Follow
Dr. Azizol Abdullah
Title
Cited by
Cited by
Year
Performance evaluation of AODV, DSDV & DSR routing protocol in grid environment
NSM Usop, A Abdullah, AFA Abidin
IJCSNS International Journal of Computer Science and Network Security 9 (7 …, 2009
2472009
A review of bring your own device on security issues
M Olalere, MT Abdullah, R Mahmod, A Abdullah
Sage Open 5 (2), 2158244015580372, 2015
1162015
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
MA Khoshkholghi, MN Derahman, A Abdullah, S Subramaniam, ...
IEEE Access 5, 10709-10722, 2017
1062017
Disaster recovery in cloud computing: A survey
MA Khoshkholghi, A Abdullah, R Latip, S Subramaniam, M Othman
Computer and Information Science 7 (4), 39, 2014
842014
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
822012
Distributed Denial of Service detection using hybrid machine learning technique
M Barati, A Abdullah, NI Udzir, R Mahmod, N Mustapha
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
602014
A survey on resource allocation and monitoring in cloud computing
MH Mohamaddiah, A Abdullah, S Subramaniam, M Hussin
International Journal of Machine Learning and Computing 4 (1), 31-38, 2014
572014
Performance comparison study of routing protocols for mobile grid environment
A Abdullah, N Ramly, A Muhammed, MN Derahman
IJCSNS International Journal of Computer science and Network security 8 (2 …, 2008
552008
Cooperation stimulation mechanisms for wireless multihop networks: A survey
N Samian, ZA Zukarnain, WKG Seah, A Abdullah, ZM Hanapi
Journal of Network and Computer Applications 54, 88-106, 2015
402015
Quality of service class identifier (QCI) radio resource allocation algorithm for LTE downlink
M Mamman, ZM Hanapi, A Abdullah, A Muhammed
PloS one 14 (1), e0210310, 2019
362019
An adaptive call admission control with bandwidth reservation for downlink LTE networks
M Mamman, ZM Hanapi, A Abdullah, A Muhammed
IEEE Access 5, 10986-10994, 2017
352017
Energy-aware fault tolerant task offloading of mobile cloud computing
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
2017 5th IEEE International Conference on Mobile Cloud Computing, Services …, 2017
272017
Aes and ecc mixed for zigbee wireless sensor security
S Al-alak, Z Ahmed, A Abdullah, S Subramiam
International Journal of Electronics and Communication Engineering 5 (9 …, 2011
262011
A particle swarm optimization and min–max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids
FU Ambursa, R Latip, A Abdullah, S Subramaniam
The Journal of Supercomputing 73, 2018-2051, 2017
242017
Decentralized replication strategies for P2P based scientific data grid
A Abdullah, M Othman, H Ibrahim, MN Sulaiman, AT Othman
2008 International Symposium on Information Technology 3, 1-8, 2008
242008
An effective approach for managing power consumption in cloud computing infrastructure
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
journal of computational science 21, 349-360, 2017
232017
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
232014
Secure model for virtualization layer in cloud infrastructure
S Manavi, S Mohammadalian, NI Udzir, A Abdullah
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (1 …, 2012
202012
Identification and evaluation of discriminative lexical features of malware URL for real-time classification
M Olalere, MT Abdullah, R Mahmod, A Abdullah
2016 International Conference on Computer and Communication Engineering …, 2016
192016
Hierarchical secure virtualization model for cloud
S Manavi, S Mohammadalian, NI Udzir, A Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
192012
The system can't perform the operation now. Try again later.
Articles 1–20