Shukor Abd Razak

Orcid: 0000-0002-8824-6069

According to our database1, Shukor Abd Razak authored at least 66 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review.
IEEE Access, 2023

2022
A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm (AI) for Optimal Task Scheduling.
Sensors, 2022

GRAIN: Granular multi-label encrypted traffic classification using classifier chain.
Comput. Networks, 2022

Involvement of Surveillance Drones in Smart Cities: A Systematic Review.
IEEE Access, 2022

Multi-Classification of Imbalance Worm Ransomware in the IoMT System.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022

WHTE: Weighted Hoeffding Tree Ensemble for Network Attack Detection at Fog-IoMT.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

2021
A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog.
Sensors, 2021

An Adaptive Protection of Flooding Attacks Model for Complex Network Environments.
Secur. Commun. Networks, 2021

Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks.
Comput. Intell. Neurosci., 2021

Digital Forensics Subdomains: The State of the Art and Future Directions.
IEEE Access, 2021

A Review of Anomaly Intrusion Detection Systems in IoT using Deep Learning Techniques.
Adv. Data Sci. Adapt. Anal., 2021

2020
Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network.
CoRR, 2020

Data Anonymization Using Pseudonym System to Preserve Data Privacy.
IEEE Access, 2020

Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field.
IEEE Access, 2020

Database Forensic Investigation Process Models: A Review.
IEEE Access, 2020

A Review of Mobile Forensic Investigation Process Models.
IEEE Access, 2020

Categorization and Organization of Database Forensic Investigation Processes.
IEEE Access, 2020

2019
Polychronicity tendency-based online behavioral signature.
Int. J. Mach. Learn. Cybern., 2019

Convergence-Based Task Scheduling Techniques in Cloud Computing: A Review.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

Big Data Challenges in 5G Networks.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

2018
Computer forensic problem of sample size in file type analysis.
Int. J. Adv. Intell. Paradigms, 2018

2017
A Conceptual Model for Holistic Classification of Insider.
CoRR, 2017

CDBFIP: Common Database Forensic Investigation Processes for Internet of Things.
IEEE Access, 2017

High-level online user attribution model based on human Polychronic-Monochronic tendency.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

2016
Understanding Online Behavior: Exploring the Probability of Online Personality Trait Using Supervised Machine-Learning Approach.
Frontiers ICT, 2016

2015
Modeling low-power wireless communications.
J. Netw. Comput. Appl., 2015

LINKORD: link ordering-based data gathering protocol for wireless sensor networks.
Computing, 2015

DICSA: Distributed and concurrent link scheduling algorithm for data gathering in wireless sensor networks.
Ad Hoc Networks, 2015

2014
IM2PR: interference-minimized multipath routing protocol for wireless sensor networks.
Wirel. Networks, 2014

Erratum to: Trust-Based Routing Mechanism in MANET: Design and Implementation.
Mob. Networks Appl., 2014

Improving broadcast reliability for neighbor discovery, link estimation and collection tree construction in wireless sensor networks.
Comput. Networks, 2014

Network Initialization in Low-Power Wireless Networks: A Comprehensive Study.
Comput. J., 2014

Local coverage measurement algorithm in GPS-free wireless sensor networks.
Ad Hoc Networks, 2014

A mechanism for privacy preserving in healthcare organizations.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Preface.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Rushing attack against routing protocols in Mobile Ad-Hoc Networks.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

New secure identity-based and certificateless authenticated Key Agreement protocols without pairings.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Security evaluation over lightweight cryptographic protocols.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Towards adapting metamodelling technique for database forensics investigation domain.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A psychographic framework for online user identification.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Energy-efficient and reliable data delivery in wireless sensor networks.
Wirel. Networks, 2013

Trust-Based Routing Mechanism in MANET: Design and Implementation.
Mob. Networks Appl., 2013

A Review of Current Research in Network Forensic Analysis.
Int. J. Digit. Crime Forensics, 2013

Quorum-based location service protocol for vehicular ad hoc networks in urban environment.
Int. J. Ad Hoc Ubiquitous Comput., 2013

EDR: efficient data routing in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013

A review of anonymous authentication mechanisms for health information management systems.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013

Identification of spam email based on information from email header.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013

2012
EF-MPR, a new energy eFficient multi-point relay selection algorithm for MANET.
J. Supercomput., 2012

Fundamental Lifetime Mechanisms in Routing Protocols for Wireless Sensor Networks: A Survey and Open Issues.
Sensors, 2012

Overview of Data Routing Approaches for Wireless Sensor Networks.
Sensors, 2012

EEDARS: An Energy-Efficient Dual-Sink Algorithm with Role Switching Mechanism for Event-Driven Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2012

Identifying critical features for network forensics investigation perspectives
CoRR, 2012

Classification of Energy-Efficient Routing Protocols for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

2011
Energy-Efficient Data Collection in Wireless Sensor Networks.
Wirel. Sens. Netw., 2011

Towards providing a new lightweight authentication and encryption scheme for MANET.
Wirel. Networks, 2011

Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network.
Sensors, 2011

A Medium Access Control Protocol with Adaptive Parent Selection Mechanism for Large-Scale Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks
CoRR, 2010

A Review on Blackhole Attack in Mobile Ad Hoc Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

2008
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks, 2008

Towards Identifying Features of Trust in Mobile Ad Hoc Network.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

A Friend Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, 2007

2006
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
Proceedings of the Intelligence and Security Informatics, 2006

2005
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005


  Loading...