.html#HalboobMUA15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itng/HalboobMAAS15" mdate="2023-09-30">
<author pid="127/2407">Waleed Halboob</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<author orcid="0000-0003-3387-4743" pid="42/904">Muhammad Abulaish</author>
<author orcid="0000-0002-2437-4870" pid="04/7436">Haider Abbas</author>
<author orcid="0000-0001-8062-3301" pid="30/7605">Kashif Saleem</author>
<title>Data Warehousing Based Computer Forensics Investigation Framework.</title>
<pages>163-168</pages>
<year>2015</year>
<booktitle>ITNG</booktitle>
<ee>https://doi.org/10.1109/ITNG.2015.31</ee>
<ee>https://www.wikidata.org/entity/Q58826738</ee>
<crossref>conf/itng/2015</crossref>
<url>db/conf/itng/itng2015.html#HalboobMAAS15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/Al-WattarMZU15" mdate="2018-08-13">
<author pid="159/1764">Auday H. Al-Wattar</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="75/6599">Zuriati Ahmad Zukarnain</author>
<author pid="47/3573">Nur Izura Udzir</author>
<title>A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation.</title>
<year>2015</year>
<volume>abs/1502.03544</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1502.03544</ee>
<url>db/journals/corr/corr1502.html#Al-WattarMZU15</url>
</article>
</r>
<r><article key="journals/jcm/AzizUM14" mdate="2020-07-14">
<author pid="152/0123">NorazahAbd Aziz</author>
<author orcid="0000-0002-0543-3329" pid="47/3573">Nur Izura Udzir</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Extending TLS with Mutual Attestation for Platform Integrity Assurance.</title>
<pages>63-72</pages>
<year>2014</year>
<volume>9</volume>
<journal>J. Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.12720/jcm.9.1.63-72</ee>
<url>db/journals/jcm/jcm9.html#AzizUM14</url>
</article>
</r>
<r><article key="journals/jcsci/BaratiAUBMM14" mdate="2021-10-14">
<author pid="157/5257">Mehdi Barati</author>
<author orcid="0000-0001-8321-9259" pid="29/5266">Azizol Abdullah</author>
<author pid="47/3573">Nur Izura Udzir</author>
<author pid="203/6861">Mostafa Behzadi</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="82/2144">Norwati Mustapha</author>
<title>Intrusion Detection System in Secure Shell Traffic in Cloud Environment.</title>
<pages>2029-2036</pages>
<year>2014</year>
<volume>10</volume>
<journal>J. Comput. Sci.</journal>
<number>10</number>
<ee>https://doi.org/10.3844/jcssp.2014.2029.2036</ee>
<url>db/journals/jcsci/jcsci10.html#BaratiAUBMM14</url>
</article>
</r>
<r><inproceedings key="conf/cybersec/YusoffMDA14" mdate="2023-09-30">
<author orcid="0000-0002-1410-0315" pid="94/10128">Mohd Najwadi Yusoff</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author pid="84/9673">Mohd Taufik Abdullah</author>
<title>An approach for forensic investigation in Firefox OS.</title>
<pages>22-26</pages>
<year>2014</year>
<booktitle>CyberSec</booktitle>
<ee>https://doi.org/10.1109/CyberSec.2014.6913966</ee>
<crossref>conf/cybersec/2014</crossref>
<url>db/conf/cybersec/cybersec2014.html#YusoffMDA14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cybersec/YusoffMAD14" mdate="2023-09-30">
<author orcid="0000-0002-1410-0315" pid="94/10128">Mohd Najwadi Yusoff</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<author pid="84/9673">Mohd Taufik Abdullah</author>
<author pid="54/8100">Ali Dehghantanha</author>
<title>Mobile forensic data acquisition in Firefox OS.</title>
<pages>27-31</pages>
<year>2014</year>
<booktitle>CyberSec</booktitle>
<ee>https://doi.org/10.1109/CyberSec.2014.6913967</ee>
<crossref>conf/cybersec/2014</crossref>
<url>db/conf/cybersec/cybersec2014.html#YusoffMAD14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsce/IsaHMAM14" mdate="2023-09-30">
<author orcid="0000-0003-1231-8748" pid="118/8782">Mohd Anuar Mat Isa</author>
<author pid="36/10472">Habibah Hashim</author>
<author pid="13/8144">Jamalul-lail Ab Manan</author>
<author pid="151/6500">Syed Farid Syed Adnan</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<title>RF simulator for cryptographic protocol.</title>
<pages>518-523</pages>
<year>2014</year>
<booktitle>ICCSCE</booktitle>
<ee>https://doi.org/10.1109/ICCSCE.2014.7072773</ee>
<crossref>conf/iccsce/2014</crossref>
<url>db/conf/iccsce/iccsce2014.html#IsaHMAM14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isbast/HalboobMM14" mdate="2017-05-23">
<author pid="127/2407">Waleed Halboob</author>
<author pid="19/628">Ali Mamat</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Push-based XML access control policy languages: A review.</title>
<pages>182-187</pages>
<year>2014</year>
<booktitle>ISBAST</booktitle>
<ee>https://doi.org/10.1109/ISBAST.2014.7013118</ee>
<crossref>conf/isbast/2014</crossref>
<url>db/conf/isbast/isbast2014.html#HalboobMM14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isbast/BaratiAUMM14" mdate="2021-10-14">
<author pid="157/5257">Mehdi Barati</author>
<author orcid="0000-0001-8321-9259" pid="29/5266">Azizol Abdullah</author>
<author orcid="0000-0002-0543-3329" pid="47/3573">Nur Izura Udzir</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="82/2144">Norwati Mustapha</author>
<title>Distributed Denial of Service detection using hybrid machine learning technique.</title>
<pages>268-273</pages>
<year>2014</year>
<booktitle>ISBAST</booktitle>
<ee>https://doi.org/10.1109/ISBAST.2014.7013133</ee>
<crossref>conf/isbast/2014</crossref>
<url>db/conf/isbast/isbast2014.html#BaratiAUMM14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iwcf/TalebiDM14" mdate="2017-05-26">
<author pid="166/0144">Javad Talebi</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author pid="80/4080">Ramlan Mahmoud</author>
<title>Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes.</title>
<pages>145-162</pages>
<year>2014</year>
<booktitle>IWCF</booktitle>
<ee>https://doi.org/10.1007/978-3-319-20125-2_13</ee>
<crossref>conf/iwcf/2014</crossref>
<url>db/conf/iwcf/iwcf2014.html#TalebiDM14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/IsaHAMM14" mdate="2018-08-13">
<author pid="118/8782">Mohd Anuar Mat Isa</author>
<author pid="36/10472">Habibah Hashim</author>
<author pid="151/6500">Syed Farid Syed Adnan</author>
<author pid="13/8144">Jamalul-lail Ab Manan</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>A Secure TFTP Protocol with Security Proofs.</title>
<year>2014</year>
<volume>abs/1409.0060</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1409.0060</ee>
<url>db/journals/corr/corr1409.html#IsaHAMM14</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/IsaHMAM14" mdate="2018-08-13">
<author pid="118/8782">Mohd Anuar Mat Isa</author>
<author pid="36/10472">Habibah Hashim</author>
<author pid="13/8144">Jamalul-lail Ab Manan</author>
<author pid="151/6500">Syed Farid Syed Adnan</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices.</title>
<year>2014</year>
<volume>abs/1409.0065</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1409.0065</ee>
<url>db/journals/corr/corr1409.html#IsaHMAM14</url>
</article>
</r>
<r><article key="journals/jcsci/HalboobMMK13" mdate="2023-09-30">
<author pid="127/2407">Waleed Halboob</author>
<author pid="19/628">Ali Mamat</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author orcid="0000-0001-6636-0533" pid="69/821">Muhammad Khurram Khan</author>
<title>Temporal, Delegable and Cheap Update Access control to published XML Documents.</title>
<pages>427-432</pages>
<year>2013</year>
<volume>9</volume>
<journal>J. Comput. Sci.</journal>
<number>4</number>
<ee>https://doi.org/10.3844/jcssp.2013.427.432</ee>
<url>db/journals/jcsci/jcsci9.html#HalboobMMK13</url>
</article>
</r>
<r><article key="journals/jdfsl/ShaerpourDM13" mdate="2023-08-28">
<author pid="149/0319">Kaveh Shaerpour</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Trends In Android Malware Detection.</title>
<pages>21-40</pages>
<year>2013</year>
<volume>8</volume>
<journal>J. Digit. Forensics Secur. Law</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.15394/jdfsl.2013.1149</ee>
<ee>https://www.wikidata.org/entity/Q114962629</ee>
<url>db/journals/jdfsl/jdfsl8.html#ShaerpourDM13</url>
</article>
</r>
<r><inproceedings key="conf/icitcs/BafandehkarYMH13" mdate="2023-09-30">
<author pid="191/1938">Mohsen Bafandehkar</author>
<author pid="191/2022">Sharifah Md Yasin</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<author orcid="0000-0002-8079-1791" pid="145/5454">Zurina Mohd Hanapi</author>
<title>Comparison of ECC and RSA Algorithm in Resource Constrained Devices.</title>
<pages>1-3</pages>
<year>2013</year>
<booktitle>ICITCS</booktitle>
<ee>https://doi.org/10.1109/ICITCS.2013.6717816</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICITCS.2013.6717816</ee>
<crossref>conf/icitcs/2013</crossref>
<url>db/conf/icitcs/icitcs2013.html#BafandehkarYMH13</url>
</inproceedings>
</r>
<r><article key="journals/ijncr/AriffinMJA12" mdate="2023-10-22">
<author pid="06/10436">Suriyani Ariffin</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="65/10128">Azmi Jaafar</author>
<author pid="88/8910">Muhammad Rezal Kamel Ariffin</author>
<title>Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems.</title>
<pages>56-72</pages>
<year>2012</year>
<volume>3</volume>
<journal>Int. J. Nat. Comput. Res.</journal>
<number>1</number>
<ee>https://doi.org/10.4018/jncr.2012010105</ee>
<ee>https://www.wikidata.org/entity/Q122997862</ee>
<url>db/journals/ijncr/ijncr3.html#AriffinMJA12</url>
</article>
</r>
<r><inproceedings key="conf/cybersec/JuremiMS12" mdate="2017-05-24">
<author pid="118/8814">Julia Juremi</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="118/8851">Salasiah Sulaiman</author>
<title>A proposal for improving AES S-box with rotation and key-dependent.</title>
<pages>38-42</pages>
<year>2012</year>
<booktitle>CyberSec</booktitle>
<ee>https://doi.org/10.1109/CyberSec.2012.6246172</ee>
<crossref>conf/cybersec/2012</crossref>
<url>db/conf/cybersec/cybersec2012.html#JuremiMS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cybersec/IsaMMHSUD12" mdate="2017-06-15">
<author orcid="0000-0003-1231-8748" pid="118/8782">Mohd Anuar Mat Isa</author>
<author orcid="0000-0003-0871-4107" pid="13/8144">Jamalul-lail Ab Manan</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="36/10472">Habibah Hashim</author>
<author pid="26/7506">Mar Yah Said</author>
<author pid="47/3573">Nur Izura Udzir</author>
<author pid="54/8100">Ali Dehghantanha</author>
<title>Finest authorizing member of common criteria certification.</title>
<pages>155-160</pages>
<year>2012</year>
<booktitle>CyberSec</booktitle>
<ee>https://doi.org/10.1109/CyberSec.2012.6246109</ee>
<crossref>conf/cybersec/2012</crossref>
<url>db/conf/cybersec/cybersec2012.html#IsaMMHSUD12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cybersec/DezfouliDMSS12" mdate="2017-05-24">
<author pid="118/8768">Farhood Norouzizadeh Dezfouli</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author pid="80/4080">Ramlan Mahmoud</author>
<author pid="50/11475">Nor Fazlida Binti Mohd Sani</author>
<author pid="118/8830">Solahuddin bin Shamsuddin</author>
<title>Volatile memory acquisition using backup for forensic investigation.</title>
<pages>186-189</pages>
<year>2012</year>
<booktitle>CyberSec</booktitle>
<ee>https://doi.org/10.1109/CyberSec.2012.6246108</ee>
<crossref>conf/cybersec/2012</crossref>
<url>db/conf/cybersec/cybersec2012.html#DezfouliDMSS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cybersec/DamshenasDMS12" mdate="2017-05-24">
<author pid="118/8846">Mohsen Damshenas</author>
<author pid="54/8100">Ali Dehghantanha</author>
<author pid="80/4080">Ramlan Mahmoud</author>
<author pid="118/8830">Solahuddin bin Shamsuddin</author>
<title>Forensics investigation challenges in cloud computing environments.</title>
<pages>190-194</pages>
<year>2012</year>
<booktitle>CyberSec</booktitle>
<ee>https://doi.org/10.1109/CyberSec.2012.6246092</ee>
<crossref>conf/cybersec/2012</crossref>
<url>db/conf/cybersec/cybersec2012.html#DamshenasDMS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infrkm/MustaffaAMD12" mdate="2020-10-25">
<author orcid="0000-0001-5088-2871" pid="93/5019">Mas Rina Mustaffa</author>
<author pid="77/2998">Fatimah Ahmad</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author orcid="0000-0001-5502-8754" pid="38/8875">Shyamala Doraisamy</author>
<title>Multi-resolution Joint Auto Correlograms: Determining the distance function.</title>
<pages>198-202</pages>
<year>2012</year>
<booktitle>CAMP</booktitle>
<ee>https://doi.org/10.1109/InfRKM.2012.6204991</ee>
<crossref>conf/infrkm/2012</crossref>
<url>db/conf/infrkm/infrkm2012.html#MustaffaAMD12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infrkm/ZawawiMUAD12" mdate="2017-05-25">
<author pid="71/11474">M. N. Zawawi</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="47/3573">Nur Izura Udzir</author>
<author pid="77/2998">Fatimah Ahmad</author>
<author pid="38/11475">J. M. Desa</author>
<title>Active warden as the main hindrance for steganography information retrieval.</title>
<pages>277-280</pages>
<year>2012</year>
<booktitle>CAMP</booktitle>
<ee>https://doi.org/10.1109/InfRKM.2012.6204989</ee>
<crossref>conf/infrkm/2012</crossref>
<url>db/conf/infrkm/infrkm2012.html#ZawawiMUAD12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/IsaHMMO12" mdate="2023-03-24">
<author orcid="0000-0003-1231-8748" pid="118/8782">Mohd Anuar Mat Isa</author>
<author pid="36/10472">Habibah Hashim</author>
<author pid="13/8144">Jamalul-lail Ab Manan</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="04/10472">Hanunah Othman</author>
<title>Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System.</title>
<pages>1304-1309</pages>
<year>2012</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom.2012.189</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/TrustCom.2012.189</ee>
<crossref>conf/trustcom/2012</crossref>
<url>db/conf/trustcom/trustcom2012.html#IsaHMMO12</url>
</inproceedings>
</r>
<r><proceedings key="conf/infrkm/2012" mdate="2020-10-28">
<editor pid="80/4080">Ramlan Mahmod</editor>
<editor pid="214/6040">Rusli Abdullah 0001</editor>
<editor pid="84/7607">Lili Nurliyana Abdullah</editor>
<editor pid="23/1115">Tengku Mohd Tengku Sembok</editor>
<editor pid="s/AlanFSmeaton">Alan F. Smeaton</editor>
<editor pid="c/FabioCrestani">Fabio Crestani</editor>
<editor pid="38/8875">Shyamala Doraisamy</editor>
<editor pid="23/8875">Rabiah Abdul Kadir</editor>
<editor pid="25/5105">Mahamod Ismail</editor>
<title>2012 International Conference on Information Retrieval &#38; Knowledge Management, Kuala Lumpur, Malaysia, March 13-15, 2012</title>
<publisher>IEEE</publisher>
<year>2012</year>
<isbn>978-1-4673-1091-8</isbn>
<ee>https://ieeexplore.ieee.org/xpl/conhome/6200786/proceeding</ee>
<booktitle>CAMP</booktitle>
<url>db/conf/infrkm/infrkm2012.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/IEEEias/DehghantanhaUM11" mdate="2017-06-15">
<author pid="54/8100">Ali Dehghantanha</author>
<author orcid="0000-0002-0543-3329" pid="47/3573">Nur Izura Udzir</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Towards data centric mobile security.</title>
<pages>62-67</pages>
<year>2011</year>
<booktitle>IAS</booktitle>
<ee>https://doi.org/10.1109/ISIAS.2011.6122796</ee>
<crossref>conf/IEEEias/2011</crossref>
<url>db/conf/IEEEias/IEEEias2011.html#DehghantanhaUM11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/bic-ta/AriffinMJA11" mdate="2023-03-24">
<author pid="06/10436">Suriyani Ariffin</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="65/10128">Azmi Jaafar</author>
<author pid="88/8910">Muhammad Rezal Kamel Ariffin</author>
<title>Immune Systems Approaches for Cryptographic Algorithm.</title>
<pages>231-235</pages>
<year>2011</year>
<booktitle>BIC-TA</booktitle>
<ee>https://doi.org/10.1109/BIC-TA.2011.33</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/BIC-TA.2011.33</ee>
<crossref>conf/bic-ta/2011</crossref>
<url>db/conf/bic-ta/bic-ta2011.html#AriffinMJA11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cisis-spain/DehghantanhaUM11" mdate="2017-06-15">
<author pid="54/8100">Ali Dehghantanha</author>
<author orcid="0000-0002-0543-3329" pid="47/3573">Nur Izura Udzir</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems.</title>
<pages>272-284</pages>
<year>2011</year>
<booktitle>CISIS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-21323-6_35</ee>
<crossref>conf/cisis-spain/2011</crossref>
<url>db/conf/cisis-spain/cisis2011.html#DehghantanhaUM11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icsecs/AbdullahUMS11" mdate="2023-09-30">
<author orcid="0000-0002-3986-3917" pid="39/10128">Zul Hilmi Abdullah</author>
<author orcid="0000-0002-0543-3329" pid="47/3573">Nur Izura Udzir</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<author orcid="0000-0001-9379-3385" pid="03/2114">Khairulmizam Samsudin</author>
<title>File Integrity Monitor Scheduling Based on File Security Level Classification.</title>
<pages>177-189</pages>
<year>2011</year>
<booktitle>ICSECS (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-642-22191-0_16</ee>
<crossref>conf/icsecs/2011-2</crossref>
<url>db/conf/icsecs/icsecs2011-2.html#AbdullahUMS11</url>
</inproceedings>
</r>
<r><article key="journals/csl/YahyaMR10" mdate="2023-09-30">
<author orcid="0000-0001-5211-1878" pid="51/8061">Anwar Ali Yahya</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<author pid="48/8899">Abd. Rahman Ramli</author>
<title>Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition.</title>
<pages>190-218</pages>
<year>2010</year>
<volume>24</volume>
<journal>Comput. Speech Lang.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.csl.2009.04.002</ee>
<url>db/journals/csl/csl24.html#YahyaMR10</url>
</article>
</r>
<r><inproceedings key="conf/aina/DehghantanhaUM10" mdate="2023-03-24">
<author pid="54/8100">Ali Dehghantanha</author>
<author orcid="0000-0002-0543-3329" pid="47/3573">Nur Izura Udzir</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Towards a Pervasive Formal Privacy Language.</title>
<pages>1085-1091</pages>
<year>2010</year>
<booktitle>AINA Workshops</booktitle>
<ee>https://doi.org/10.1109/WAINA.2010.26</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WAINA.2010.26</ee>
<crossref>conf/aina/2010w</crossref>
<url>db/conf/aina/ainaw2010.html#DehghantanhaUM10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsa/MoayedGM08" mdate="2023-09-30">
<author pid="118/2528">Majid Javid Moayed</author>
<author pid="52/4393">Abdul Azim Abdul Ghani</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<title>A Survey on Cryptography Algorithms in Security of Voting System Approaches.</title>
<pages>190-200</pages>
<year>2008</year>
<booktitle>ICCSA Workshops</booktitle>
<ee>https://doi.org/10.1109/ICCSA.2008.42</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICCSA.2008.42</ee>
<crossref>conf/iccsa/2008-w</crossref>
<url>db/conf/iccsa/iccsa2008-w.html#MoayedGM08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/msa/MustaffaARM07" mdate="2008-01-04">
<author pid="93/5019">Mas Rina Mustaffa</author>
<author pid="77/2998">Fatimah Ahmad</author>
<author pid="94/2530">Rahmita Wirza O. K. Rahmat</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>An Integrated Color-Spatial Approach for Content-Based Image Retrieval.</title>
<pages>23-29</pages>
<year>2007</year>
<crossref>conf/msa/2007</crossref>
<booktitle>MSA</booktitle>
<url>db/conf/msa/msa2007.html#MustaffaARM07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/graphite/AzmiWM06" mdate="2025-03-03">
<author orcid="0009-0004-7967-2658" pid="78/2724">Nurazlin Zainal Azmi</author>
<author pid="94/2530">Rahmita Wirza O. K. Rahmat</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Modeling expressive wrinkle on human face.</title>
<pages>425-427</pages>
<year>2006</year>
<crossref>conf/graphite/2006</crossref>
<booktitle>GRAPHITE</booktitle>
<ee>https://doi.org/10.1145/1174429.1174500</ee>
<url>db/conf/graphite/graphite2006.html#AzmiWM06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cita/AbdullahAMS05" mdate="2007-07-03">
<author pid="230/9997">Muhamad Taufik Abdullah</author>
<author pid="77/2998">Fatimah Ahmad</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="23/1115">Tengku M. T. Sembok</author>
<title>A Stemming Algorithm for Malay Language.</title>
<pages>181-186</pages>
<year>2005</year>
<crossref>conf/cita/2005</crossref>
<booktitle>CITA</booktitle>
<url>db/conf/cita/cita2005.html#AbdullahAMS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcnlp/AzizAGM05" mdate="2021-08-06">
<author pid="25/10401">Mohd Juzaiddin Ab Aziz</author>
<author pid="213/0778">Fatimah Dato' Ahmad</author>
<author pid="52/4393">Abdul Azim Abdul Ghani</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Pola Grammar Technique to Identify Subject and Predicate in Malaysian Language.</title>
<year>2005</year>
<booktitle>IJCNLP (companion)</booktitle>
<ee type="oa">https://aclanthology.org/I05-2032/</ee>
<crossref>conf/ijcnlp/2005-2</crossref>
<url>db/conf/ijcnlp/ijcnlp2005-2.html#AzizAGM05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icadl/AbdullahAMS03" mdate="2023-09-30">
<author pid="230/9997">Muhamad Taufik Abdullah</author>
<author pid="77/2998">Fatimah Ahmad</author>
<author orcid="0000-0003-1359-0444" pid="80/4080">Ramlan Mahmod</author>
<author pid="23/1115">Tengku M. T. Sembok</author>
<title>Application of Latent Semantic Indexing on Malay-English Cross Language Information Retrieval.</title>
<pages>663-665</pages>
<ee>https://doi.org/10.1007/978-3-540-24594-0_68</ee>
<year>2003</year>
<crossref>conf/icadl/2003</crossref>
<booktitle>ICADL</booktitle>
<url>db/conf/icadl/icadl2003.html#AbdullahAMS03</url>
</inproceedings>
</r>
<r><article key="journals/tc/Al-DaoudMRK02" mdate="2017-06-08">
<author pid="76/5661">Essam Al-Daoud</author>
<author pid="80/4080">Ramlan Mahmod</author>
<author pid="06/2453">Mohammad Rushdan</author>
<author orcid="0000-0002-1217-963X" pid="60/2744">Adem Kili&#231;man</author>
<title>A New Addition Formula for Elliptic Curves over GF(2<sup>n</sup>).</title>
<pages>972-975</pages>
<year>2002</year>
<volume>51</volume>
<journal>IEEE Trans. Computers</journal>
<number>8</number>
<ee>https://doi.org/10.1109/TC.2002.1024743</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2002.1024743</ee>
<url>db/journals/tc/tc51.html#Al-DaoudMRK02</url>
</article>
</r>
<r><inproceedings key="conf/aiccsa/YahiaM01" mdate="2023-03-24">
<author orcid="0000-0002-4690-5636" pid="88/372">Moawia Elfaki Yahia</author>
<author pid="80/4080">Ramlan Mahmod</author>
<title>Neural Expert System with Two Engines of Rough Set.</title>
<pages>52-58</pages>
<year>2001</year>
<crossref>conf/aiccsa/2001</crossref>
<booktitle>AICCSA</booktitle>
<ee>https://doi.org/10.1109/AICCSA.2001.933951</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/AICCSA.2001.933951</ee>
<url>db/conf/aiccsa/aiccsa2001.html#YahiaM01</url>
</inproceedings>
</r>
<coauthors n="66" nc="3">
<co c="0"><na f="a/Abbas:Haider" pid="04/7436">Haider Abbas</na></co>
<co c="0"><na f="a/Abdullah:Azizol" pid="29/5266">Azizol Abdullah</na></co>
<co c="0"><na f="a/Abdullah:Lili_Nurliyana" pid="84/7607">Lili Nurliyana Abdullah</na></co>
<co c="0"><na f="a/Abdullah:Mohd_Taufik" pid="84/9673">Mohd Taufik Abdullah</na></co>
<co c="0"><na f="a/Abdullah:Muhamad_Taufik" pid="230/9997">Muhamad Taufik Abdullah</na></co>
<co c="0" n="2"><na f="a/Abdullah:Rusli_Bin" pid="214/6040">Rusli Bin Abdullah</na><na>Rusli Abdullah 0001</na></co>
<co c="0"><na f="a/Abdullah:Zul_Hilmi" pid="39/10128">Zul Hilmi Abdullah</na></co>
<co c="0"><na f="a/Abulaish:Muhammad" pid="42/904">Muhammad Abulaish</na></co>
<co c="0"><na f="a/Adnan:Syed_Farid_Syed" pid="151/6500">Syed Farid Syed Adnan</na></co>
<co c="0"><na f="a/Ahmad:Fatimah" pid="77/2998">Fatimah Ahmad</na></co>
<co c="0"><na f="a/Ahmad:Fatimah_Dato=" pid="213/0778">Fatimah Dato' Ahmad</na></co>
<co c="1"><na f="a/Al=Daoud:Essam" pid="76/5661">Essam Al-Daoud</na></co>
<co c="0"><na f="a/Al=Wattar:Auday_H=" pid="159/1764">Auday H. Al-Wattar</na></co>
<co c="0"><na f="a/Ariffin:Muhammad_Rezal_Kamel" pid="88/8910">Muhammad Rezal Kamel Ariffin</na></co>
<co c="0"><na f="a/Ariffin:Suriyani" pid="06/10436">Suriyani Ariffin</na></co>
<co c="0"><na f="a/Aziz:Mohd_Juzaiddin_Ab" pid="25/10401">Mohd Juzaiddin Ab Aziz</na></co>
<co c="0"><na f="a/Aziz:NorazahAbd" pid="152/0123">NorazahAbd Aziz</na></co>
<co c="0"><na f="a/Azmi:Nurazlin_Zainal" pid="78/2724">Nurazlin Zainal Azmi</na></co>
<co c="0"><na f="b/Bafandehkar:Mohsen" pid="191/1938">Mohsen Bafandehkar</na></co>
<co c="0"><na f="b/Barati:Mehdi" pid="157/5257">Mehdi Barati</na></co>
<co c="0"><na f="b/Behzadi:Mostafa" pid="203/6861">Mostafa Behzadi</na></co>
<co c="0"><na f="c/Crestani:Fabio" pid="c/FabioCrestani">Fabio Crestani</na></co>
<co c="0"><na f="d/Damshenas:Mohsen" pid="118/8846">Mohsen Damshenas</na></co>
<co c="0" n="2"><na f="d/Dehghantanha:Ali" pid="54/8100">Ali Dehghantanha</na><na>Ali Dehghan Tanha</na></co>
<co c="0"><na f="d/Desa:J=_M=" pid="38/11475">J. M. Desa</na></co>
<co c="0"><na f="d/Dezfouli:Farhood_Norouzizadeh" pid="118/8768">Farhood Norouzizadeh Dezfouli</na></co>
<co c="0" n="2"><na f="d/Doraisamy:Shyamala_C=" pid="38/8875">Shyamala C. Doraisamy</na><na>Shyamala Doraisamy</na></co>
<co c="0"><na f="g/Ghani:Abdul_Azim_Abdul" pid="52/4393">Abdul Azim Abdul Ghani</na></co>
<co c="0"><na f="h/Halboob:Waleed" pid="127/2407">Waleed Halboob</na></co>
<co c="0"><na f="h/Hanapi:Zurina_Mohd" pid="145/5454">Zurina Mohd Hanapi</na></co>
<co c="0"><na f="h/Hashim:Habibah" pid="36/10472">Habibah Hashim</na></co>
<co c="0"><na f="i/Isa:Mohd_Anuar_Mat" pid="118/8782">Mohd Anuar Mat Isa</na></co>
<co c="0"><na f="i/Ismail:Mahamod" pid="25/5105">Mahamod Ismail</na></co>
<co c="0"><na f="j/Jaafar:Azmi" pid="65/10128">Azmi Jaafar</na></co>
<co c="0"><na f="j/Jegede:Abayomi" pid="177/2917">Abayomi Jegede</na></co>
<co c="0"><na f="j/J=oslash=sang:Audun" pid="j/AudunJosang">Audun J&#248;sang</na></co>
<co c="2"><na f="j/Juremi:Julia" pid="118/8814">Julia Juremi</na></co>
<co c="0"><na f="k/Kadir:Rabiah_Abdul" pid="23/8875">Rabiah Abdul Kadir</na></co>
<co c="0"><na f="k/Khan:Muhammad_Khurram" pid="69/821">Muhammad Khurram Khan</na></co>
<co c="1"><na f="k/Kili=ccedil=man:Adem" pid="60/2744">Adem Kili&#231;man</na></co>
<co c="0"><na f="m/Mamat:Ali" pid="19/628">Ali Mamat</na></co>
<co c="0"><na f="m/Manan:Jamalul=lail_Ab" pid="13/8144">Jamalul-lail Ab Manan</na></co>
<co c="0"><na f="m/Moayed:Majid_Javid" pid="118/2528">Majid Javid Moayed</na></co>
<co c="0"><na f="m/Mustaffa:Mas_Rina" pid="93/5019">Mas Rina Mustaffa</na></co>
<co c="0"><na f="m/Mustapha:Norwati" pid="82/2144">Norwati Mustapha</na></co>
<co c="0"><na f="o/Othman:Hanunah" pid="04/10472">Hanunah Othman</na></co>
<co c="0"><na f="r/Rahmat:Rahmita_Wirza_O=_K=" pid="94/2530">Rahmita Wirza O. K. Rahmat</na></co>
<co c="0" n="2"><na f="r/Ramli:Abd=_Rahman_bin" pid="48/8899">Abd. Rahman bin Ramli</na><na>Abd. Rahman Ramli</na></co>
<co c="1"><na f="r/Rushdan:Mohammad" pid="06/2453">Mohammad Rushdan</na></co>
<co c="0"><na f="s/Said:Mar_Yah" pid="26/7506">Mar Yah Said</na></co>
<co c="0"><na f="s/Saleem:Kashif" pid="30/7605">Kashif Saleem</na></co>
<co c="0"><na f="s/Samsudin:Khairulmizam" pid="03/2114">Khairulmizam Samsudin</na></co>
<co c="0" n="2"><na f="s/Sani:Nor_Fazlida_Mohd" pid="50/11475">Nor Fazlida Mohd Sani</na><na>Nor Fazlida Binti Mohd Sani</na></co>
<co c="0" n="2"><na f="s/Sembok:Tengku_M=_T=" pid="23/1115">Tengku M. T. Sembok</na><na>Tengku Mohd Tengku Sembok</na></co>
<co c="0"><na f="s/Shaerpour:Kaveh" pid="149/0319">Kaveh Shaerpour</na></co>
<co c="0"><na f="s/Shamsuddin:Solahuddin_bin" pid="118/8830">Solahuddin bin Shamsuddin</na></co>
<co c="0"><na f="s/Smeaton:Alan_F=" pid="s/AlanFSmeaton">Alan F. Smeaton</na></co>
<co c="2"><na f="s/Sulaiman:Salasiah" pid="118/8851">Salasiah Sulaiman</na></co>
<co c="0"><na f="t/Talebi:Javad" pid="166/0144">Javad Talebi</na></co>
<co c="0"><na f="u/Udzir:Nur_Izura" pid="47/3573">Nur Izura Udzir</na></co>
<co c="-1"><na f="y/Yahia:Moawia_Elfaki" pid="88/372">Moawia Elfaki Yahia</na></co>
<co c="0"><na f="y/Yahya:Anwar_Ali" pid="51/8061">Anwar Ali Yahya</na></co>
<co c="0"><na f="y/Yasin:Sharifah_Md" pid="191/2022">Sharifah Md Yasin</na></co>
<co c="0"><na f="y/Yusoff:Mohd_Najwadi" pid="94/10128">Mohd Najwadi Yusoff</na></co>
<co c="0"><na f="z/Zawawi:M=_N=" pid="71/11474">M. N. Zawawi</na></co>
<co c="0" n="2"><na f="z/Zukarnain:Zuriati" pid="75/6599">Zuriati Zukarnain</na><na>Zuriati Ahmad Zukarnain</na></co>
</coauthors>
</dblpperson>

