متابعة
shukor razak
shukor razak
بريد إلكتروني تم التحقق منه على utm.my
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review
MA Alsoufi, S Razak, MM Siraj, I Nafea, FA Ghaleb, F Saeed, M Nasser
Applied sciences 11 (18), 8383, 2021
1772021
Financial fraud detection based on machine learning: a systematic literature review
A Ali, S Abd Razak, SH Othman, TAE Eisa, A Al-Dhaqm, M Nasser, ...
Applied Sciences 12 (19), 9637, 2022
1642022
Trust-based routing mechanism in MANET: Design and implementation
T Eissa, S Abdul Razak, RH Khokhar, N Samian
Mobile Networks and Applications 18, 666-677, 2013
1212013
Involvement of surveillance drones in smart cities: A systematic review
A Gohari, AB Ahmad, RBA Rahim, ASM Supa’at, S Abd Razak, ...
IEEE Access 10, 56611-56628, 2022
1012022
Interference-aware multipath routing protocol for QoS improvement in event-driven wireless sensor networks
M Radi, B Dezfouli, KA Bakar, S Abd Razak, MA Nematbakhsh
Tsinghua Science and Technology 16 (5), 475-490, 2011
912011
LIEMRO: a Low-Interference energy-efficient multipath routing protocol for improving QoS in event-based wireless sensor networks
M Radi, B Dezfouli, S Abd Razak, KA Bakar
2010 Fourth International Conference on Sensor Technologies and Applications …, 2010
892010
A review of mobile forensic investigation process models
A Al-Dhaqm, S Abd Razak, RA Ikuesan, VR Kebande, K Siddique
IEEE access 8, 173359-173375, 2020
832020
Energy-efficient data collection in wireless sensor networks
MH Anisi, AH Abdullah, S Abd Razak
Wireless Sensor Network 3 (10), 329, 2011
822011
An overview of data routing approaches for wireless sensor networks
MH Anisi, AH Abdullah, SA Razak, MA Ngadi
Sensors 12 (4), 3964-3996, 2012
682012
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
SA Razak, SM Furnell, NL Clarke, PJ Brooke
Ad Hoc Networks 6 (7), 1151-1167, 2008
652008
Categorization and organization of database forensic investigation processes
A Al-Dhaqm, S Abd Razak, DA Dampier, KKR Choo, K Siddique, ...
IEEE Access 8, 112846-112858, 2020
612020
CDBFIP: Common database forensic investigation processes for Internet of Things
A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar
IEEE Access 5, 24401-24416, 2017
612017
Modeling low-power wireless communications
B Dezfouli, M Radi, S Abd Razak, T Hwee-Pink, KA Bakar
Journal of Network and Computer Applications 51, 102-126, 2015
612015
Delaunay triangulation as a new coverage measurement method in wireless sensor network
H Chizari, M Hosseini, T Poston, SA Razak, AH Abdullah
Sensors 11 (3), 3163-3176, 2011
602011
Research challenges and opportunities in drone forensics models
A Al-Dhaqm, RA Ikuesan, VR Kebande, S Razak, FM Ghabban
Electronics 10 (13), 1519, 2021
582021
Towards the development of an integrated incident response model for database forensic investigation field
A Al-Dhaqm, S Abd Razak, K Siddique, RA Ikuesan, VR Kebande
IEEE Access 8, 145018-145032, 2020
552020
Data anonymization using pseudonym system to preserve data privacy
S Abd Razak, NHM Nazari, A Al-Dhaqm
Ieee Access 8, 43256-43264, 2020
512020
Development and validation of a Database Forensic Metamodel (DBFM)
A Al-Dhaqm, S Razak, SH Othman, A Ngadi, MN Ahmed, ...
PloS one 12 (2), e0170793, 2017
502017
Digital forensics subdomains: the state of the art and future directions
A Al-Dhaqm, RA Ikuesan, VR Kebande, S Abd Razak, G Grispos, ...
IEEE Access 9, 152476-152502, 2021
492021
An adaptive protection of flooding attacks model for complex network environments
BA Khalaf, SA Mostafa, A Mustapha, MA Mohammed, MA Mahmoud, ...
Security and Communication Networks 2021 (1), 5542919, 2021
492021
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20