Azween B. Abdullah

According to our database1, Azween B. Abdullah authored at least 26 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks.
IEEE Access, 2020

Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique.
Computers, 2019

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm.
Computers, 2019

Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique.
IEEE Access, 2019

A New Model for Predicting Component-Based Software Reliability Using Soft Computing.
IEEE Access, 2019

Systematic Analysis of Applied Data Mining Based Optimization Algorithms in Clinical Attribute Extraction and Classification for Diagnosis of Cardiac Patients.
Proceedings of the Applications of Intelligent Optimization in Biology and Medicine, 2016

Towards Gamification in Software Traceability: Between Test and Code Artifacts.
Proceedings of the ICSOFT-EA 2015, 2015

Optimized intrusion detection mechanism using soft computing techniques.
Telecommunication Systems, 2013

Energy balancing through cluster head selection using K-Theorem in homogeneous wireless sensor networks
CoRR, 2012

An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks.
Comput. Commun., 2012

Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

A survey on routing techniques in underwater wireless sensor networks.
J. Netw. Comput. Appl., 2011

A new grid resource discovery framework.
Int. Arab J. Inf. Technol., 2011

An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks.
Proceedings of the Engineering Applications of Neural Networks, 2011

A Semantic Service Discovery Framework for Intergrid.
Proceedings of the Software Engineering and Computer Systems, 2011

Comparative Analysis of Intrusion Detection Approaches.
Proceedings of the 12th UKSim, 2010

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Novel immune-based framework for securing ad hoc networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Towards an autonomic Service Oriented Architecture in computational engineering framework.
Proceedings of the 10th International Conference on Information Sciences, 2010

Biologically Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network.
Proceedings of the Sixth International Conference on Intelligent Environments, 2010

Hop-by-Hop Reliable Data Deliveries for Underwater Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Survivable system by critical service recovery model: single service analysis.
Int. Arab J. Inf. Technol., 2009

Application of artificial neural network in detection of DOS attacks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Underwater wireless sensor networks: routing issues and future challenges.
Proceedings of the MoMM'2009, 2009

A Proposed Biologically Inspired Model for Object Recognition.
Proceedings of the Visual Informatics: Bridging Research and Practice, 2009

Modelling a Survivable System through Critical Service Recovery Process.
Proceedings of the EMS 2008, 2008