• 501 Citations
  • 10 h-Index
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Zulaiha Ali Othman is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 4 Similar Profiles
Intrusion detection Engineering & Materials Science
Data mining Engineering & Materials Science
Association rules Engineering & Materials Science
Vehicle routing Engineering & Materials Science
Packet networks Engineering & Materials Science
Classifiers Engineering & Materials Science
Scheduling algorithms Engineering & Materials Science
Feature extraction Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2003 2019

  • 501 Citations
  • 10 h-Index
  • 67 Conference contribution
  • 61 Article
  • 3 Chapter
  • 1 Paper
Open Access
Association rules
Climate change
Nitrogen oxides

Cyber Security Situational Awareness among Parents

Ahmad, N., Mokhtar, U. A., Fariza Paizi Fauzi, W., Ali Othman, Z., Hakim Yeop, Y. & Sheikh Abdullah, S. N. H., 25 Jan 2019, Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. Abidin, K. A. Z., Mohd, M. & Shukur, Z. (eds.). Institute of Electrical and Electronics Engineers Inc., 8626830. (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Human resource management
Association rules

Features selection for intrusion detection system based on DNA encoding

Rashid, O. F., Ali Othman, Z. & Zainudin, S., 1 Jan 2019, Lecture Notes in Networks and Systems. Springer, p. 323-335 13 p. (Lecture Notes in Networks and Systems; vol. 67).

Research output: Chapter in Book/Report/Conference proceedingChapter

Intrusion detection
Feature extraction
DNA sequences

Four char DNA encoding for anomaly intrusion detection system

Rashid, O. F., Ali Othman, Z. & Zainudin, S., 1 Jan 2019, p. 86-92. 7 p.

Research output: Contribution to conferencePaper

Intrusion detection
Computer systems
Computer networks