Follow
Azween Bin Abdullah PhD FBCS
Azween Bin Abdullah PhD FBCS
Taylors University
Verified email at alumni.usc.edu - Homepage
Title
Cited by
Cited by
Year
A survey on routing techniques in underwater wireless sensor networks
M Ayaz, I Baig, A Abdullah, I Faye
Journal of Network and Computer Applications 34 (6), 1908-1927, 2011
4302011
Hop-by-hop dynamic addressing based (H2-DAB) routing protocol for underwater wireless sensor networks
M Ayaz, A Abdullah
2009 international conference on information and multimedia technology, 436-441, 2009
2172009
Ransomware, threat and detection techniques: A review
S Kok, A Abdullah, N Jhanjhi, M Supramaniam
Int. J. Comput. Sci. Netw. Secur 19 (2), 136, 2019
1432019
Load balancing techniques in cloud computing environment: A review
DA Shafiq, NZ Jhanjhi, A Abdullah
Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022
1412022
A load balancing algorithm for the data centres to optimize cloud computing applications
DA Shafiq, NZ Jhanjhi, A Abdullah, MA Alzain
IEEE Access 9, 41731-41744, 2021
1292021
Application of artificial neural network in detection of DOS attacks
I Ahmad, AB Abdullah, AS Alghamdi
Proceedings of the 2nd international conference on Security of information …, 2009
1242009
Phishing website detection: An improved accuracy through feature selection and ensemble learning
AA Ubing, SKB Jasmi, A Abdullah, NZ Jhanjhi, M Supramaniam
International Journal of Advanced Computer Science and Applications 10 (1), 2019
1152019
An efficient dynamic addressing based routing protocol for underwater wireless sensor networks
M Ayaz, A Abdullah, I Faye, Y Batira
Computer Communications 35 (4), 475-486, 2012
1142012
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
S Lee, A Abdullah, N Jhanjhi, S Kok
PeerJ Computer Science 7, e350, 2021
1132021
Prevention of crypto-ransomware using a pre-encryption detection algorithm
SH Kok, A Abdullah, NZ Jhanjhi, M Supramaniam
Computers 8 (4), 79, 2019
942019
Performance optimization of criminal network hidden link prediction model with deep reinforcement learning
M Lim, A Abdullah, NZ Jhanjhi
Journal of King Saud University-Computer and Information Sciences 33 (10 …, 2021
892021
Usability testing methodology: Effectiveness of heuristic evaluation in E-government website development
A Sivaji, A Abdullah, AG Downe
2011 fifth Asia modelling symposium, 68-72, 2011
872011
Early detection of crypto-ransomware using pre-encryption detection algorithm
SH Kok, A Abdullah, NZ Jhanjhi
Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022
842022
Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study
VE Adeyemo, A Abdullah, NZ JhanJhi, M Supramaniam, AO Balogun
International Journal of Advanced Computer Science and Applications 10 (9), 2019
842019
Systematic analysis of applied data mining based optimization algorithms in clinical attribute extraction and classification for diagnosis of cardiac patients
N Kausar, S Palaniappan, BB Samir, A Abdullah, N Dey
Applications of Intelligent Optimization in Biology and Medicine: Current …, 2016
812016
Importance of incorporating fundamental usability with social & trust elements for e-commerce website
A Sivaji, AG Downe, MF Mazlan, ST Soo, A Abdullah
2011 International Conference on Business, Engineering and Industrial …, 2011
812011
Evaluation metric for crypto-ransomware detection using machine learning
SH Kok, A Azween, NZ Jhanjhi
Journal of Information Security and Applications 55, 102646, 2020
802020
A new model for predicting component-based software reliability using soft computing
C Diwaker, P Tomar, A Solanki, A Nayyar, NZ Jhanjhi, A Abdullah, ...
IEEE Access 7, 147191-147203, 2019
802019
Hidden link prediction in criminal networks using the deep reinforcement learning technique
M Lim, A Abdullah, NZ Jhanjhi, M Supramaniam
Computers 8 (1), 8, 2019
782019
Application of artificial neural network in detection of probing attacks
I Ahmad, AB Abdullah, AS Alghamdi
2009 IEEE Symposium on Industrial Electronics & Applications 2, 557-562, 2009
772009
The system can't perform the operation now. Try again later.
Articles 1–20