Follow
Raja Azlina Raja Mahmood
Raja Azlina Raja Mahmood
Faculty of Computer Science and Information Technology, Universiti Putra Malaysia
Verified email at upm.edu.my
Title
Cited by
Cited by
Year
A method for analyzing text using VOSviewer
UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ...
MethodsX 11, 102339, 2023
1352023
A survey on detecting black hole attack in AODV-based mobile ad hoc networks
RAR Mahmood, AI Khan
2007 International Symposium on High Capacity Optical Networks and Enabling …, 2007
722007
Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime
OA Amodu, RAR Mahmood
Wireless Networks 22 (November), 1-24, 2016
472016
Feature selection based on genetic algorithm and SupportVector machine for intrusion detection system
A Dastanpour, RAR Mahmood
The second international conference on informatics engineering & information …, 2013
352013
Age of Information minimization in UAV-aided data collection for WSN and IoT applications: A systematic review
OA Amodu, UA Bukar, RAR Mahmood, C Jarray, M Othman
Journal of Network and Computer Applications 216, 103652, 2023
282023
A method for analyzing text using VOSviewer. MethodsX, 11, 102339
UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ...
252023
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
RAR Mahmood, AH Abdi, M Hussin
Baghdad Science Journal 18 (2 (Suppl.)), 0884-0884, 2021
252021
Analysis of pattern recognition algorithms using associative memory approach: a comparative study between the hopfield network and distributed hierarchical graph neuron (DHGN)
AHM Amin, RAR Mahmood, AI Khan
2008 IEEE 8th International Conference on Computer and Information …, 2008
182008
A survey on the design aspects and opportunities in age-aware uav-aided data collection for sensor networks and internet of things applications
OA Amodu, R Nordin, C Jarray, UA Bukar, RA Raja Mahmood, M Othman
Drones 7 (4), 260, 2023
172023
Malware classification framework for dynamic analysis using information theory
E Moshiri, AB Abdullah, R Azlina, B Raja, Z Muda
Indian Journal of Science and Technology 10 (21), 1-10, 2017
92017
An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks
AI Khan, AHM Amin, RAR Mahmood
Mobile Intelligence, 380-411, 2010
82010
R.(2023). A method for analyzing text using VOSviewer
UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ...
MethodsX 11, 102339, 0
8
Text Analysis on Early Reactions to ChatGPT as a Tool for Academic Progress or Exploitation
UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ...
SN Computer Science 5 (4), 366, 2024
62024
A Method for Analyzing Text Using VOSviewer. MethodsX. 2023; 11: 102339
UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ...
52023
Sentiment evaluation of public transport in social media using naïve bayes method
N Othman, M Hussin, RAR Mahmood
Int J Eng Adv Technol 9, 2305-2308, 2019
52019
An experimental ipv6 testbed system with mobile ipv6
RAR Mahmood, M Othman, A Muhammed
Proceedings of Information Technology Colloquium, 122-128, 2004
52004
Performance evaluation of intrusion detection system using selected features and machine learning classifiers. Baghdad Sci. J. 2021; 18 (2 (Suppl.)): 0884
RAR Mahmood, A Abdi, M Hussin
5
IPv6 Translator: Makes IPv6 Migration Much Easier
K Anuttullah, MKM Supian, RAR Mahmood
Proceedings of 4th MIMOS R&D Symposium on ICT and Microelectronics, 25-40, 2002
42002
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
RAR Mahmood, M Hussin, N Manshor, AI Khan
2014 International Conference on Computational Science and Technology (ICCST …, 2014
32014
Effective black hole attacks in MANETS
RAR Mahmood, ZM Hanapi, S Hasan, AI Khan
Journal of Computer Science 9 (12), 1722-1733, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20