Shahrulniza Musa

Orcid: 0000-0003-4867-5085

According to our database1, Shahrulniza Musa authored at least 42 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Roman Urdu Hate Speech Detection Using Transformer-Based Model for Cyber Security Applications.
Sensors, 2023

Self-Socio Adaptive Reliable Particle Swarm Optimization Load Balancing in Software-Defined Networking.
IEEE Access, 2023

2022
Risk Classification in Global Software Development Using a Machine Learning Approach: A Result Comparison of Support Vector Machine and K-Nearest Neighbor Algorithms.
J. Inf. Technol. Res., 2022

Context-Aware Deep Learning Model for Detection of Roman Urdu Hate Speech on Social Media Platform.
IEEE Access, 2022

2021
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models.
Expert Syst. J. Knowl. Eng., 2021

Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment.
Comput. Sci. Rev., 2021

Risk Prediction by Using Artificial Neural Network in Global Software Development.
Comput. Intell. Neurosci., 2021

2020
Towards a secure behavior modeling for IoT networks using Blockchain.
CoRR, 2020

Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure.
CoRR, 2020

A Comprehensive Study of Load Balancing Approaches in the Cloud Computing Environment and a Novel Fault Tolerance Approach.
IEEE Access, 2020

A Systematic Review of Load Balancing Techniques in Software-Defined Networking.
IEEE Access, 2020

2019
Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing.
CoRR, 2019

Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks.
CoRR, 2019

Blockchain-based Smart-IoT Trust Zone Measurement Architecture.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN).
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
Design and implementation of an attestation protocol for measured dynamic behavior.
J. Supercomput., 2018

Challenges: Bridge between Cloud and IoT.
CoRR, 2018

IT Students' Sentiment of Faculty Evaluations and Posting Opinions on Social Media Networks.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

2017
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach.
J. Comput. Networks Commun., 2017

2016
TSSDroid: realization of an efficient and usable TSS API for the Android software stack.
Secur. Commun. Networks, 2016

Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
Realization of a user-centric, privacy preserving permission framework for Android.
Secur. Commun. Networks, 2015

2014
The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication.
J. Comput. Sci., 2014

A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed.
J. Comput. Sci., 2014

Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Transforming high-level requirements to executable policies for Android.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Design and implementation of an efficient framework for behaviour attestation using n-call slides.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Towards a high-level trusted computing API for Android software stack.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Simulation base implementation for placement of security services in real time environment.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

End to End Verification Mechanism for Dynamic Behavior Attestation.
Proceedings of the International Conference on Information Science and Applications, 2013

2012
A sense of others: behavioral attestation of UNIX processes on remote platforms.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

POAuth: privacy-aware open authorization for native apps on smartphone platforms.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

Terrain/clutter based location prediction by using multi-condition Bayesian decision theory.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

How secure is your smartphone: An analysis of smartphone security mechanisms.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Modeling Interpolated Distance Error for Clutter Based Location Estimation of Wireless Nodes.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

2010
Predicted and Corrected Location Estimation of Mobile Nodes Based on the Combination of Kalman Filter and the Bayesian Decision Theory.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010

2008
Visualising network security attacks with multiple 3D visualisation and false alert classification.
PhD thesis, 2008

Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

2007
Visualising Communication Network Security Attacks.
Proceedings of the 11th International Conference on Information Visualisation, 2007


  Loading...