Shukor Abd Razak
Orcid: 0000-0002-8824-6069
According to our database1,
Shukor Abd Razak
authored at least 66 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review.
IEEE Access, 2023
2022
A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm (AI) for Optimal Task Scheduling.
Sensors, 2022
Comput. Networks, 2022
IEEE Access, 2022
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022
2021
Sensors, 2021
Secur. Commun. Networks, 2021
Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks.
Comput. Intell. Neurosci., 2021
IEEE Access, 2021
A Review of Anomaly Intrusion Detection Systems in IoT using Deep Learning Techniques.
Adv. Data Sci. Adapt. Anal., 2021
2020
Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network.
CoRR, 2020
IEEE Access, 2020
Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field.
IEEE Access, 2020
IEEE Access, 2020
2019
Int. J. Mach. Learn. Cybern., 2019
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019
Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
2018
Int. J. Adv. Intell. Paradigms, 2018
2017
IEEE Access, 2017
High-level online user attribution model based on human Polychronic-Monochronic tendency.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017
2016
Understanding Online Behavior: Exploring the Probability of Online Personality Trait Using Supervised Machine-Learning Approach.
Frontiers ICT, 2016
2015
Computing, 2015
DICSA: Distributed and concurrent link scheduling algorithm for data gathering in wireless sensor networks.
Ad Hoc Networks, 2015
2014
IM2PR: interference-minimized multipath routing protocol for wireless sensor networks.
Wirel. Networks, 2014
Mob. Networks Appl., 2014
Improving broadcast reliability for neighbor discovery, link estimation and collection tree construction in wireless sensor networks.
Comput. Networks, 2014
Comput. J., 2014
Ad Hoc Networks, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Towards adapting metamodelling technique for database forensics investigation domain.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
2013
Wirel. Networks, 2013
Mob. Networks Appl., 2013
Int. J. Digit. Crime Forensics, 2013
Quorum-based location service protocol for vehicular ad hoc networks in urban environment.
Int. J. Ad Hoc Ubiquitous Comput., 2013
Int. J. Ad Hoc Ubiquitous Comput., 2013
A review of anonymous authentication mechanisms for health information management systems.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013
2012
J. Supercomput., 2012
Fundamental Lifetime Mechanisms in Routing Protocols for Wireless Sensor Networks: A Survey and Open Issues.
Sensors, 2012
EEDARS: An Energy-Efficient Dual-Sink Algorithm with Role Switching Mechanism for Event-Driven Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2012
CoRR, 2012
Ad Hoc Sens. Wirel. Networks, 2012
2011
Wirel. Sens. Netw., 2011
Wirel. Networks, 2011
Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network.
Sensors, 2011
A Medium Access Control Protocol with Adaptive Parent Selection Mechanism for Large-Scale Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks
CoRR, 2010
A Review on Blackhole Attack in Mobile Ad Hoc Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010
2008
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, 2007
2006
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
Proceedings of the Intelligence and Security Informatics, 2006
2005
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005