Nur Izura Udzir

Orcid: 0000-0002-0543-3329

According to our database1, Nur Izura Udzir authored at least 90 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Smart - Contract Privacy Preservation Mechanism.
EAI Endorsed Trans. Scalable Inf. Syst., 2023

2022
A Continuous Region-Based Skyline Computation for a Group of Mobile Users.
Symmetry, 2022

CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data.
IEEE Access, 2022

Efficient Region-Based Skyline Computation for a Group of Users.
IEEE Access, 2022

2021
An Effective Naming Heterogeneity Resolution for XACML Policy Evaluation in a Distributed Environment.
Symmetry, 2021

Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.
Sensors, 2021

Blockchain technology in the healthcare industry: Trends and opportunities.
J. Ind. Inf. Integr., 2021

Efficient Skyline Computation Over an Incomplete Database With Changing States and Structures.
IEEE Access, 2021

Application of Pseudo-Memory Finite Automata for Information Encryption.
Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2021

2020
SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud.
CoRR, 2020

Efficient Computation of Skyline Queries Over a Dynamic and Incomplete Database.
IEEE Access, 2020

A Rule-based Skyline Computation over a Dynamic Database.
Proceedings of the iiWAS '20: The 22nd International Conference on Information Integration and Web-based Applications & Services, Virtual Event / Chiang Mai, Thailand, November 30, 2020

2019
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework.
Scalable Comput. Pract. Exp., 2019

A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction.
J. Medical Syst., 2019

Lattice Structural Analysis on Sniffing to Denial of Service Attacks.
CoRR, 2019

2018
Missing values estimation for skylines in incomplete database.
Int. Arab J. Inf. Technol., 2018

A Framework for Processing Skyline Queries for a Group of Mobile Users.
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018

Efficient Skyline Processing Algorithm over Dynamic and Incomplete Database.
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018

2017
Processing skyline queries in incomplete distributed databases.
J. Intell. Inf. Syst., 2017

State of the Art in Biometric Key Binding and Key Generation Schemes.
Int. J. Commun. Networks Inf. Secur., 2017

2016
A refined filter for UHAD to improve anomaly detection.
Secur. Commun. Networks, 2016

A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016

A Formal Calculus for International Relations Computation and Evaluation.
CoRR, 2016

A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Performance-Aware Trust-Based Access Control for Protecting Sensitive Attributes.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

An Evaluation on KNN-SVM Algorithm for Detection and Prediction of DDoS Attack.
Proceedings of the Trends in Applied Knowledge-Based Systems and Data Science, 2016

A Hybrid Scheme for Face Template Protection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating.
J. Inf. Sci. Eng., 2015

A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation.
CoRR, 2015

Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2014
Windows Web Proxy Caching simulation: a Tool for simulating Web Proxy Caching under Windows Operating Systems.
J. Comput. Sci., 2014

Intrusion Detection System in Secure Shell Traffic in Cloud Environment.
J. Comput. Sci., 2014

Extending TLS with Mutual Attestation for Platform Integrity Assurance.
J. Commun., 2014

HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks.
Clust. Comput., 2014

An Overview of Media Streams Caching in Peer-to-Peer Systems.
Comput. J., 2014

Packet Header Anomaly Detection Using Statistical Analysis.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Signature-Based Anomaly intrusion detection using Integrated data mining classifiers.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Distributed Denial of Service detection using hybrid machine learning technique.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Effective mining on large databases for intrusion detection.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Intelligent Cooperative Least Recently Used Web Caching Policy based on J48 Classifier.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

XACML Policy Inconsistency Analysis and Resolution.
Proceedings of the DATA 2014, 2014

2012
An Intra-domain Mobility Handling Scheme Across All-IP Wireless Networks.
Wirel. Pers. Commun., 2012

A Compact Bit String Accessibility Map for Secure XML Query Processing.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks.
Peer-to-Peer Netw. Appl., 2012

An encoding scheme based on fractional number for querying and updating XML data.
J. Syst. Softw., 2012

Generating Pareto-Optimal Offers in Bilateral Automated Negotiation with One-Side Uncertain Importance Weights.
Comput. Informatics, 2012

Active warden as the main hindrance for steganography information retrieval.
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012

Analytical Studies and Experimental Examines for Flooding-Based Search Algorithms.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

A Cloud-based Intrusion Detection Service framework.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Energy-efficient intrusion detection in Wireless Sensor Network.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Hierarchical secure virtualization model for cloud.
Proceedings of the 2012 International Conference on Cyber Security, 2012

An alert fusion model inspired by artificial immune system.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Finest authorizing member of common criteria certification.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Towards secure model for SCADA systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
The Learning of an Opponent's Approximate Preferences in Bilateral Automated Negotiation.
J. Theor. Appl. Electron. Commer. Res., 2011

Adaptable Decentralized Service Oriented Architecture.
J. Syst. Softw., 2011

A Framework for Checking and Ranking Integrity Constraints in a Distributed Database.
J. Next Gener. Inf. Technol., 2011

A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems.
Comput. Inf. Sci., 2011

Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating.
Proceedings of the Networked Digital Technologies - Third International Conference, 2011

An Access Control Model for Supporting XML Document Updating.
Proceedings of the Networked Digital Technologies - Third International Conference, 2011

Performance Evaluation of Preference Evaluation Techniques.
Proceedings of the Networked Digital Technologies - Third International Conference, 2011

File Integrity Monitor Scheduling Based on File Security Level Classification.
Proceedings of the Software Engineering and Computer Systems, 2011

An empirical study of the characteristics of access control model towards secure KMS in collaborative environment.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011

Performance Analysis of Transport Control Protocol Flavours in the Existence of Packet Reordering Phenomena.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

Label Size Increment of Bit String Based Labeling Scheme in Dynamic XML Updating.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Intrusion detection based on k-means clustering and OneR classification.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Towards data centric mobile security.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Investigation of bypassing malware defences and malware detections.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Finer Garbage Collection in Lindacap.
Int. J. Inf. Technol. Web Eng., 2010

A Model for Ranking and Selecting Integrity Tests in a Distributed Database.
Int. J. Inf. Technol. Web Eng., 2010

Towards a Pervasive Formal Privacy Language.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Improved Integrity Constraints Checking in Distributed Databases by Exploiting Local Checking.
J. Comput. Sci. Technol., 2009

Mobility support across hybrid IP-based wireless environment: review of concepts, solutions, and related issues.
Ann. des Télécommunications, 2009

A Frequent Path Mining Algorithm to Intelligent Business Process Decomposition.
Proceedings of the 2009 International Conference on Semantic Web & Web Services, 2009

Using process mining to business process distribution.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Garbage collection in LINDACAP.
Proceedings of the iiWAS'2009, 2009

Ranking and selecting integrity tests in a distributed database.
Proceedings of the iiWAS'2009, 2009

SLA-Driven Business Process Distribution.
Proceedings of the International Conference on Information, 2009

Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

2008
A Study on Feature Selection and Classification Techniques for Automatic Genre Classification of Traditional Malay Music.
Proceedings of the ISMIR 2008, 2008

Artificial Immune Recognition System with Nonlinear Resource Allocation Method and Application to Traditional Malay Music Genre Classification.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008

Notes on Using Nonlinear Resource Allocation Methods in AIRS Classifier.
Proceedings of The 2008 International Conference on Data Mining, 2008

A Comprehensive Study in Benchmarking Feature Selection and Classification Approaches for Traditional Malay Music Genre Classification.
Proceedings of The 2008 International Conference on Data Mining, 2008

A Review on Concepts, Algorithms and Recognition Based Applications of Artificial Immune System.
Proceedings of the Advances in Computer Science and Engineering, 2008

2007
Coordination with multicapabilities.
Sci. Comput. Program., 2007

Checking Integrity Constraints with Various Types of Integrity Tests for Distributed Databases.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

2006
Capability-based coordination for open distributed systems.
PhD thesis, 2006

2004
Implementing contract net in tuple space models.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004


  Loading...