关注
Dr. Azizol Abdullah
标题
引用次数
引用次数
年份
Performance evaluation of AODV, DSDV & DSR routing protocol in grid environment
NSM Usop, A Abdullah, AFA Abidin
IJCSNS International Journal of Computer Science and Network Security 9 (7 …, 2009
2512009
A review of bring your own device on security issues
M Olalere, MT Abdullah, R Mahmod, A Abdullah
Sage Open 5 (2), 2158244015580372, 2015
1302015
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
MA Khoshkholghi, MN Derahman, A Abdullah, S Subramaniam, ...
IEEE Access 5, 10709-10722, 2017
1202017
Disaster recovery in cloud computing: A survey
MA Khoshkholghi, A Abdullah, R Latip, S Subramaniam, M Othman
Computer and Information Science 7 (4), 39, 2014
892014
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
812012
Distributed Denial of Service detection using hybrid machine learning technique
M Barati, A Abdullah, NI Udzir, R Mahmod, N Mustapha
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
732014
A survey on resource allocation and monitoring in cloud computing
MH Mohamaddiah, A Abdullah, S Subramaniam, M Hussin
International Journal of Machine Learning and Computing 4 (1), 31, 2014
692014
Performance comparison study of routing protocols for mobile grid environment
A Abdullah, N Ramly, A Muhammed, MN Derahman
IJCSNS International Journal of Computer science and Network security 8 (2 …, 2008
592008
Cooperation stimulation mechanisms for wireless multihop networks: A survey
N Samian, ZA Zukarnain, WKG Seah, A Abdullah, ZM Hanapi
Journal of Network and Computer Applications 54, 88-106, 2015
442015
Quality of service class identifier (QCI) radio resource allocation algorithm for LTE downlink
M Mamman, ZM Hanapi, A Abdullah, A Muhammed
PloS one 14 (1), e0210310, 2019
432019
An adaptive call admission control with bandwidth reservation for downlink LTE networks
M Mamman, ZM Hanapi, A Abdullah, A Muhammed
IEEE Access 5, 10986-10994, 2017
432017
An intrusion detection system for the internet of things based on machine learning: Review and challenges
A Adnan, A Muhammed, AA Abd Ghani, A Abdullah, F Hakim
Symmetry 13 (6), 1011, 2021
382021
Energy-aware fault tolerant task offloading of mobile cloud computing
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
2017 5th IEEE International Conference on Mobile Cloud Computing, Services …, 2017
332017
An effective approach for managing power consumption in cloud computing infrastructure
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
Journal of computational science 21, 349-360, 2017
312017
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
MA Bouke, A Abdullah, SH ALshatebi, MT Abdullah, H El Atigh
Microprocessors and Microsystems 98, 104823, 2023
272023
Hierarchical blockchain structure for node authentication in IoT networks
MT Al Ahmed, F Hashim, SJ Hashim, A Abdullah
Egyptian Informatics Journal 23 (2), 345-361, 2022
272022
A particle swarm optimization and min–max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids
FU Ambursa, R Latip, A Abdullah, S Subramaniam
The Journal of Supercomputing 73, 2018-2051, 2017
272017
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
272014
Aes and ecc mixed for zigbee wireless sensor security
S Al-alak, Z Ahmed, A Abdullah, S Subramiam
International Journal of Electronics and Communication Engineering 5 (9 …, 2011
252011
Decentralized replication strategies for P2P based scientific data grid
A Abdullah, M Othman, H Ibrahim, MN Sulaiman, AT Othman
2008 International Symposium on Information Technology 3, 1-8, 2008
222008
系统目前无法执行此操作,请稍后再试。
文章 1–20