default search action
Shukor Abd Razak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j40]Mohamed Noordin Yusuff Marican, Shukor Abd Razak, Ali Selamat, Siti Hajar Othman:
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review. IEEE Access 11: 5442-5452 (2023) - 2022
- [j39]Adel Gohari, Anuar Bin Ahmad, Ruzairi Bin Abdul Rahim, Abu Sahmah M. Supa'at, Shukor Abd Razak, Mohammed Salih Mohammed Gismalla:
Involvement of Surveillance Drones in Smart Cities: A Systematic Review. IEEE Access 10: 56611-56628 (2022) - [j38]Faiz Zaki, Firdaus Afifi, Shukor Abd Razak, Abdullah Gani, Nor Badrul Anuar:
GRAIN: Granular multi-label encrypted traffic classification using classifier chain. Comput. Networks 213: 109084 (2022) - [j37]Ajoze Abdulraheem Zubair, Shukor Abd Razak, Md. Asri Ngadi, Arafat Al-Dhaqm, Wael M. S. Yafooz, Abdel-Hamid M. Emara, Aldosary Saad, Hussain Al-Aqrabi:
A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm (AI) for Optimal Task Scheduling. Sensors 22(4): 1674 (2022) - [c23]Shilan S. Hameed, Ali Selamat, Liza Abdul Latiff, Shukor Abd Razak, Ondrej Krejcar:
WHTE: Weighted Hoeffding Tree Ensemble for Network Attack Detection at Fog-IoMT. IEA/AIE 2022: 485-496 - [c22]Shilan S. Hameed, Ali Selamat, Liza Abdul Latiff, Shukor Abd Razak, Ondrej Krejcar:
Multi-Classification of Imbalance Worm Ransomware in the IoMT System. SoMeT 2022: 531-541 - 2021
- [j36]Muaadh A. Alsoufi, Shukor Abd Razak, Maheyzah Md Siraj, Bander Ali Saleh Al-rimy, Abdul-Rahman Al-Ali, Maged Nasser, Salah Abdo:
A Review of Anomaly Intrusion Detection Systems in IoT using Deep Learning Techniques. Adv. Data Sci. Adapt. Anal. 13(3&4): 2143001:1-2143001:21 (2021) - [j35]Arafat Al-Dhaqm, Richard Adeyemi Ikuesan, Victor R. Kebande, Shukor Abd Razak, George Grispos, Kim-Kwang Raymond Choo, Bander Ali Saleh Al-Rimy, Abdul Rahman A. Alsewari:
Digital Forensics Subdomains: The State of the Art and Future Directions. IEEE Access 9: 152476-152502 (2021) - [j34]Fuad A. Ghaleb, Bander Ali Saleh Al-Rimy, Wadii Boulila, Faisal Saeed, Maznah Kamat, Mohd. Foad Rohani, Shukor Abd Razak:
Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks. Comput. Intell. Neurosci. 2021: 2977954:1-2977954:19 (2021) - [j33]Bashar Ahmad Khalaf, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak, Mohamed Elhoseny, Adam Marks:
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments. Secur. Commun. Networks 2021: 5542919:1-5542919:17 (2021) - [j32]Shilan S. Hameed, Ali Selamat, Liza Abdul Latiff, Shukor Abd Razak, Ondrej Krejcar, Hamido Fujita, Mohammad Nazir Ahmad, Sigeru Omatu:
A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog. Sensors 21(24): 8289 (2021) - 2020
- [j31]Shukor Abd Razak, Nur Hafizah Mohd Nazari, Arafat Mohammed Rashad Al-Dhaqm:
Data Anonymization Using Pseudonym System to Preserve Data Privacy. IEEE Access 8: 43256-43264 (2020) - [j30]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, Siti Hajar Othman, Abdul-Rahman Al-Ali, Fuad A. Ghaleb, Arief Salleh Rosman, Nurazmallail Marni:
Database Forensic Investigation Process Models: A Review. IEEE Access 8: 48477-48490 (2020) - [j29]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, David A. Dampier, Kim-Kwang Raymond Choo, Kamran Siddique, Adeyemi Richard Ikuesan, Abdulhadi Alqarni, Victor R. Kebande:
Categorization and Organization of Database Forensic Investigation Processes. IEEE Access 8: 112846-112858 (2020) - [j28]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, Kamran Siddique, Richard Adeyemi Ikuesan, Victor R. Kebande:
Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field. IEEE Access 8: 145018-145032 (2020) - [j27]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, Richard Adeyemi Ikuesan, Victor R. Kebande, Kamran Siddique:
A Review of Mobile Forensic Investigation Process Models. IEEE Access 8: 173359-173375 (2020) - [c21]Muaadh A. Alsoufi, Shukor Abd Razak, Maheyzah Md Siraj, Abdulalem Ali, Maged Nasser, Salah Abdo:
Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: A Survey. IRICT 2020: 659-675 - [i4]Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Maznah Kamat, Mohd. Foad Rohani, Shukor Abd Razak:
Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network. CoRR abs/2006.09655 (2020)
2010 – 2019
- 2019
- [j26]Adeyemi Richard Ikuesan, Shukor Abd Razak, Hein S. Venter, Mazleena Salleh:
Polychronicity tendency-based online behavioral signature. Int. J. Mach. Learn. Cybern. 10(8): 2103-2118 (2019) - [c20]Salman Rashid, Shukor Abd Razak:
Big Data Challenges in 5G Networks. ICUFN 2019: 152-157 - [c19]Ajoze Abdulraheem Zubair, Shukor bin Abd Razak, Md. Asri Bin Ngadi, Ahmed Aliyu, Syed Hamid Hussain Madni:
Convergence-Based Task Scheduling Techniques in Cloud Computing: A Review. IRICT 2019: 227-234 - [c18]Abdallah Elhigazi Abdallah, Shukor Abd Razak, Fuad A. Ghaleb:
Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network. IRICT 2019: 857-866 - 2018
- [j25]Hassan Chizari, Shukor Abd Razak, Mojib Majidi, Shaharuddin Salleh:
Computer forensic problem of sample size in file type analysis. Int. J. Adv. Intell. Paradigms 11(1/2): 58-74 (2018) - 2017
- [j24]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, Siti Hajar Othman, Kim-Kwang Raymond Choo, William Bradley Glisson, Abdul-Rahman Al-Ali, Mohammad Al-Rousan:
CDBFIP: Common Database Forensic Investigation Processes for Internet of Things. IEEE Access 5: 24401-24416 (2017) - [c17]Richard Adeyemi Ikuesan, Shukor Abd Razak, Hein S. Venter, Mazleena Salleh:
High-level online user attribution model based on human Polychronic-Monochronic tendency. BigComp 2017: 445-450 - [i3]Richard Adeyemi Ikuesan, Shukor Abd Razak, Mazleena Salleh:
A Conceptual Model for Holistic Classification of Insider. CoRR abs/1706.05402 (2017) - 2016
- [j23]Adeyemi R. Ikuesan, Shukor Abd Razak, Mazleena Salleh:
Understanding Online Behavior: Exploring the Probability of Online Personality Trait Using Supervised Machine-Learning Approach. Frontiers ICT 3: 8 (2016) - 2015
- [j22]Behnam Dezfouli, Marjan Radi, Kamin Whitehouse, Shukor Abd Razak, Hwee Pink Tan:
DICSA: Distributed and concurrent link scheduling algorithm for data gathering in wireless sensor networks. Ad Hoc Networks 25: 54-71 (2015) - [j21]Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd Razak, Malrey Lee:
LINKORD: link ordering-based data gathering protocol for wireless sensor networks. Computing 97(3): 205-236 (2015) - [j20]Behnam Dezfouli, Marjan Radi, Shukor Abd Razak, Hwee Pink Tan, Kamalrulnizam Abu Bakar:
Modeling low-power wireless communications. J. Netw. Comput. Appl. 51: 102-126 (2015) - 2014
- [j19]Hassan Chizari, Timothy Poston, Shukor Abd Razak, Abdul Hanan Abdullah, Shaharuddin Salleh:
Local coverage measurement algorithm in GPS-free wireless sensor networks. Ad Hoc Networks 23: 1-17 (2014) - [j18]Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd Razak, Malrey Lee:
Network Initialization in Low-Power Wireless Networks: A Comprehensive Study. Comput. J. 57(8): 1238-1261 (2014) - [j17]Behnam Dezfouli, Marjan Radi, Shukor Abd Razak, Kamin Whitehouse, Kamalrulnizam Abu Bakar, Hwee-Pink Tan:
Improving broadcast reliability for neighbor discovery, link estimation and collection tree construction in wireless sensor networks. Comput. Networks 62: 101-121 (2014) - [j16]Tameem Eissa, Shukor Abd Razak, Rashid Hafeez Khokhar, Normalia Samian:
Erratum to: Trust-Based Routing Mechanism in MANET: Design and Implementation. Mob. Networks Appl. 19(5): 682 (2014) - [j15]Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd Razak, Hwee Pink Tan:
IM2PR: interference-minimized multipath routing protocol for wireless sensor networks. Wirel. Networks 20(7): 1807-1823 (2014) - [c16]Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari:
Security evaluation over lightweight cryptographic protocols. ISBAST 2014: 171-175 - [c15]Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari:
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings. ISBAST 2014: 188-192 - [c14]Adeyemi R. Ikuesan, Shukor Abd Razak, Mazleena Salleh:
A psychographic framework for online user identification. ISBAST 2014: 198-203 - [c13]Muhammad Syafiq bin Samsi, Shukor Abd Razak:
A mechanism for privacy preserving in healthcare organizations. ISBAST 2014: 208-213 - [c12]Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari:
Rushing attack against routing protocols in Mobile Ad-Hoc Networks. ISBAST 2014: 220-224 - [c11]Arafat Mohammed Rashad Al-Dhaqm, Siti Hajar Othman, Shukor Abd Razak, Md. Asri Ngadi:
Towards adapting metamodelling technique for database forensics investigation domain. ISBAST 2014: 322-327 - [c10]Shukor Abd Razak:
Preface. ISBAST 2014: iii - 2013
- [j14]Mohammad Hossein Anisi, Abdul Hanan Abdullah, Yahaya Coulibaly, Shukor Abd Razak:
EDR: efficient data routing in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 12(1): 46-55 (2013) - [j13]Salim M. Zaki, Md. Asri Ngadi, Maznah Kamat, Shukor Abd Razak:
Quorum-based location service protocol for vehicular ad hoc networks in urban environment. Int. J. Ad Hoc Ubiquitous Comput. 14(1): 27-43 (2013) - [j12]Adeyemi R. Ikuesan, Shukor Abd Razak, Nor Amira Nor Azhan:
A Review of Current Research in Network Forensic Analysis. Int. J. Digit. Crime Forensics 5(1): 1-26 (2013) - [j11]Tameem Eissa, Shukor Abd Razak, Rashid Hafeez Khokhar, Normalia Samian:
Trust-Based Routing Mechanism in MANET: Design and Implementation. Mob. Networks Appl. 18(5): 666-677 (2013) - [j10]Mohammad Hossein Anisi, Abdul Hanan Abdullah, Shukor Abd Razak:
Energy-efficient and reliable data delivery in wireless sensor networks. Wirel. Networks 19(4): 495-505 (2013) - [c9]Muhammad Syafiq bin Samsi, Shukor bin Abd Razak:
A review of anonymous authentication mechanisms for health information management systems. ISDA 2013: 341-346 - [c8]Shukor bin Abd Razak, Ahmad Fahrulrazie Bin Mohamad:
Identification of spam email based on information from email header. ISDA 2013: 347-353 - 2012
- [j9]Mohammadreza Eslaminejad, Shukor Abd Razak, Mehdi Sookhak:
Classification of Energy-Efficient Routing Protocols for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 17(1-2): 103-129 (2012) - [j8]Mohammadreza Eslaminejad, Shukor Abd Razak, Abdul Samad Haji Ismai:
EEDARS: An Energy-Efficient Dual-Sink Algorithm with Role Switching Mechanism for Event-Driven Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 6(10): 2473-2492 (2012) - [j7]Mohammad Hossein Anisi, Abdul Hanan Abdullah, Shukor Abd Razak, Md. Asri Ngadi:
Overview of Data Routing Approaches for Wireless Sensor Networks. Sensors 12(4): 3964-3996 (2012) - [j6]Mohammadreza Eslaminejad, Shukor Abd Razak:
Fundamental Lifetime Mechanisms in Routing Protocols for Wireless Sensor Networks: A Survey and Open Issues. Sensors 12(10): 13508-13544 (2012) - [j5]Hassan Chizari, Majid Hosseini, Shaharuddin Salleh, Shukor Abd Razak, Abdul Hanan Abdullah:
EF-MPR, a new energy eFficient multi-point relay selection algorithm for MANET. J. Supercomput. 59(2): 744-761 (2012) - [i2]Adeyemi R. Ikuesan, Shukor Abd Razak, Nor Amira Nor Azhan:
Identifying critical features for network forensics investigation perspectives. CoRR abs/1210.1645 (2012) - 2011
- [j4]Hassan Chizari, Majid Hosseini, Timothy Poston, Shukor Abd Razak, Abdul Hanan Abdullah:
Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network. Sensors 11(3): 3163-3176 (2011) - [j3]Tameem Eissa, Shukor Abd Razak, Md. Asri Ngadi:
Towards providing a new lightweight authentication and encryption scheme for MANET. Wirel. Networks 17(4): 833-842 (2011) - [j2]Mohammad Hossein Anisi, Abdul Hanan Abdullah, Shukor Abd Razak:
Energy-Efficient Data Collection in Wireless Sensor Networks. Wirel. Sens. Netw. 3(10): 338-342 (2011) - [c7]Behnam Dezfouli, Marjan Radi, Mohammad Ali Nematbakhsh, Shukor Abd Razak:
A Medium Access Control Protocol with Adaptive Parent Selection Mechanism for Large-Scale Sensor Networks. AINA Workshops 2011: 402-408 - 2010
- [c6]Asma Ahmed Mohammed, Shukor Abd Razak, Abdul Hanan Abdullah, Izzeldin Mohammed, Yahia Abdella:
A Review on Blackhole Attack in Mobile Ad Hoc Networks. ICWN 2010: 116-121 - [i1]Behnam Dezfouli, Marjan Radi, Shukor Abd Razak:
A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks. CoRR abs/1008.2855 (2010)
2000 – 2009
- 2008
- [j1]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7): 1151-1167 (2008) - [c5]Shukor Abd Razak, Normalia Samian, Mohd Aizaini Maarof:
A Friend Mechanism for Mobile Ad Hoc Networks. IAS 2008: 243-248 - [c4]Normalia Samian, Mohd Aizaini Maarof, Shukor Abd Razak:
Towards Identifying Features of Trust in Mobile Ad Hoc Network. Asia International Conference on Modelling and Simulation 2008: 271-276 - 2007
- [c3]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ADHOC-NOW 2007: 129-141 - 2006
- [c2]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ISI 2006: 590-595 - 2005
- [c1]Shukor Abd Razak, Steven Furnell, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. ECIW 2005: 271-280
Coauthor Index
aka: Arafat Al-Dhaqm
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint