Azween B. Abdullah

Orcid: 0000-0003-4425-8604

Affiliations:
  • Taylor's University, Subang Jaya, Malaysia


According to our database1, Azween B. Abdullah authored at least 38 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Load balancing techniques in cloud computing environment: A review.
J. King Saud Univ. Comput. Inf. Sci., 2022

Early detection of crypto-ransomware using pre-encryption detection algorithm.
J. King Saud Univ. Comput. Inf. Sci., 2022

IoTES (A Machine learning model) Design dependent encryption selection for IoT devices.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning.
PeerJ Comput. Sci., 2021

Performance optimization of criminal network hidden link prediction model with deep reinforcement learning.
J. King Saud Univ. Comput. Inf. Sci., 2021

A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications.
IEEE Access, 2021

2020
Evaluation metric for crypto-ransomware detection using machine learning.
J. Inf. Secur. Appl., 2020

Criminal Network Community Detection Using Graphical Analytic Methods: A Survey.
EAI Endorsed Trans. Energy Web, 2020

Criminal Community Detection Based on Isomorphic Subgraph Analytics.
Open Comput. Sci., 2020

Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks.
IEEE Access, 2020

Proposing a Privacy Protection Model in Case of Civilian Drone.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique.
Comput., 2019

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm.
Comput., 2019

Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique.
IEEE Access, 2019

A New Model for Predicting Component-Based Software Reliability Using Soft Computing.
IEEE Access, 2019

2016
Systematic Analysis of Applied Data Mining Based Optimization Algorithms in Clinical Attribute Extraction and Classification for Diagnosis of Cardiac Patients.
Proceedings of the Applications of Intelligent Optimization in Biology and Medicine, 2016

2015
Towards Gamification in Software Traceability: Between Test and Code Artifacts.
Proceedings of the ICSOFT-EA 2015, 2015

2013
Optimized intrusion detection mechanism using soft computing techniques.
Telecommun. Syst., 2013

2012
Reliable data deliveries using packet optimization in multi-hop underwater sensor networks.
J. King Saud Univ. Comput. Inf. Sci., 2012

Energy balancing through cluster head selection using K-Theorem in homogeneous wireless sensor networks
CoRR, 2012

An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks.
Comput. Commun., 2012

Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

2011
A survey on routing techniques in underwater wireless sensor networks.
J. Netw. Comput. Appl., 2011

A new grid resource discovery framework.
Int. Arab J. Inf. Technol., 2011

An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks.
Proceedings of the Engineering Applications of Neural Networks, 2011

A Semantic Service Discovery Framework for Intergrid.
Proceedings of the Software Engineering and Computer Systems, 2011

2010
Comparative Analysis of Intrusion Detection Approaches.
Proceedings of the 12th UKSim, 2010

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Novel immune-based framework for securing ad hoc networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Towards an autonomic Service Oriented Architecture in computational engineering framework.
Proceedings of the 10th International Conference on Information Sciences, 2010

Biologically Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network.
Proceedings of the Sixth International Conference on Intelligent Environments, 2010

Hop-by-Hop Reliable Data Deliveries for Underwater Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Survivable system by critical service recovery model: single service analysis.
Int. Arab J. Inf. Technol., 2009

Application of artificial neural network in detection of DOS attacks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Underwater wireless sensor networks: routing issues and future challenges.
Proceedings of the MoMM'2009, 2009

A Proposed Biologically Inspired Model for Object Recognition.
Proceedings of the Visual Informatics: Bridging Research and Practice, 2009

2008
Modelling a Survivable System through Critical Service Recovery Process.
Proceedings of the EMS 2008, 2008


  Loading...