Journals
- “A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges and Recommendations”. Applied Science, 10(15), 5208, 2020
- “A Systematic Literature Review on the Security and Privacy of the Blockchain and Cryptocurrency”. OIC-CERT Journal of Cyber Security, Vol 2, Issue 1, pp 1-17, Feb 2020
- “Cloud Forensic Challenges and Recommendations: A Review”. OIC-CERT Journal of Cyber Security, Vol 2, Issue 1, pp 19-29, Feb 2020
- "Systematic Literature Review for Malware Visualization Techniques". Journal of Theoretical and Applied Information Technology, Vol 96, No 16, 2018
- "Understanding Cyber Terrorism from Motivational Perspectives". Journal of Information Warfare, Vol 16, Issue 4, pp 1-13, 2017
- "Cyber Security Situational Awareness among Students: A Case Study in Malaysia". World Academy of Science, Engineering and Technology, International Science Index 127, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 11 (7), pp 1454 - 1460, 2017
- “Forensics Readiness: A Case Study on Digital CCTV Systems Antiforensics”. In Book Chapter Contemporary Digital Forensic Investigations of Cloud and Mobile Applications (Chapter 10), Syngress, United States, pp 147-162, 2016
- “Perception on Cyber Terrorism: A Focus Group Discussion Approach”. In Book Chapter Managing Cyber Threats, Koros Press Limited, United Kingdom, pp 1-14, 2015
- “The Application of Mixed Method in Developing a Cyber Terrorism Framework”. In Book Chapter Managing Cyber Threats, Koros Press Limited, United Kingdom, pp 29-42, 2015
- “Securing Classified Information: A Six-step Approach to Data Classification”. International Journal of Computer Science and Information Technologies, Vol 6, Issue 4, pp 3414-3418, 2015.
- “Cyber Terrorism Framework”. In Book Chapter Cyber Terrorism: Policy and Technical Perspective, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, pp 3-27, 2015
- “A Qualitative Analysis for Evaluating Cyber Terrorism Framework in Malaysia”. Information Security Journal: A Global Perspective, pp 1-9, 2015. DOI: 10.1080/19393555.2014.998844
- “Adoption of ISMS for Protecting SCADA Systems against Cyber Terrorism Threats”. International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Vol 03, Issue 04, pp 819-822, July 2014
- “Perception on Cyber Terrorism: A Focus Group Discussion Approach”. Journal of Information Security, Vol 03, No 03, pp 231-237, 2012. DOI: 10.4236/jis.2012.33029
- “The Application of Mixed Method in Developing a Cyber Terrorism Framework”. Journal of Information Security, Vol 03, No 03, pp 209-214, 2012. DOI: 10.4236/jis.2012.33026
- “A Dynamic Cyber Terrorism Framework”. International Journal of Computer Science and Information Security”. Vol 10, No 2, pp 149-158, 2012
Conference Proceedings
- “Mitigating Insider Threats: A Case Study of Data Leak Prevention”. Proceeding of the 19th European Conference on Cyber Warfare and Security (ECCWS) (Virtual), University of Chester, UK, 25-26 June 2020, pp 599-606
- “Instilling Digital Citizenship Skills Through Education: A Malaysian Perspective”. Proceeding of the 18th European Conference on Cyber Warfare and Security (ECCWS), University of Coimbra, Portugal, 3-5 July 2019, pp 819-827
- “Terrorism Indoctrination via Social Media: A Malaysian Case Study”. Proceedings of the 6th European Conference on Social Media (ECSM), University of Brighton, UK, 13-14 June 2019, pp 387-391
- “Developing a Competency Framework for Building Cybersecurity Professionals”. The Academic Colloquium, OIC-CERT Journal of Cyber Security, Shiraz, Iran, 26–29 Nov 2018
- “Safeguarding Malaysia’s Cyberspace against Cyber Threats: Contributions by CyberSecurity Malaysia”. The Academic Colloquium, OIC-CERT Journal of Cyber Security, Shiraz, Iran, 26–29 Nov 2018
- "Cyber Force Establishment: Defence Strategy for Protecting Malaysia’s Critical National Information Infrastructure against Cyber Threats". Proceeding of the 17th European Conference on Cyber Warfare and Security, Oslo, Norway, 28-29 June 2018, pp 330-337
- "Cyber Parenting Module Development For Parents". Proceeding of the 12th Annual International Technology, Education and Development Conference 2018 (INTED 2018), Valencia, Spain,5-7 March 2018, pp 9620-9627
- "A Management Framework for Developing a Malware Eradication and Remediation System to Mitigate Cyberattacks". Second International Conference on Computational Science and Engineering (ICCSE2017), Advanced Science Letters (ASL) Vol 24, Issue 5, 2018
- "Understanding Cyber Terrorism from Motivational Perspective: A Qualitative Data Analysis". Proceeding of the 16th European Conference On Cyber Warfare And Security (ECCWS), University College Dublin, Dublin, Ireland, 29-30 June 2017
- "CSIRT Management Workflow: Practical Guide for Critical Infrastructure Organisations". 10th European Conference on Information Systems Management, Evora, Portugal, 8-9 Sept 2016
- "Development of a Cyber Security Awareness Strategy Using Focus Group Discussion". SAI Computing Conference 2016, London, 13-15 Jul 2016
- "Elements in the Cyber Security Framework for Protecting the Critical Information Infrastructure Against Cyber Threats". International Conference on Information in Business and Technology Management, Melaka, Malaysia, Jan 2016
- "Developing a Cyber Security Awareness Master Plan In Malaysia: A Focus Group Discussion Approach." Proceeding of 2015 SSR International Conference on Social Sciences and Information, Tokyo, Japan, 29-30 Nov 2015, Vol 10, pp 164-168
- “Evaluating Cyber Terrorism Components in Malaysia. Proceeding of the IEEE 5th International”. Conference on Information & Communication Technology for the Muslim World, Kuching, Malaysia, 17-19 Nov 2014
- “Grounding the Component of Cyber Terrorism Framework Using the Grounded Theory”. Proceeding of the Springer and IEEE Technically Co-Sponsored Science and Information Conference 2014, United Kingdom, 27-29 Aug 2014, pp. 523-529 (Indexed in Thomson Reuters, SCOPUS and IEEE Xplore)
- “The Application of Qualitative Method in Developing a Cyber Terrorism Framework”. Proceeding of the European Society for Applied Sciences and Development Conference, Interlaken, Switzerland, 22-24 Feb 2014, pp 133-137 (Indexed in ISI (Thomson Reuters), ELSEVIER, SCOPUS)
- “Understanding Cyber Terrorism: The Grounded Theory Method Applied”. Proceeding of IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic, Kuala Lumpur, Malaysia, 26-28 June 2012, pp 334-339
- “Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region”. In: M. Chau et al. (Eds.): Pacific Asia Workshop on Intelligence and Security Informatics, 29 May 2012; Springer Lecture Notes in Computer Science, Volume 7299/2012, pp 27-35, DOI: 10.1007/978-3-642-30428-62
- “Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) against Cyber Terrorism: Towards Development of a Policy Framework”. Proceeding of IEEE Sixth International Conference on Information Assurance & Security 2010, Atlanta, USA, pp 21-27
- “Protection of Critical National Information Infrastructure (CNII) Against Cyber Terrorism: Development of Strategy and Policy Framework”. Proceeding of IEEE International Intelligence and Security Informatics (ISI) Conference, Vancouver, Canada, 2010, pp 169
- “Radio Wave Propagation Studies Through Tropical Vegetation In Malaysia At VHF”. In Proceedings of the International Symposium on Antennas and Propagation Japan, Vol 34, pp 897-897, Institute of Electronics, Information & Communication Engineers, 1992
- “Attenuation of Radio Wave Propagating Through Tropical Vegetation in Malaysia at VHF”. Open Symposium on URSI Comm F, Ravenscar, UK, 1992
Articles
- “Addressing Cyber Terrorism Threats”. Published in the 9th International Cybersecurity Forum (FIC), Paris, 7 Jan 2017 (https://www.observatoire-fic.com/addressing-cyber-terrorism-threats-by-zahri-bin-yunos-cybersecurity-malaisia/)
- ”Kisah Benar Cyber999”. Published in Sinar Harian, pg 36, 20 Sept 2015
- ”Malaysia at Risk of Cyber Terrorism”. Published in New Straits Times, pg 13, 7 Feb 2015
- "Ancaman Keselamatan Siber". Published in Utusan Malaysia (sainsmega), pg 8-9, 6 Oct 2014
- "Definition and Framework of Cyber Terrorism". Proceeding of Southeast Asia Regional Center for Counter Terrorism (SEARCCT) Selection of Articles, Ministry of Foreign Affairs, Malaysia, Volume 1/2013, pp 67-79
- "The Rise of Threats in the Cyber Dimension". Published in the Computerworld, 4 Dec 2013
- "Illicit Activities and Terrorism in Cyberspace". Proceeding of the CENS – GFF Cybersecurity Workshop Jointly Organised by the Centre of Excellence for National Security, S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore and The Global Futures Forum (International), 18-19 July 2011, pp 12-13
- "Cyber Terrorism and Terrorist Use of ICT and Cyberspace". Proceeding of Southeast Asia Regional Center for Counter Terrorism (SEARCCT) Selection of Articles, Ministry of Foreign Affairs, Malaysia, Volume 2/2011, pp 17-26
- "Putting Cyber Terrorism into Context". Published in the STAR In-Tech on 24 Feb 2009
- "The New Frontier for Terrorists". Published in Star InTech on 1 Jul 2008
- "Much Ado About Malware". Published in NST-Tech on 4 June 2007
- "Weathering a Crisis". Published in Star InTech on 31 Jan 2006
- "Beware the Hidden Danger". Published in Star InTech on 28 Feb 2006
- "Dealing With Dangers from Within". Published in Star InTech on 23 Mar 2006
- "Pengenalan Diri Mudah Dicuri". Published in KOSMO on 30 May 2006
- "Implementing Information Security". Published in NST-Tech on 5 June 2006
- "Ethics in Info Security". Published in NST-Tech on 20 Nov 2006
- "Worms And Trojans Go Mobile". Published in Star InTech on 24 Mar 2005
- "How to Make Online Banking Secure". Published in Star InTech on 21 Apr 2005
- "Measures to Combat Spam". Published in Star InTech on 19 May 2005
- "Cyberwar the New War Frontier". Published in Star InTech on 21 June 2005
- "Keeping Kids Safe Online". Published in NST Computimes on 18 Jul 2005
- "Securing Digital Documents". Published in Star InTech on 29 April 2004
- "Business Continuity Not Just About Business". Published in Star InTech on 14 Oct 2004
- "Cyber Threats: Myths or Reality?". Published in Star InTech on 9 Oct 2003
- "Ancaman Siber: Mitos atau Reality". Published in Utusan Megabit on 15 Oct 2003
- "Computer Viruses – Future Cyber Weapons". Published in Star InTech on 13 Nov 2003
- "Crime Reaches No Man’s Land Action". Published in Star InTech on 18 Dec 2003