Azween B. Abdullah
According to our database1, Azween B. Abdullah authored at least 26 papers between 2008 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks.
IEEE Access, 2020
Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique.
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm.
Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique.
IEEE Access, 2019
A New Model for Predicting Component-Based Software Reliability Using Soft Computing.
IEEE Access, 2019
Systematic Analysis of Applied Data Mining Based Optimization Algorithms in Clinical Attribute Extraction and Classification for Diagnosis of Cardiac Patients.
Proceedings of the Applications of Intelligent Optimization in Biology and Medicine, 2016
Towards Gamification in Software Traceability: Between Test and Code Artifacts.
Proceedings of the ICSOFT-EA 2015, 2015
Optimized intrusion detection mechanism using soft computing techniques.
Telecommunication Systems, 2013
Energy balancing through cluster head selection using K-Theorem in homogeneous wireless sensor networks
An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks.
Comput. Commun., 2012
Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012
A survey on routing techniques in underwater wireless sensor networks.
J. Netw. Comput. Appl., 2011
A new grid resource discovery framework.
Int. Arab J. Inf. Technol., 2011
An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks.
Proceedings of the Engineering Applications of Neural Networks, 2011
A Semantic Service Discovery Framework for Intergrid.
Proceedings of the Software Engineering and Computer Systems, 2011
Comparative Analysis of Intrusion Detection Approaches.
Proceedings of the 12th UKSim, 2010
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
Proceedings of the Advances in Computer Science and Information Technology, 2010
Novel immune-based framework for securing ad hoc networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Towards an autonomic Service Oriented Architecture in computational engineering framework.
Proceedings of the 10th International Conference on Information Sciences, 2010
Biologically Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network.
Proceedings of the Sixth International Conference on Intelligent Environments, 2010
Hop-by-Hop Reliable Data Deliveries for Underwater Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Survivable system by critical service recovery model: single service analysis.
Int. Arab J. Inf. Technol., 2009
Application of artificial neural network in detection of DOS attacks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Underwater wireless sensor networks: routing issues and future challenges.
Proceedings of the MoMM'2009, 2009
A Proposed Biologically Inspired Model for Object Recognition.
Proceedings of the Visual Informatics: Bridging Research and Practice, 2009
Modelling a Survivable System through Critical Service Recovery Process.
Proceedings of the EMS 2008, 2008