Performance evaluation of AODV, DSDV & DSR routing protocol in grid environment NSM Usop, A Abdullah, AFA Abidin IJCSNS International Journal of Computer Science and Network Security 9 (7 …, 2009 | 251 | 2009 |
A review of bring your own device on security issues M Olalere, MT Abdullah, R Mahmod, A Abdullah Sage Open 5 (2), 2158244015580372, 2015 | 130 | 2015 |
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers MA Khoshkholghi, MN Derahman, A Abdullah, S Subramaniam, ... IEEE Access 5, 10709-10722, 2017 | 120 | 2017 |
Disaster recovery in cloud computing: A survey MA Khoshkholghi, A Abdullah, R Latip, S Subramaniam, M Othman Computer and Information Science 7 (4), 39, 2014 | 89 | 2014 |
A cloud-based intrusion detection service framework W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 81 | 2012 |
Distributed Denial of Service detection using hybrid machine learning technique M Barati, A Abdullah, NI Udzir, R Mahmod, N Mustapha 2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014 | 73 | 2014 |
A survey on resource allocation and monitoring in cloud computing MH Mohamaddiah, A Abdullah, S Subramaniam, M Hussin International Journal of Machine Learning and Computing 4 (1), 31, 2014 | 69 | 2014 |
Performance comparison study of routing protocols for mobile grid environment A Abdullah, N Ramly, A Muhammed, MN Derahman IJCSNS International Journal of Computer science and Network security 8 (2 …, 2008 | 59 | 2008 |
Cooperation stimulation mechanisms for wireless multihop networks: A survey N Samian, ZA Zukarnain, WKG Seah, A Abdullah, ZM Hanapi Journal of Network and Computer Applications 54, 88-106, 2015 | 44 | 2015 |
Quality of service class identifier (QCI) radio resource allocation algorithm for LTE downlink M Mamman, ZM Hanapi, A Abdullah, A Muhammed PloS one 14 (1), e0210310, 2019 | 43 | 2019 |
An adaptive call admission control with bandwidth reservation for downlink LTE networks M Mamman, ZM Hanapi, A Abdullah, A Muhammed IEEE Access 5, 10986-10994, 2017 | 43 | 2017 |
An intrusion detection system for the internet of things based on machine learning: Review and challenges A Adnan, A Muhammed, AA Abd Ghani, A Abdullah, F Hakim Symmetry 13 (6), 1011, 2021 | 38 | 2021 |
Energy-aware fault tolerant task offloading of mobile cloud computing SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof 2017 5th IEEE International Conference on Mobile Cloud Computing, Services …, 2017 | 33 | 2017 |
An effective approach for managing power consumption in cloud computing infrastructure SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof Journal of computational science 21, 349-360, 2017 | 31 | 2017 |
An intelligent DDoS attack detection tree-based model using Gini index feature selection method MA Bouke, A Abdullah, SH ALshatebi, MT Abdullah, H El Atigh Microprocessors and Microsystems 98, 104823, 2023 | 27 | 2023 |
Hierarchical blockchain structure for node authentication in IoT networks MT Al Ahmed, F Hashim, SJ Hashim, A Abdullah Egyptian Informatics Journal 23 (2), 345-361, 2022 | 27 | 2022 |
A particle swarm optimization and min–max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids FU Ambursa, R Latip, A Abdullah, S Subramaniam The Journal of Supercomputing 73, 2018-2051, 2017 | 27 | 2017 |
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda 2014 International symposium on biometrics and security technologies (ISBAST …, 2014 | 27 | 2014 |
Aes and ecc mixed for zigbee wireless sensor security S Al-alak, Z Ahmed, A Abdullah, S Subramiam International Journal of Electronics and Communication Engineering 5 (9 …, 2011 | 25 | 2011 |
Decentralized replication strategies for P2P based scientific data grid A Abdullah, M Othman, H Ibrahim, MN Sulaiman, AT Othman 2008 International Symposium on Information Technology 3, 1-8, 2008 | 22 | 2008 |