default search action
Azizol Abdullah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j40]Mohamed Aly Bouke, Omar Imhemed Alramli, Azizol Abdullah:
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection. Int. J. Inf. Sec. 24(1): 5 (2025) - 2024
- [j39]Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, Sedat Akleylek:
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems. PeerJ Comput. Sci. 10: e2043 (2024) - [j38]Muhammad Zunnurain Hussain, Zurina Mohd Hanapi, Azizol Abdullah, Masnida Hussin, Mohd Izuan Hafez Ninggal:
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN). PeerJ Comput. Sci. 10: e2231 (2024) - [c24]Azizol Abdullah, Mohamed Aly Bouke:
Towards Image-Based Network Traffic Pattern Detection for DDoS Attacks in Cloud Computing Environments: A Comparative Study. CLOSER 2024: 287-294 - 2023
- [j37]Mohamed Aly Bouke, Azizol Abdullah, Jaroslav Frnda, Korhan Cengiz, Bashir Salah:
BukaGini: A Stability-Aware Gini Index Feature Selection Algorithm for Robust Model Performance. IEEE Access 11: 59386-59396 (2023) - [j36]Mohamed Aly Bouke, Azizol Abdullah:
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability. Expert Syst. Appl. 230: 120715 (2023) - [j35]Kailun Eng, Abdullah Muhammed, Azizol Abdullah, Masnida Hussin, Sazlinah Hasan, Mohamad Afendee Mohamed:
An Estimation-Based Dynamic Load Balancing Algorithm for Efficient Load Distribution and Balancing in Heterogeneous Grid Computing Environment. J. Grid Comput. 21(1): 7 (2023) - [j34]Mohamed Aly Bouke, Azizol Abdullah, Sameer Hamoud Alshatebi, Mohd Taufik Abdullah, Hayate El Atigh:
An intelligent DDoS attack detection tree-based model using Gini index feature selection method. Microprocess. Microsystems 98: 104823 (2023) - [i3]Mohamed Aly Bouke, Sameer Hamoud Alshatebi, Azizol Abdullah, Korhan Cengiz, Hayate El Atigh:
African Union Convention on Cyber Security and Personal Data Protection: Challenges and Future Directions. CoRR abs/2307.01966 (2023) - [i2]Mohamed Aly Bouke, Azizol Abdullah:
Turnkey Technology: A Powerful Tool for Cyber Warfare. CoRR abs/2308.14576 (2023) - [i1]Suleiman Sa'ad, Abdullah Muhammed, Mohammed Abdullahi, Azizol Abdullah:
An optimised cuckoo-based discrete symbiotic organisms search strategy for tasks scheduling in cloud computing environment. CoRR abs/2311.15358 (2023) - 2021
- [j33]Fazlina Mohd Ali, Rohaya Latip, Mohamed A. Alrshah, Azizol Abdullah, Hamidah Ibrahim:
Vigorous Replication Strategy With Balanced Quorum for Minimizing the Storage Consumption and Response Time in Cloud Environments. IEEE Access 9: 121771-121785 (2021) - [j32]Suleiman Sa'ad, Abdullah Muhammed, Mohammed Abdullahi, Azizol Abdullah, Fahrul Hakim Ayob:
An Enhanced Discrete Symbiotic Organism Search Algorithm for Optimal Task Scheduling in the Cloud. Algorithms 14(7): 200 (2021) - [j31]Ahmed Adnan, Abdullah Muhammed, Abdul Azim Abdul Ghani, Azizol Abdullah, Fahrul Hakim Ayob:
An Intrusion Detection System for the Internet of Things Based on Machine Learning: Review and Challenges. Symmetry 13(6): 1011 (2021) - [j30]Mohammed Ibrahim, Mohd Taufik Abdullah, Azizol Abdullah, Thinagaran Perumal:
The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation. Wirel. Pers. Commun. 119(3): 2093-2105 (2021) - [j29]Mohammed Ibrahim, Mohd Taufik Abdullah, Azizol Abdullah, Thinagaran Perumal:
Correction to: The Impact of Memory‑Efficient Bots on IoT‑WSN Botnet Propagation. Wirel. Pers. Commun. 119(3): 2107 (2021) - [c23]Fazlina Binti Mohd Ali, Rohaya Latip, Hamidah Ibrahim, Azizol Abdullah:
Optimization on Replication Performance via Balance Quorum (BQ) and Data Center Selection Method (DCSM) Algorithms in Cloud Environment. ICECC 2021: 1-6 - [c22]Mohd Hairy Mohamaddiah, Azizol Abdullah, Shamala K. Subramaniam, Masnida Hussin, Mazuhan Mohamad Nor:
Resource Selection Mechanism For Brokering Services In Multi-cloud Environment. ICEEI 2021: 1-5 - 2020
- [j28]Ahmed Adnan, Abdullah Muhammed, Abdul Azim Abdul Ghani, Azizol Abdullah, Fahrul Hakim Ayob:
Hyper-Heuristic Framework for Sequential Semi-Supervised Classification Based on Core Clustering. Symmetry 12(8): 1292 (2020) - [j27]Mohammed A. Alsaih, Rohaya Latip, Azizol Abdullah, Shamala K. Subramaniam, Kamal Ali Alezabi:
Dynamic Job Scheduling Strategy Using Jobs Characteristics in Cloud Computing. Symmetry 12(10): 1638 (2020)
2010 – 2019
- 2019
- [j26]Fara Jamal, Mohd Taufik Abdullah, Zurina Mohd Hanapi, Azizol Abdullah:
Reliable Access Control for Mobile Cloud Computing (MCC) With Cache-Aware Scheduling. IEEE Access 7: 165155-165165 (2019) - 2018
- [j25]Somayyeh Gholizadeh, Azizol B. H. J. Abdullah, Mohamed Othman, Zurina Mohd Hanapi:
Optimized topology control in mobile IP networks using a new parametric routing algorithm. Comput. Electr. Eng. 68: 225-240 (2018) - [j24]Zaid A. Abdulkader, Azizol Abdullah, Mohd Taufik Abdullah, Zuriati Ahmad Zukarnain:
Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks. Int. J. Netw. Virtual Organisations 19(2/3/4): 153-175 (2018) - [j23]Zayd Ashraf Shareef, Masnida Hussin, Azizol Abdullah, Abdullah Muhammed:
Class-based QoS scheduling of WiMAX networks. J. High Speed Networks 24(4): 345-362 (2018) - 2017
- [j22]Mohammad Ali Khosh Kholghi, Mohd Noor Derahman, Azizol Abdullah, Shamala Subramaniam, Mohamed Othman:
Energy-Efficient Algorithms for Dynamic Virtual Machine Consolidation in Cloud Data Centers. IEEE Access 5: 10709-10722 (2017) - [j21]Maharazu Mamman, Zurina Mohd Hanapi, Azizol Abdullah, Abdullah Muhammed:
An Adaptive Call Admission Control With Bandwidth Reservation for Downlink LTE Networks. IEEE Access 5: 10986-10994 (2017) - [j20]Ameen M. Alkharasani, Mohamed Othman, Azizol Abdullah, Kweh Yeah Lun:
An Improved Quality-of-Service Performance Using RED's Active Queue Management Flow Control in Classifying Networks. IEEE Access 5: 24467-24478 (2017) - [j19]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
State of the Art in Biometric Key Binding and Key Generation Schemes. Int. J. Commun. Networks Inf. Secur. 9(3) (2017) - [j18]Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol B. H. J. Abdullah, Salman Yussof:
An effective approach for managing power consumption in cloud computing infrastructure. J. Comput. Sci. 21: 349-360 (2017) - [j17]Faruku Umar Ambursa, Rohaya Latip, Azizol Abdullah, Shamala Subramaniam:
A particle swarm optimization and min-max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids. J. Supercomput. 73(5): 2018-2051 (2017) - [c21]Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol B. H. J. Abdullah, Salman Yussof:
Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing. MobileCloud 2017: 161-164 - 2016
- [j16]Ameen M. Alkharasani, Mohamed Othman, Azizol Abdullah, Kweh Yeah Lun:
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks. EURASIP J. Wirel. Commun. Netw. 2016: 76 (2016) - [c20]Omid Seifaddini, Azizol Abdullah, Abdullah Muhammed, Masnida Hussin:
Great Deluge and Extended Great Deluge Based Job Scheduling in Grid Computing Using GridSim. ICCSA (2) 2016: 292-302 - [c19]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
A Hybrid Scheme for Face Template Protection. IMCOM 2016: 6:1-6:7 - [c18]Normalia Samian, Winston K. G. Seah, Zuriati Ahmad Zukarnain, Azizol Abdullah, Zurina Mohd Hanapi:
Recharge-as-Reward Mechanism to Incentivize Cooperative Nodes in Mobile Ad Hoc Networks. LCN 2016: 535-538 - [c17]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation. WISA 2016: 341-352 - 2015
- [j15]Radhwan M. Abduallah, Zuriati Zukarnain, Farzaneh Masoumiyan, Azizol Abdullah:
Mobility and Handover Technique in Heterogeneous Wireless Networks. J. Comput. Sci. 11(3): 466-473 (2015) - [j14]Mohammed Nazeh Abdul Wahid, Azizol Abdullah:
Detecting an Anomaly Behavior through Enhancing the Mechanism of Packet Filtering. J. Comput. Sci. 11(6): 784-793 (2015) - [j13]Normalia Samian, Zuriati Ahmad Zukarnain, Winston Khoon Guan Seah, Azizol Abdullah, Zurina Mohd Hanapi:
Cooperation stimulation mechanisms for wireless multihop networks: A survey. J. Netw. Comput. Appl. 54: 88-106 (2015) - [c16]Normalia Samian, Zuriati Ahmad Zukarnain, Azizol Abdullah, Zurina Mohd Hanapi:
Compare and measure selfishness detection (CMSD) mechanism: Promptness and accuracy. ICUFN 2015: 851-856 - 2014
- [j12]Mohammad Ali Khosh Kholghi, Azizol Abdullah, Rohaya Latip, Shamala Subramaniam, Mohamed Othman:
Disaster Recovery in Cloud Computing: A Survey. Comput. Inf. Sci. 7(4): 39-54 (2014) - [j11]Omid Seifaddini, Azizol Abdullah, Shamala Subramaniam:
An Event Driven simulation for adaptive Gentle Random Early Detection (Agred) Algorithm. J. Comput. Sci. 10(10): 1939-1945 (2014) - [j10]Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Mostafa Behzadi, Ramlan Mahmod, Norwati Mustapha:
Intrusion Detection System in Secure Shell Traffic in Cloud Environment. J. Comput. Sci. 10(10): 2029-2036 (2014) - [j9]Rohaya Latip, Zulaile Mabni, Hamidah Ibrahim, Azizol Abdullah, Masnida Hussin:
A Clustering-based Hybrid Replica control Protocol for High Availability in Grid Environment. J. Comput. Sci. 10(12): 2442-2449 (2014) - [j8]Bakri Yahaya, Rohaya Latip, Azizol Abdullah, Mohamed Othman:
Resource Broker Management by Adopting Self-adaptive Multi-Instance Broker Scheduling in Grid Computing. J. Comput. Sci. 10(12): 2553-2563 (2014) - [j7]Maizura Ibrahim, Hamidah Ibrahim, Azizol Abdullah, Rohaya Latip:
Enhancing the Performance of Advanced Fine-Grained Grid Authorization System. J. Comput. Sci. 10(12): 2576-2583 (2014) - [j6]Somayyeh Gholizadeh, Azizol Abdullah, Mohamed Othman, Zurina Mohd Hanapi, Mohsen Heydarian:
Optimized performance data transmission in Mobile IP networks. J. Supercomput. 70(2): 906-929 (2014) - [j5]Radhwan M. Abdullah, Azizol Abdullah, Nor Asilah Wati Abdul Hamid, Mohamed Othman, Shamala Subramaniam:
A Network Selection Algorithm Based on Enhanced Access Router Discovery in Heterogeneous Wireless Networks. Wirel. Pers. Commun. 77(3): 1733-1750 (2014) - [c15]Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol Abdullah:
A review of cloud security based on cryptographic mechanisms. ISBAST 2014: 106-111 - [c14]Warusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Hazura Zulzalil, Zaiton Muda:
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers. ISBAST 2014: 232-237 - [c13]Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Ramlan Mahmod, Norwati Mustapha:
Distributed Denial of Service detection using hybrid machine learning technique. ISBAST 2014: 268-273 - [c12]Warusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Zaiton Muda, Hazura Zulzalil:
Packet Header Anomaly Detection Using Statistical Analysis. SOCO-CISIS-ICEUTE 2014: 473-482 - 2013
- [c11]Mohammad Yaser Shafazand, Rohaya Latip, Azizol Abdullah, Masnida Hussin:
A Model for Client Recommendation to a Desktop Grid Server. DaEng 2013: 491-498 - [c10]Bakri Yahaya, Rohaya Latip, Azizol Abdullah, Mohamed Othman:
The Idle Resource Items Workload and Implication on Different Weight Balance Rate in Grid Scheduling. DaEng 2013: 587-595 - [c9]Masnida Hussin, Azizol Abdullah, Shamala K. Subramaniam:
Adaptive Resource Allocation for Reliable Performance in Heterogeneous Distributed Systems. ICA3PP (2) 2013: 51-58 - 2012
- [j4]Azizol Abdullah, Rohaya Latip, Wan Mohd Azraei Wan Mustapha:
Evaluation of an Economy-Based File Replication Strategy for Malaysian Research and Education Network (MYREN) Data Grid Model. Comput. Inf. Sci. 5(1): 62-76 (2012) - [c8]Warusia Yassin, Nur Izura Udzir, Zaiton Muda, Azizol Abdullah, Mohd Taufik Abdullah:
A Cloud-based Intrusion Detection Service framework. CyberSec 2012: 213-218 - [c7]Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah:
Hierarchical secure virtualization model for cloud. CyberSec 2012: 219-224 - 2011
- [c6]Bakri Yahaya, Rohaya Latip, Mohamed Othman, Azizol Abdullah:
Dynamic Load Balancing Policy in Grid Computing with Multi-Agent System Integration. ICSECS (1) 2011: 416-424 - [c5]Radhwan M. Abduallah, Nor Asilah Wati Abdul Hamid, Shamala K. Subramaniam, Azizol Abdullah:
Fast Handover Technique for Efficient IPv6 Mobility Support in Heterogeneous Networks. ICSECS (3) 2011: 419-428
2000 – 2009
- 2009
- [j3]Rohaya Latip, Mohamed Othman, Azizol Abdullah, Hamidah Ibrahim, Md Nasir Sulaiman:
Quorum-based Data Replication in Grid Environment. Int. J. Comput. Intell. Syst. 2(4): 386-397 (2009) - 2008
- [j2]Rohaya Latip, Hamidah Ibrahim, Mohamed Othman, Md Nasir Sulaiman, Azizol Abdullah:
High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment. Comput. Inf. Sci. 1(2): 95-105 (2008) - [c4]Rohaya Latip, Hamidah Ibrahim, Mohamed Othman, Md Nasir Sulaiman, Azizol Abdullah:
Quorum Based Data Replication in Grid Environment. RSKT 2008: 379-386 - 2007
- [c3]Rohaya Latip, Hamidah Ibrahim, Mohamed Othman, Md Nasir Sulaiman, Azizol Abdullah:
Diagonal Data Replication in Grid Environment. ICCSA (3) 2007: 763-773 - 2005
- [j1]Azizol Abdullah, Mohamed Othman, Md Nasir Sulaiman, Hamidah Ibrahim, Abu Talib Othman:
Data discovery algorithm for scientific data grid environment. J. Parallel Distributed Comput. 65(11): 1429-1434 (2005) - 2004
- [c2]Azizol Abdullah, Mohamed Othman, Md Nasir Sulaiman, Hamidah Ibrahim, Abu Talib Othman:
Data Discovery Mechanism for a Large Peer-to-Peer Based Scientific Data Grid Environment. ICCSA (2) 2004: 146-157 - 2001
- [c1]Abu Talib Othman, Azizol Abdullah, Abul Razak Rahmat:
The Web based Information Grid: Highly Reliable Global Information Services Infrastructure. WebNet 2001: 959-966
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint