Follow
Raja Azlina Raja Mahmood
Raja Azlina Raja Mahmood
Faculty of Computer Science and Information Technology, Universiti Putra Malaysia
Verified email at upm.edu.my
Title
Cited by
Cited by
Year
A survey on detecting black hole attack in AODV-based mobile ad hoc networks
RAR Mahmood, AI Khan
2007 International Symposium on High Capacity Optical Networks and Enabling …, 2007
712007
Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime
OA Amodu, RAR Mahmood
Wireless Networks 22 (November), 1-24, 2016
442016
Feature selection based on genetic algorithm and SupportVector machine for intrusion detection system
A Dastanpour, RAR Mahmood
The second international conference on informatics engineering & information …, 2013
342013
A method for analyzing text using VOSviewer
UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ...
MethodsX 11, 102339, 2023
322023
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
RAR Mahmood, AH Abdi, M Hussin
Baghdad Science Journal 18 (2 (Suppl.)), 0884-0884, 2021
182021
Analysis of pattern recognition algorithms using associative memory approach: a comparative study between the hopfield network and distributed hierarchical graph neuron (DHGN)
AHM Amin, RAR Mahmood, AI Khan
2008 IEEE 8th International Conference on Computer and Information …, 2008
172008
Age of Information minimization in UAV-aided data collection for WSN and IoT applications: A systematic review
OA Amodu, UA Bukar, RAR Mahmood, C Jarray, M Othman
Journal of Network and Computer Applications 216, 103652, 2023
152023
A survey on the design aspects and opportunities in age-aware uav-aided data collection for sensor networks and internet of things applications
OA Amodu, R Nordin, C Jarray, UA Bukar, RA Raja Mahmood, M Othman
Drones 7 (4), 260, 2023
102023
Malware classification framework for dynamic analysis using information theory
E Moshiri, AB Abdullah, R Azlina, B Raja, Z Muda
Indian Journal of Science and Technology 10 (21), 1-10, 2017
92017
An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks
AI Khan, AHM Amin, RAR Mahmood
Mobile Intelligence, 380-411, 2010
82010
Sentiment evaluation of public transport in social media using naïve bayes method
N Othman, M Hussin, RAR Mahmood
Int J Eng Adv Technol 9, 2305-2308, 2019
52019
An experimental ipv6 testbed system with mobile ipv6
RAR Mahmood, M Othman, A Muhammed
Proceedings of Information Technology Colloquium, 122-128, 2004
52004
IPv6 Translator: Makes IPv6 Migration Much Easier
K Anuttullah, MKM Supian, RAR Mahmood
Proceedings of 4th MIMOS R&D Symposium on ICT and Microelectronics, 25-40, 2002
42002
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
RAR Mahmood, M Hussin, N Manshor, AI Khan
2014 International Conference on Computational Science and Technology (ICCST …, 2014
32014
A distributed hierarchical graph neuron-based classifier: An efficient, low-computational classifier
RAR Mahmood, AHM Amin, AI Khan
2008 First International Conference on Intelligent Networks and Intelligent …, 2008
32008
Effective black hole attacks in MANETS
RAR Mahmood, ZM Hanapi, S Hasan, AI Khan
Journal of Computer Science 9 (12), 1722-1733, 2013
22013
Lightweight and distributed attack detection scheme in mobile ad hoc networks
RAR Mahmood, AHM Amin, A Amir, AI Khan
Proceedings of the 7th International Conference on Advances in Mobile …, 2009
22009
IPv6: Measuring the Challenges
MM Fadzil, RAR Mahmood
Proceedings of 2nd MIMOS R&D Symposium on ICT and Microelectronics, 151-163, 2000
22000
PRIVACY BASED CLASSIFICATION MODEL OF PUBLIC DATA BY UTILIZING TWO-STEPS VALIDATION APPROACH.
M HUSSIN, RA RAJA MAHMOOD, NURR SALIM
Asia-Pacific Journal of Information Technology & Multimedia 11 (2), 2022
12022
Distributed Defense Scheme for Managing DNS Reflection Attack in Network Communication Systems
DH Ahmed, M Hussin, A Abdullah, RAR Mahmood
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8 …, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20