Follow
Dr. Azizol Abdullah
Title
Cited by
Cited by
Year
Performance evaluation of AODV, DSDV & DSR routing protocol in grid environment
NSM Usop, A Abdullah, AFA Abidin
IJCSNS International Journal of Computer Science and Network Security 9 (7 …, 2009
2542009
A review of bring your own device on security issues
M Olalere, MT Abdullah, R Mahmod, A Abdullah
Sage Open 5 (2), 2158244015580372, 2015
1322015
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
MA Khoshkholghi, MN Derahman, A Abdullah, S Subramaniam, ...
IEEE Access 5, 10709-10722, 2017
1192017
Disaster recovery in cloud computing: A survey
MA Khoshkholghi, A Abdullah, R Latip, S Subramaniam, M Othman
Computer and Information Science 7 (4), 39, 2014
902014
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
822012
Distributed Denial of Service detection using hybrid machine learning technique
M Barati, A Abdullah, NI Udzir, R Mahmod, N Mustapha
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
682014
A survey on resource allocation and monitoring in cloud computing
MH Mohamaddiah, A Abdullah, S Subramaniam, M Hussin
International Journal of Machine Learning and Computing 4 (1), 31, 2014
662014
Performance comparison study of routing protocols for mobile grid environment
A Abdullah, N Ramly, A Muhammed, MN Derahman
IJCSNS International Journal of Computer science and Network security 8 (2 …, 2008
562008
Cooperation stimulation mechanisms for wireless multihop networks: A survey
N Samian, ZA Zukarnain, WKG Seah, A Abdullah, ZM Hanapi
Journal of Network and Computer Applications 54, 88-106, 2015
452015
An adaptive call admission control with bandwidth reservation for downlink LTE networks
M Mamman, ZM Hanapi, A Abdullah, A Muhammed
IEEE Access 5, 10986-10994, 2017
412017
Quality of service class identifier (QCI) radio resource allocation algorithm for LTE downlink
M Mamman, ZM Hanapi, A Abdullah, A Muhammed
PloS one 14 (1), e0210310, 2019
402019
Energy-aware fault tolerant task offloading of mobile cloud computing
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
2017 5th IEEE International Conference on Mobile Cloud Computing, Services …, 2017
332017
An intrusion detection system for the internet of things based on machine learning: Review and challenges
A Adnan, A Muhammed, AA Abd Ghani, A Abdullah, F Hakim
Symmetry 13 (6), 1011, 2021
322021
An effective approach for managing power consumption in cloud computing infrastructure
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
journal of computational science 21, 349-360, 2017
312017
A particle swarm optimization and min–max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids
FU Ambursa, R Latip, A Abdullah, S Subramaniam
The Journal of Supercomputing 73, 2018-2051, 2017
282017
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
272014
Aes and ecc mixed for zigbee wireless sensor security
S Al-alak, Z Ahmed, A Abdullah, S Subramiam
International Journal of Electronics and Communication Engineering 5 (9 …, 2011
252011
Decentralized replication strategies for P2P based scientific data grid
A Abdullah, M Othman, H Ibrahim, MN Sulaiman, AT Othman
2008 International Symposium on Information Technology 3, 1-8, 2008
232008
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
MA Bouke, A Abdullah, SH ALshatebi, MT Abdullah, H El Atigh
Microprocessors and Microsystems 98, 104823, 2023
222023
Hierarchical blockchain structure for node authentication in IoT networks
MT Al Ahmed, F Hashim, SJ Hashim, A Abdullah
Egyptian Informatics Journal 23 (2), 345-361, 2022
222022
The system can't perform the operation now. Try again later.
Articles 1–20