Follow
Zahri Yunos
Zahri Yunos
UTEM
No verified email - Homepage
Title
Cited by
Cited by
Year
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ...
Applied Sciences 10 (15), 5208, 2020
812020
A dynamic cyber terrorism framework
R Ahmad, Z Yunos
International Journal of Computer Science and Information Security 10 (2), 149, 2012
592012
Perception on cyber terrorism: A focus group discussion approach
R Ahmad, Z Yunos, S Sahib, M Yusoff
Scientific Research Publishing, 2012
372012
Development of a cyber security awareness strategy using focus group discussion
Z Yunos, RS Ab Hamid, M Ahmad
2016 SAI Computing Conference (SAI), 1063-1067, 2016
282016
Understanding cyber terrorism: The grounded theory method applied
R Ahmad, Z Yunos, S Sahib
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
252012
The application of mixed method in developing a cyber terrorism framework
R Ahmad, Z Yunos
Scientific Research Publishing, 2012
232012
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework
Z Yunos, R Ahmad, SH Suid, Z Ismail
2010 Sixth International Conference on Information Assurance and Security, 21-27, 2010
222010
Cloud forensic challenges and recommendations: A review
W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin
OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020
202020
A systematic literature review on the security and privacy of the blockchain and cryptocurrency
A Hassan, MZ Mas' ud, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ...
OIC-CERT Journal of Cyber Security 2 (1), 1-17, 2020
192020
A qualitative analysis for evaluating a cyber terrorism framework in Malaysia
Z Yunos, R Ahmad, NA Mohd Sabri
Information Security Journal: A Global Perspective 24 (1-3), 15-23, 2015
192015
The application of qualitative method in developing a cyber terrorism framework
Z Yunos, R Ahmad
Proccedings of the International Conference on Economics, Management and …, 2014
172014
Forensic readiness: A case study on digital CCTV systems antiforensics
A Ariffin, KKR Choo, Z Yunos
Contemporary digital forensic investigations of cloud and mobile …, 2017
142017
Understanding cyber terrorism from motivational perspectives
Z Yunos, S Sulaman
Journal of Information Warfare 16 (4), 1-13, 2017
122017
Protection of critical national information infrastructure (cnii) against cyber terrorism: Development of strategy and policy framework
Z Yunos, SH Suid
2010 IEEE International Conference on Intelligence and Security Informatics …, 2010
122010
Putting cyber terrorism into context
Z Yunos, CS Malaysia
STAR In-Tech 24 (02), 5, 2009
122009
Safeguarding Malaysia’s cyberspace against cyber threats: contributions by cybersecurity Malaysia
F Abdullah, NS Mohamad, Z Yunos
OIC-CERT Journal of Cyber Security 1 (1), 22-31, 2018
112018
How to make online banking secure
ANM Zin, Z Yunos
The Star 21, 2005
112005
A review of digital forensics framework for blockchain in cryptocurrency technology
MZ Mas’ud, A Hassan, WM Shah, SF Abdul-Latip, R Ahmad, A Ariffin, ...
2021 3rd International Cyber Resilience Conference (CRC), 1-6, 2021
92021
Cyber parenting module development for parents
RS Ab Hamid, Z Yunos, M Ahmad
INTED2018 Proceedings, 9620-9627, 2018
72018
Understanding cyber terrorism from motivational perspectives: A qualitative data analysis
Z Yunos, N Mohd, A Ariffin, R Ahmad
European Conference on Cyber Warfare and Security, 550-557, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20