Urmăriți
Azween Bin Abdullah PhD FBCS
Azween Bin Abdullah PhD FBCS
Taylors University
Adresă de e-mail confirmată pe alumni.usc.edu - Pagina de pornire
Titlu
Citat de
Citat de
Anul
A survey on routing techniques in underwater wireless sensor networks
M Ayaz, I Baig, A Abdullah, I Faye
Journal of Network and Computer Applications 34 (6), 1908-1927, 2011
4432011
Hop-by-hop dynamic addressing based (H2-DAB) routing protocol for underwater wireless sensor networks
M Ayaz, A Abdullah
2009 international conference on information and multimedia technology, 436-441, 2009
2232009
Load balancing techniques in cloud computing environment: A review
DA Shafiq, NZ Jhanjhi, A Abdullah
Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022
2032022
Ransomware, threat and detection techniques: A review
S Kok, A Abdullah, N Jhanjhi, M Supramaniam
Int. J. Comput. Sci. Netw. Secur 19 (2), 136, 2019
1822019
A load balancing algorithm for the data centres to optimize cloud computing applications
DA Shafiq, NZ Jhanjhi, A Abdullah, MA Alzain
IEEE Access 9, 41731-41744, 2021
1672021
Application of artificial neural network in detection of DOS attacks
I Ahmad, AB Abdullah, AS Alghamdi
Proceedings of the 2nd international conference on Security of information …, 2009
1382009
Phishing website detection: An improved accuracy through feature selection and ensemble learning
AA Ubing, SKB Jasmi, A Abdullah, NZ Jhanjhi, M Supramaniam
International Journal of Advanced Computer Science and Applications 10 (1), 2019
1372019
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
S Lee, A Abdullah, N Jhanjhi, S Kok
PeerJ Computer Science 7, e350, 2021
1322021
An efficient dynamic addressing based routing protocol for underwater wireless sensor networks
M Ayaz, A Abdullah, I Faye, Y Batira
Computer Communications 35 (4), 475-486, 2012
1192012
Early detection of crypto-ransomware using pre-encryption detection algorithm
SH Kok, A Abdullah, NZ Jhanjhi
Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022
1172022
Prevention of crypto-ransomware using a pre-encryption detection algorithm
SH Kok, A Abdullah, NZ Jhanjhi, M Supramaniam
Computers 8 (4), 79, 2019
1142019
Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study
VE Adeyemo, A Abdullah, NZ JhanJhi, M Supramaniam, AO Balogun
International Journal of Advanced Computer Science and Applications 10 (9), 2019
1052019
Performance optimization of criminal network hidden link prediction model with deep reinforcement learning
M Lim, A Abdullah, NZ Jhanjhi
Journal of King Saud University-Computer and Information Sciences 33 (10 …, 2021
1012021
Evaluation metric for crypto-ransomware detection using machine learning
SH Kok, A Azween, NZ Jhanjhi
Journal of Information Security and Applications 55, 102646, 2020
942020
Usability testing methodology: Effectiveness of heuristic evaluation in E-government website development
A Sivaji, A Abdullah, AG Downe
2011 fifth Asia modelling symposium, 68-72, 2011
922011
A new model for predicting component-based software reliability using soft computing
C Diwaker, P Tomar, A Solanki, A Nayyar, NZ Jhanjhi, A Abdullah, ...
IEEE Access 7, 147191-147203, 2019
872019
Hidden link prediction in criminal networks using the deep reinforcement learning technique
M Lim, A Abdullah, NZ Jhanjhi, M Supramaniam
Computers 8 (1), 8, 2019
872019
Systematic analysis of applied data mining based optimization algorithms in clinical attribute extraction and classification for diagnosis of cardiac patients
N Kausar, S Palaniappan, BB Samir, A Abdullah, N Dey
Applications of Intelligent Optimization in Biology and Medicine: Current …, 2016
872016
Importance of incorporating fundamental usability with social & trust elements for e-commerce website
A Sivaji, AG Downe, MF Mazlan, ST Soo, A Abdullah
2011 International Conference on Business, Engineering and Industrial …, 2011
842011
Temporary cluster based routing for underwater wireless sensor networks
M Ayaz, A Abdullah, LT Jung
2010 International Symposium on Information Technology 2, 1009-1014, 2010
802010
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20