Zurina Mohd Hanapi
Zurina Mohd Hanapi
Associate Professor
Verified email at - Homepage
Cited by
Cited by
Comparison of ECC and RSA algorithm in resource constrained devices
M Bafandehkar, SM Yasin, R Mahmod, ZM Hanapi
2013 international conference on IT convergence and security (ICITCS), 1-3, 2013
A framework based on RSA and AES encryption algorithms for cloud computing services
N Khanezaei, ZM Hanapi
2014 IEEE conference on systems, process and control (ICSPC 2014), 58-62, 2014
Neighbor-based dynamic connectivity factor routing protocol for mobile ad hoc network
AME Ejmaa, S Subramaniam, ZA Zukarnain, ZM Hanapi
IEEE Access 4, 8053-8064, 2016
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah
IEEE Access 8, 70651-70663, 2020
An adaptive relay selection scheme for enhancing network stability in VANETs
NM Al-Kharasani, ZA Zukarnain, SK Subramaniam, ZM Hanapi
IEEE Access 8, 128757-128765, 2020
An energy aware distributed clustering algorithm using fuzzy logic for wireless sensor networks with non-uniform node distribution
N Nokhanji, ZM Hanapi, S Subramaniam, MA Mohamed
Wireless Personal Communications 84, 395-419, 2015
Cooperation stimulation mechanisms for wireless multihop networks: A survey
N Samian, ZA Zukarnain, WKG Seah, A Abdullah, ZM Hanapi
Journal of Network and Computer Applications 54, 88-106, 2015
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
MY Akhlaqi, ZBM Hanapi
Journal of Network and Computer Applications 212, 103568, 2023
Comparative study of high-speed Linux TCP variants over high-BDP networks
MA Alrshah, M Othman, B Ali, ZM Hanapi
Journal of network and computer applications 43, 66-75, 2014
An adaptive call admission control with bandwidth reservation for downlink LTE networks
M Mamman, ZM Hanapi, A Abdullah, A Muhammed
IEEE Access 5, 10986-10994, 2017
Reliability review of interconnection networks
NA Md Yunus, M Othman, Z Mohd Hanapi, KY Lun
IETE Technical Review 33 (6), 596-606, 2016
Quality of service class identifier (QCI) radio resource allocation algorithm for LTE downlink
M Mamman, ZM Hanapi, A Abdullah, A Muhammed
PloS one 14 (1), e0210310, 2019
Trufix: A configurable trust-based cross-layer protocol for wireless sensor networks
IA Umar, ZM Hanapi, A Sali, ZA Zulkarnain
IEEE Access 5, 2550-2562, 2017
Multi-objective grey wolf optimizer algorithm for task scheduling in cloud-fog computing
FA Saif, R Latip, ZM Hanapi, K Shafinah
IEEE Access 11, 20635-20646, 2023
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
A Arshad, ZM Hanapi, S Subramaniam, R Latip
PeerJ Computer Science 7, e673, 2021
An efficient framework model for optimizing routing performance in VANETs
NM Al-Kharasani, ZA Zulkarnain, S Subramaniam, ZM Hanapi
Sensors 18 (2), 597, 2018
A review on LiFi network research: Open issues, applications and future directions
R Badeel, SK Subramaniam, ZM Hanapi, A Muhammed
Applied Sciences 11 (23), 11118, 2021
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: A review paper
HQ Qadori, ZA Zulkarnain, ZM Hanapi, S Subramaniam
International Journal of Distributed Sensor Networks 13 (1), 1550147716684841, 2017
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
DAA Zainaddin, ZM Hanapi
Journal of Computer Science 9 (3), 391, 2013
Dynamic backoff collision resolution for massive M2M random access in cellular IoT networks
HD Althumali, M Othman, NK Noordin, ZM Hanapi
IEEE Access 8, 201345-201359, 2020
The system can't perform the operation now. Try again later.
Articles 1–20