LIST OF PUBLICATIONS



Journals
    1. “A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges and Recommendations”. Applied Science, 10(15), 5208, 2020
    2. “A Systematic Literature Review on the Security and Privacy of the Blockchain and Cryptocurrency”. OIC-CERT Journal of Cyber Security, Vol 2, Issue 1, pp 1-17, Feb 2020
    3. “Cloud Forensic Challenges and Recommendations: A Review”. OIC-CERT Journal of Cyber Security, Vol 2, Issue 1, pp 19-29, Feb 2020
    4. "Systematic Literature Review for Malware Visualization Techniques". Journal of Theoretical and Applied Information Technology, Vol 96, No 16, 2018
    5. "Understanding Cyber Terrorism from Motivational Perspectives". Journal of Information Warfare, Vol 16, Issue 4, pp 1-13, 2017
    6. "Cyber Security Situational Awareness among Students: A Case Study in Malaysia". World Academy of Science, Engineering and Technology, International Science Index 127, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 11 (7), pp 1454 - 1460, 2017
    7. “Forensics Readiness: A Case Study on Digital CCTV Systems Antiforensics”. In Book Chapter Contemporary Digital Forensic Investigations of Cloud and Mobile Applications (Chapter 10), Syngress, United States, pp 147-162, 2016
    8. “Perception on Cyber Terrorism: A Focus Group Discussion Approach”. In Book Chapter Managing Cyber Threats, Koros Press Limited, United Kingdom, pp 1-14, 2015
    9. “The Application of Mixed Method in Developing a Cyber Terrorism Framework”. In Book Chapter Managing Cyber Threats, Koros Press Limited, United Kingdom, pp 29-42, 2015
    10. “Securing Classified Information: A Six-step Approach to Data Classification”. International Journal of Computer Science and Information Technologies, Vol 6, Issue 4, pp 3414-3418, 2015.
    11. “Cyber Terrorism Framework”. In Book Chapter Cyber Terrorism: Policy and Technical Perspective, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, pp 3-27, 2015
    12. “A Qualitative Analysis for Evaluating Cyber Terrorism Framework in Malaysia”. Information Security Journal: A Global Perspective, pp 1-9, 2015. DOI: 10.1080/19393555.2014.998844
    13. “Adoption of ISMS for Protecting SCADA Systems against Cyber Terrorism Threats”. International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Vol 03, Issue 04, pp 819-822, July 2014
    14. “Perception on Cyber Terrorism: A Focus Group Discussion Approach”. Journal of Information Security, Vol 03, No 03, pp 231-237, 2012. DOI: 10.4236/jis.2012.33029
    15. “The Application of Mixed Method in Developing a Cyber Terrorism Framework”. Journal of Information Security, Vol 03, No 03, pp 209-214, 2012. DOI: 10.4236/jis.2012.33026
    16. “A Dynamic Cyber Terrorism Framework”. International Journal of Computer Science and Information Security”. Vol 10, No 2, pp 149-158, 2012

    Conference Proceedings
    1. “Mitigating Insider Threats: A Case Study of Data Leak Prevention”. Proceeding of the 19th European Conference on Cyber Warfare and Security (ECCWS) (Virtual), University of Chester, UK, 25-26 June 2020, pp 599-606
    2. “Instilling Digital Citizenship Skills Through Education: A Malaysian Perspective”. Proceeding of the 18th European Conference on Cyber Warfare and Security (ECCWS), University of Coimbra, Portugal, 3-5 July 2019, pp 819-827
    3. “Terrorism Indoctrination via Social Media: A Malaysian Case Study”. Proceedings of the 6th European Conference on Social Media (ECSM), University of Brighton, UK, 13-14 June 2019, pp 387-391
    4. “Developing a Competency Framework for Building Cybersecurity Professionals”. The Academic Colloquium, OIC-CERT Journal of Cyber Security, Shiraz, Iran, 26–29 Nov 2018 
    5. “Safeguarding Malaysia’s Cyberspace against Cyber Threats: Contributions by CyberSecurity Malaysia”. The Academic Colloquium, OIC-CERT Journal of Cyber Security, Shiraz, Iran, 26–29 Nov 2018 
    6. "Cyber Force Establishment: Defence Strategy for Protecting Malaysia’s Critical National Information Infrastructure against Cyber Threats". Proceeding of the 17th European Conference on Cyber Warfare and Security, Oslo, Norway, 28-29 June 2018, pp 330-337 
    7. "Cyber Parenting Module Development For Parents". Proceeding of the 12th Annual International Technology, Education and Development Conference 2018 (INTED 2018), Valencia, Spain,5-7 March 2018, pp 9620-9627
    8. "A Management Framework for Developing a Malware Eradication and Remediation System to Mitigate Cyberattacks". Second International Conference on Computational Science and Engineering (ICCSE2017), Advanced Science Letters (ASL) Vol 24, Issue 5, 2018
    9. "Understanding Cyber Terrorism from Motivational Perspective: A Qualitative Data Analysis". Proceeding of the 16th European Conference On Cyber Warfare And Security (ECCWS), University College Dublin, Dublin, Ireland, 29-30 June 2017
    10. "CSIRT Management Workflow: Practical Guide for Critical Infrastructure Organisations". 10th European Conference on Information Systems Management, Evora, Portugal, 8-9 Sept 2016
    11. "Development of a Cyber Security Awareness Strategy Using Focus Group Discussion". SAI Computing Conference 2016, London, 13-15 Jul 2016
    12. "Elements in the Cyber Security Framework for Protecting the Critical Information Infrastructure Against Cyber Threats". International Conference on Information in Business and Technology Management, Melaka, Malaysia, Jan 2016
    13. "Developing a Cyber Security Awareness Master Plan In Malaysia: A Focus Group Discussion Approach." Proceeding of 2015 SSR International Conference on Social Sciences and Information, Tokyo, Japan, 29-30 Nov 2015, Vol 10, pp 164-168
    14. “Evaluating Cyber Terrorism Components in Malaysia. Proceeding of the IEEE 5th International”. Conference on Information & Communication Technology for the Muslim World, Kuching, Malaysia, 17-19 Nov 2014
    15. “Grounding the Component of Cyber Terrorism Framework Using the Grounded Theory”. Proceeding of the Springer and IEEE Technically Co-Sponsored Science and Information Conference 2014, United Kingdom, 27-29 Aug 2014, pp. 523-529 (Indexed in Thomson Reuters, SCOPUS and IEEE Xplore)
    16. “The Application of Qualitative Method in Developing a Cyber Terrorism Framework”. Proceeding of the European Society for Applied Sciences and Development Conference, Interlaken, Switzerland, 22-24 Feb 2014, pp 133-137 (Indexed in ISI (Thomson Reuters), ELSEVIER, SCOPUS)
    17. “Understanding Cyber Terrorism: The Grounded Theory Method Applied”. Proceeding of IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic, Kuala Lumpur, Malaysia, 26-28 June 2012, pp 334-339
    18. “Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region”. In: M. Chau et al. (Eds.): Pacific Asia Workshop on Intelligence and Security Informatics, 29 May 2012; Springer Lecture Notes in Computer Science, Volume 7299/2012, pp 27-35, DOI: 10.1007/978-3-642-30428-62
    19. “Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) against Cyber Terrorism: Towards Development of a Policy Framework”. Proceeding of IEEE Sixth International Conference on Information Assurance & Security 2010, Atlanta, USA, pp 21-27
    20. “Protection of Critical National Information Infrastructure (CNII) Against Cyber Terrorism: Development of Strategy and Policy Framework”. Proceeding of IEEE International Intelligence and Security Informatics (ISI) Conference, Vancouver, Canada, 2010, pp 169
    21. “Radio Wave Propagation Studies Through Tropical Vegetation In Malaysia At VHF”. In Proceedings of the International Symposium on Antennas and Propagation Japan, Vol 34, pp 897-897, Institute of Electronics, Information & Communication Engineers, 1992
    22. “Attenuation of Radio Wave Propagating Through Tropical Vegetation in Malaysia at VHF”. Open Symposium on URSI Comm F, Ravenscar, UK, 1992

    Articles
    1. “Addressing Cyber Terrorism Threats”. Published in the 9th International Cybersecurity Forum (FIC), Paris, 7 Jan 2017 (https://www.observatoire-fic.com/addressing-cyber-terrorism-threats-by-zahri-bin-yunos-cybersecurity-malaisia/)
    2. ”Kisah Benar Cyber999”. Published in Sinar Harian, pg 36, 20 Sept 2015
    3. ”Malaysia at Risk of Cyber Terrorism”. Published in New Straits Times, pg 13, 7 Feb 2015
    4. "Ancaman Keselamatan Siber". Published in Utusan Malaysia (sainsmega), pg 8-9, 6 Oct 2014
    5. "Definition and Framework of Cyber Terrorism". Proceeding of Southeast Asia Regional Center for Counter Terrorism (SEARCCT) Selection of Articles, Ministry of Foreign Affairs, Malaysia, Volume 1/2013, pp 67-79
    6. "The Rise of Threats in the Cyber Dimension". Published in the Computerworld, 4 Dec 2013 
    7. "Illicit Activities and Terrorism in Cyberspace". Proceeding of the CENS – GFF Cybersecurity Workshop Jointly Organised by the Centre of Excellence for National Security, S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore and The Global Futures Forum (International), 18-19 July 2011, pp 12-13 
    8. "Cyber Terrorism and Terrorist Use of ICT and Cyberspace". Proceeding of Southeast Asia Regional Center for Counter Terrorism (SEARCCT) Selection of Articles, Ministry of Foreign Affairs, Malaysia, Volume 2/2011, pp 17-26 
    9. "Putting Cyber Terrorism into Context". Published in the STAR In-Tech on 24 Feb 2009
    10. "The New Frontier for Terrorists". Published in Star InTech on 1 Jul 2008 
    11. "Much Ado About Malware". Published in NST-Tech on 4 June 2007 
    12. "Weathering a Crisis". Published in Star InTech on 31 Jan 2006 
    13. "Beware the Hidden Danger". Published in Star InTech on 28 Feb 2006 
    14. "Dealing With Dangers from Within". Published in Star InTech on 23 Mar 2006 
    15. "Pengenalan Diri Mudah Dicuri". Published in KOSMO on 30 May 2006 
    16. "Implementing Information Security". Published in NST-Tech on 5 June 2006 
    17. "Ethics in Info Security". Published in NST-Tech on 20 Nov 2006 
    18. "Worms And Trojans Go Mobile". Published in Star InTech on 24 Mar 2005 
    19. "How to Make Online Banking Secure". Published in Star InTech on 21 Apr 2005 
    20. "Measures to Combat Spam". Published in Star InTech on 19 May 2005 
    21. "Cyberwar the New War Frontier". Published in Star InTech on 21 June 2005 
    22. "Keeping Kids Safe Online". Published in NST Computimes on 18 Jul 2005 
    23. "Securing Digital Documents". Published in Star InTech on 29 April 2004 
    24. "Business Continuity Not Just About Business". Published in Star InTech on 14 Oct 2004 
    25. "Cyber Threats: Myths or Reality?". Published in Star InTech on 9 Oct 2003 
    26. "Ancaman Siber: Mitos atau Reality". Published in Utusan Megabit on 15 Oct 2003 
    27. "Computer Viruses – Future Cyber Weapons". Published in Star InTech on 13 Nov 2003 
    28. "Crime Reaches No Man’s Land Action". Published in Star InTech on 18 Dec 2003