Performance evaluation of AODV, DSDV & DSR routing protocol in grid environment NSM Usop, A Abdullah, AFA Abidin IJCSNS International Journal of Computer Science and Network Security 9 (7 …, 2009 | 247 | 2009 |
A review of bring your own device on security issues M Olalere, MT Abdullah, R Mahmod, A Abdullah Sage Open 5 (2), 2158244015580372, 2015 | 116 | 2015 |
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers MA Khoshkholghi, MN Derahman, A Abdullah, S Subramaniam, ... IEEE Access 5, 10709-10722, 2017 | 106 | 2017 |
Disaster recovery in cloud computing: A survey MA Khoshkholghi, A Abdullah, R Latip, S Subramaniam, M Othman Computer and Information Science 7 (4), 39, 2014 | 84 | 2014 |
A cloud-based intrusion detection service framework W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 82 | 2012 |
Distributed Denial of Service detection using hybrid machine learning technique M Barati, A Abdullah, NI Udzir, R Mahmod, N Mustapha 2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014 | 60 | 2014 |
A survey on resource allocation and monitoring in cloud computing MH Mohamaddiah, A Abdullah, S Subramaniam, M Hussin International Journal of Machine Learning and Computing 4 (1), 31-38, 2014 | 57 | 2014 |
Performance comparison study of routing protocols for mobile grid environment A Abdullah, N Ramly, A Muhammed, MN Derahman IJCSNS International Journal of Computer science and Network security 8 (2 …, 2008 | 55 | 2008 |
Cooperation stimulation mechanisms for wireless multihop networks: A survey N Samian, ZA Zukarnain, WKG Seah, A Abdullah, ZM Hanapi Journal of Network and Computer Applications 54, 88-106, 2015 | 40 | 2015 |
Quality of service class identifier (QCI) radio resource allocation algorithm for LTE downlink M Mamman, ZM Hanapi, A Abdullah, A Muhammed PloS one 14 (1), e0210310, 2019 | 36 | 2019 |
An adaptive call admission control with bandwidth reservation for downlink LTE networks M Mamman, ZM Hanapi, A Abdullah, A Muhammed IEEE Access 5, 10986-10994, 2017 | 35 | 2017 |
Energy-aware fault tolerant task offloading of mobile cloud computing SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof 2017 5th IEEE International Conference on Mobile Cloud Computing, Services …, 2017 | 27 | 2017 |
Aes and ecc mixed for zigbee wireless sensor security S Al-alak, Z Ahmed, A Abdullah, S Subramiam International Journal of Electronics and Communication Engineering 5 (9 …, 2011 | 26 | 2011 |
A particle swarm optimization and min–max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids FU Ambursa, R Latip, A Abdullah, S Subramaniam The Journal of Supercomputing 73, 2018-2051, 2017 | 24 | 2017 |
Decentralized replication strategies for P2P based scientific data grid A Abdullah, M Othman, H Ibrahim, MN Sulaiman, AT Othman 2008 International Symposium on Information Technology 3, 1-8, 2008 | 24 | 2008 |
An effective approach for managing power consumption in cloud computing infrastructure SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof journal of computational science 21, 349-360, 2017 | 23 | 2017 |
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda 2014 International symposium on biometrics and security technologies (ISBAST …, 2014 | 23 | 2014 |
Secure model for virtualization layer in cloud infrastructure S Manavi, S Mohammadalian, NI Udzir, A Abdullah International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (1 …, 2012 | 20 | 2012 |
Identification and evaluation of discriminative lexical features of malware URL for real-time classification M Olalere, MT Abdullah, R Mahmod, A Abdullah 2016 International Conference on Computer and Communication Engineering …, 2016 | 19 | 2016 |
Hierarchical secure virtualization model for cloud S Manavi, S Mohammadalian, NI Udzir, A Abdullah Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 19 | 2012 |