Abdulaziz Aborujilah

Orcid: 0000-0002-7497-4321

According to our database1, Abdulaziz Aborujilah authored at least 22 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
IoT Integration in Agriculture: Advantages, Challenges, and Future Perspectives: Short survey.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

CIA-based Analysis for E-Leaming Systems Threats and Countermeasures in Malaysian Higher Education: Review Paper.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

2022
A Conceptual Framework for an Integrated Healthcare Information Systems from an Organizational Perspective.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

Descriptive Analysis of Built-in Security Features in Web Development Frameworks.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

2021
Scalability of Mobile Cloud Storage.
Int. J. Interact. Mob. Technol., November, 2021

IoT MEMS: IoT-Based Paradigm for Medical Equipment Management Systems of ICUs in Light of COVID-19 Outbreak.
IEEE Access, 2021

2020
Understanding Education Difficulty During COVID-19 Lockdown: Reports on Malaysian University Students' Experience.
IEEE Access, 2020

Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

Adoption and Continuance Intention Model of Applying Telemedicine Technology in Digital Games Addiction.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

SMOTE-Based Framework for IoT Botnet Attack Detection.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
Security Assessment Model to Analysis DOS Attacks in WSN.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

A Conceptual Framework for Applying Telemedicine Mobile Applications in Treating Computer Games Addiction.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

2018
IT Students' Sentiment of Faculty Evaluations and Posting Opinions on Social Media Networks.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

2017
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach.
J. Comput. Networks Commun., 2017

Lecturers' perception on social media networks uses in education.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

2014
The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication.
J. Comput. Sci., 2014

A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed.
J. Comput. Sci., 2014

Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Simulation base implementation for placement of security services in real time environment.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Cloud computing in academic institutions.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013


  Loading...