Shafii Muhammad Abdulhamid

Orcid: 0000-0001-9196-9447

According to our database1, Shafii Muhammad Abdulhamid authored at least 46 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An adaptive symbiotic organisms search for constrained task scheduling in cloud computing.
J. Ambient Intell. Humaniz. Comput., July, 2023

The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study.
IEEE Access, 2023

SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework.
IEEE Access, 2023

Information Security using GNU Privacy Guard.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

2022
Review and analysis of classical algorithms and hash-based post-quantum algorithm.
J. Reliab. Intell. Environ., 2022

2021
Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives.
J. Ambient Intell. Humaniz. Comput., 2021

Adopting automated whitelist approach for detecting phishing attacks.
Comput. Secur., 2021

2020
Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments.
Neural Comput. Appl., 2020

Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives.
Neural Comput. Appl., 2020

A survey of symbiotic organisms search algorithms and applications.
Neural Comput. Appl., 2020

Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend.
Appl. Soft Comput., 2020

Genetic Search Wrapper-Based Naïve Bayes Anomaly Detection Model for Fog Computing Environment.
Proceedings of the Intelligent Systems Design and Applications, 2020

Antlion Optimization-Based Feature Selection Scheme for Cloud Intrusion Detection Using Naïve Bayes Algorithm.
Proceedings of the Intelligent Systems Design and Applications, 2020

Smart Home Automation System Using ZigBee, Bluetooth and Arduino Technologies.
Proceedings of the Computational Science and Its Applications - ICCSA 2020, 2020

An Intelligent Machine Learning-Based Real-Time Public Transport System.
Proceedings of the Computational Science and Its Applications - ICCSA 2020, 2020

2019
Security challenges in fog-computing environment: a systematic appraisal of current developments.
J. Reliab. Intell. Environ., 2019

Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms.
J. Reliab. Intell. Environ., 2019

An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment.
J. Netw. Comput. Appl., 2019

Recent advances in mobile touch screen security authentication methods: A systematic literature review.
Comput. Secur., 2019

Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment.
Clust. Comput., 2019

Progress on Artificial Neural Networks for Big Data Analytics: A Survey.
IEEE Access, 2019

Nature Inspired Meta-heuristic Algorithms for Deep Learning: Recent Progress and Novel Perspective.
Proceedings of the Advances in Computer Vision, 2019

2018
Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm.
Neural Comput. Appl., 2018

Non-Nested Generalisation (NNGE) Algorithm for Efficient and Early Detection of Diabetes.
Proceedings of the Information Technology and Intelligent Transportation Systems - Proceedings of the 3rd International Conference on Information Technology and Intelligent Transportation Systems (ITITS 2018), 2018

Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio Steganography.
Proceedings of the International Conference on Rural and Elderly Health Informatics (IREHI 2018), 2018

2017
Secure E-Examination Systems Compared: Case Studies from Two Countries.
J. Inf. Technol. Educ. Innov. Pract., 2017

Recent advancements in resource allocation techniques for cloud computing environment: a systematic review.
Clust. Comput., 2017

A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness.
Appl. Soft Comput., 2017

A Review on Mobile SMS Spam Filtering Techniques.
IEEE Access, 2017

2016
Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities.
J. Netw. Comput. Appl., 2016

A Support Vector Machine Classification of Computational Capabilities of 3D Map on Mobile Device for Navigation Aid.
Int. J. Interact. Mob. Technol., 2016

Symbiotic Organism Search optimization based task scheduling in cloud computing environment.
Future Gener. Comput. Syst., 2016

A Survey of League Championship Algorithm: Prospects and Challenges.
CoRR, 2016

2015
Tasks Scheduling Technique Using League Championship Algorithm for Makespan Minimization in IaaS Cloud.
CoRR, 2015

Job Scheduling Technique for Infrastructure as a Service Cloud Using an Improved League Championship Algorithm.
Proceedings of the Second International Conference on Advanced Data and Information Engineering, 2015

2014
An Improved AIS Based E-mail Classification Technique for Spam Detection.
CoRR, 2014

Grid-based Search Technique for Massive Academic Publications.
CoRR, 2014

The Prospects for e-Examinations in Nigeria and Australia.
CoRR, 2014

E- Exams System for Nigerian Universities with Emphasis on Security and Result Integrity.
CoRR, 2014

Destination Information Management System for Tourist.
CoRR, 2014

On-Demand Grid Provisioning Using Cloud Infrastructures and Related Virtualization Tools: A Survey and Taxonomy.
CoRR, 2014

League Championship Algorithm Based Job Scheduling Scheme for Infrastructure as a Service Cloud.
CoRR, 2014

Design Evaluation of Some Nigerian University Portals: A Programmer's Point of View.
CoRR, 2014

Controlling Citizens Cyber Viewing Using Enhanced Internet Content Filters.
CoRR, 2014

Privacy and National Security Issues in Social Networks: The Challenges.
CoRR, 2014

Analysing Membership Profile Privacy Issues in Online Social Networks.
CoRR, 2014


  Loading...