Rosli Salleh
Rosli Salleh
Associate Professor
Verified email at
Cited by
Cited by
The evolution of android malware and android analysis techniques
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro
ACM Computing Surveys (CSUR) 49 (4), 1-41, 2017
IEEE 802 wireless systems: protocols, multi-hop mesh/relaying, performance and spectrum coexistence
BH Walke, S Mangold, L Berlemann
John Wiley & Sons, 2007
A review on feature selection in mobile malware detection
A Feizollah, NB Anuar, R Salleh, AWA Wahab
Digital investigation 13, 22-37, 2015
Androdialysis: Analysis of android intent effectiveness in malware detection
A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell
computers & security 65, 121-134, 2017
Overview of security issues in wireless sensor networks
H Modares, R Salleh, A Moravejosharieh
2011 third international conference on computational intelligence, modelling …, 2011
Copy-move forgery detection: survey, challenges and future directions
NB Abd Warif, AWA Wahab, MYI Idris, R Ramli, R Salleh, ...
Journal of Network and Computer Applications 75, 259-278, 2016
The future of mobile wireless communication networks
X Li, A Gani, R Salleh, O Zakaria
2009 International Conference on Communication Software and Networks, 554-557, 2009
Botnet detection techniques: review, future trends, and issues
A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar
Journal of Zhejiang University SCIENCE C 15 (11), 943-983, 2014
Off-line handwriting text line segmentation: A review
Z Razak, K Zulkiflee, MYI Idris, EM Tamil, MNM Noor, R Salleh, M Yaakob, ...
International journal of computer science and network security 8 (7), 12-20, 2008
A study of machine learning classifiers for anomaly-based mobile botnet detection
A Feizollah, NB Anuar, R Salleh, F Amalina, S Shamshirband
Malaysian Journal of Computer Science 26 (4), 251-265, 2013
The rise of “malware”: Bibliometric analysis of malware study
MF Ab Razak, NB Anuar, R Salleh, A Firdaus
Journal of Network and Computer Applications 75, 58-76, 2016
Bots and botnets: An overview of characteristics, detection and challenges
M Eslahi, R Salleh, NB Anuar
2012 IEEE International Conference on Control System, Computing and …, 2012
SMARTbot: A behavioral analysis framework augmented with machine learning to identify mobile botnet applications
A Karim, R Salleh, MK Khan
PloS one 11 (3), e0150077, 2016
MoBots: A new generation of botnets on mobile devices and networks
M Eslahi, R Salleh, NB Anuar
2012 International Symposium on Computer Applications and Industrial …, 2012
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis
A Feizollah, NB Anuar, R Salleh, F Amalina
2014 international symposium on biometrics and security technologies (ISBAST …, 2014
SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack
NBA Warif, AWA Wahab, MYI Idris, R Salleh, F Othman
Journal of Visual Communication and Image Representation 46, 219-232, 2017
Performance analysis of aodv, aomdv, dsr, dsdv routing protocols in vehicular ad hoc network
A Moravejosharieh, H Modares, R Salleh, E Mostajeran
Research Journal of Recent Sciences ISSN 2277, 2502, 2013
Mobile botnet attacks: a thematic taxonomy
A Karim, SAA Shah, R Salleh
New Perspectives in Information Systems and Technologies, Volume 2, 153-164, 2014
Management of palm oil mill effluent through production of cellulases by filamentous fungi
SS Rashid, MZ Alam, MIA Karim, MH Salleh
World Journal of Microbiology and Biotechnology 25 (12), 2219-2226, 2009
Mobile botnet attacks-an emerging threat: classification, review and open issues
A Karim, SA Ali Shah, RB Salleh, M Arif, RM Noor, S Shamshirband
KSII Transactions on Internet and Information Systems (TIIS) 9 (4), 1471-1492, 2015
The system can't perform the operation now. Try again later.
Articles 1–20