Rosli Salleh

Orcid: 0000-0002-7379-8397

According to our database1, Rosli Salleh authored at least 39 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Global insights and the impact of generative AI-ChatGPT on multidisciplinary: a systematic review and bibliometric analysis.
Connect. Sci., December, 2024

2023
Ensuring reliable network operations and maintenance: The role of PMRF for switch maintenance and upgrades in SDN.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Data plane failure and its recovery techniques in SDN: A systematic literature review.
J. King Saud Univ. Comput. Inf. Sci., March, 2023

2022
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism.
Wirel. Networks, 2022

A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review.
Multim. Tools Appl., 2022

Hybrid Metaheuristics for QoS-Aware Service Composition: A Systematic Mapping Study.
IEEE Access, 2022

Hybrid Metaheuristics Using Rough Sets for QoS-Aware Service Composition.
IEEE Access, 2022

2021
A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network.
Wirel. Networks, 2021

Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey.
IEEE Access, 2021

2020
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network.
IEEE Access, 2020

A Blockchain-Based Smart Network for IoT-Driven Smart Cities.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020

2019
Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey.
Telecommun. Syst., 2019

2018
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet.
IET Networks, 2018

Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario.
IEEE Access, 2018

2017
SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack.
J. Vis. Commun. Image Represent., 2017

The Evolution of Android Malware and Android Analysis Techniques.
ACM Comput. Surv., 2017

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.
Comput. Secur., 2017

2016
A Survey on Proxy Mobile IPv6 Handover.
IEEE Syst. J., 2016

On the Analysis and Detection of Mobile Botnet Applications.
J. Univers. Comput. Sci., 2016

Copy-move forgery detection: Survey, challenges and future directions.
J. Netw. Comput. Appl., 2016

The rise of "malware": Bibliometric analysis of malware study.
J. Netw. Comput. Appl., 2016

2015
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues.
KSII Trans. Internet Inf. Syst., 2015

A review on feature selection in mobile malware detection.
Digit. Investig., 2015

DeDroid: A Mobile Botnet Detection Approach Based on Static Analysis.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Pixel value differencing steganography techniques: Analysis and open challenge.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
Botnet detection techniques: review, future trends, and issues.
J. Zhejiang Univ. Sci. C, 2014

A survey of secure protocols in Mobile IPv6.
J. Netw. Comput. Appl., 2014

Mobile Botnet Attacks: A Thematic Taxonomy.
Proceedings of the New Perspectives in Information Systems and Technologies, 2014

Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Analysis and Design of Low-Cost Bit-Serial Architectures for Motion Estimation in H.264/AVC.
J. Signal Process. Syst., 2013

Best Path Cluster-Based Routing Protocol for Wireless Sensor Networks.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

Anomaly Detection Using Cooperative Fuzzy Logic Controller.
Proceedings of the Intelligent Robotics Systems: Inspiring the NEXT, 2013

2012
A Survey of Algorithms and Architectures for H.264 Sub-Pixel Motion Estimation.
J. Circuits Syst. Comput., 2012

A Survey on Cloud Computing Security
CoRR, 2012

Eliminating Scanning Delay using Advanced Neighbor Discovery with Caching (ANDWC)
CoRR, 2012

Protection of Binding Update Message in Mobile IPv6.
Proceedings of the Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, 2012

2010
Fast Algorithm Analysis and Bit-Serial Architecture Design for Sub-Pixel Motion Estimation in H.264.
J. Circuits Syst. Comput., 2010

2008
A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2005
Hardware Design of On-Line Jawi Character Recognition Chip using Discrete Wavelet Transform.
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005


  Loading...