Follow
Azween Bin Abdullah PhD FBCS
Azween Bin Abdullah PhD FBCS
Taylors University
Verified email at alumni.usc.edu - Homepage
Title
Cited by
Cited by
Year
A survey on routing techniques in underwater wireless sensor networks
M Ayaz, I Baig, A Abdullah, I Faye
Journal of Network and Computer Applications 34 (6), 1908-1927, 2011
4402011
Hop-by-hop dynamic addressing based (H2-DAB) routing protocol for underwater wireless sensor networks
M Ayaz, A Abdullah
2009 international conference on information and multimedia technology, 436-441, 2009
2222009
Load balancing techniques in cloud computing environment: A review
DA Shafiq, NZ Jhanjhi, A Abdullah
Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022
1822022
Ransomware, threat and detection techniques: A review
S Kok, A Abdullah, N Jhanjhi, M Supramaniam
Int. J. Comput. Sci. Netw. Secur 19 (2), 136, 2019
1712019
A load balancing algorithm for the data centres to optimize cloud computing applications
DA Shafiq, NZ Jhanjhi, A Abdullah, MA Alzain
IEEE Access 9, 41731-41744, 2021
1572021
Application of artificial neural network in detection of DOS attacks
I Ahmad, AB Abdullah, AS Alghamdi
Proceedings of the 2nd international conference on Security of information …, 2009
1372009
Phishing website detection: An improved accuracy through feature selection and ensemble learning
AA Ubing, SKB Jasmi, A Abdullah, NZ Jhanjhi, M Supramaniam
International Journal of Advanced Computer Science and Applications 10 (1), 2019
1312019
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
S Lee, A Abdullah, N Jhanjhi, S Kok
PeerJ Computer Science 7, e350, 2021
1242021
An efficient dynamic addressing based routing protocol for underwater wireless sensor networks
M Ayaz, A Abdullah, I Faye, Y Batira
Computer Communications 35 (4), 475-486, 2012
1182012
Early detection of crypto-ransomware using pre-encryption detection algorithm
SH Kok, A Abdullah, NZ Jhanjhi
Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022
1102022
Prevention of crypto-ransomware using a pre-encryption detection algorithm
SH Kok, A Abdullah, NZ Jhanjhi, M Supramaniam
Computers 8 (4), 79, 2019
1082019
Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study
VE Adeyemo, A Abdullah, NZ JhanJhi, M Supramaniam, AO Balogun
International Journal of Advanced Computer Science and Applications 10 (9), 2019
1032019
Performance optimization of criminal network hidden link prediction model with deep reinforcement learning
M Lim, A Abdullah, NZ Jhanjhi
Journal of King Saud University-Computer and Information Sciences 33 (10 …, 2021
1012021
Evaluation metric for crypto-ransomware detection using machine learning
SH Kok, A Azween, NZ Jhanjhi
Journal of Information Security and Applications 55, 102646, 2020
922020
Usability testing methodology: Effectiveness of heuristic evaluation in E-government website development
A Sivaji, A Abdullah, AG Downe
2011 fifth Asia modelling symposium, 68-72, 2011
922011
A new model for predicting component-based software reliability using soft computing
C Diwaker, P Tomar, A Solanki, A Nayyar, NZ Jhanjhi, A Abdullah, ...
IEEE Access 7, 147191-147203, 2019
862019
Hidden link prediction in criminal networks using the deep reinforcement learning technique
M Lim, A Abdullah, NZ Jhanjhi, M Supramaniam
Computers 8 (1), 8, 2019
862019
Systematic analysis of applied data mining based optimization algorithms in clinical attribute extraction and classification for diagnosis of cardiac patients
N Kausar, S Palaniappan, BB Samir, A Abdullah, N Dey
Applications of Intelligent Optimization in Biology and Medicine: Current …, 2016
852016
Importance of incorporating fundamental usability with social & trust elements for e-commerce website
A Sivaji, AG Downe, MF Mazlan, ST Soo, A Abdullah
2011 International Conference on Business, Engineering and Industrial …, 2011
842011
Temporary cluster based routing for underwater wireless sensor networks
M Ayaz, A Abdullah, LT Jung
2010 International Symposium on Information Technology 2, 1009-1014, 2010
802010
The system can't perform the operation now. Try again later.
Articles 1–20