Azizol Abdullah

Orcid: 0000-0001-8321-9259

According to our database1, Azizol Abdullah authored at least 66 papers between 2001 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection.
Int. J. Inf. Sec., February, 2025

2024
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN).
PeerJ Comput. Sci., 2024

Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems.
PeerJ Comput. Sci., 2024

Towards Image-Based Network Traffic Pattern Detection for DDoS Attacks in Cloud Computing Environments: A Comparative Study.
Proceedings of the 14th International Conference on Cloud Computing and Services Science, 2024

2023
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability.
Expert Syst. Appl., November, 2023

An intelligent DDoS attack detection tree-based model using Gini index feature selection method.
Microprocess. Microsystems, April, 2023

An Estimation-Based Dynamic Load Balancing Algorithm for Efficient Load Distribution and Balancing in Heterogeneous Grid Computing Environment.
J. Grid Comput., March, 2023

An optimised cuckoo-based discrete symbiotic organisms search strategy for tasks scheduling in cloud computing environment.
CoRR, 2023

Turnkey Technology: A Powerful Tool for Cyber Warfare.
CoRR, 2023

African Union Convention on Cyber Security and Personal Data Protection: Challenges and Future Directions.
CoRR, 2023

BukaGini: A Stability-Aware Gini Index Feature Selection Algorithm for Robust Model Performance.
IEEE Access, 2023

2021
Correction to: The Impact of Memory‑Efficient Bots on IoT‑WSN Botnet Propagation.
Wirel. Pers. Commun., 2021

The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation.
Wirel. Pers. Commun., 2021

An Intrusion Detection System for the Internet of Things Based on Machine Learning: Review and Challenges.
Symmetry, 2021

An Enhanced Discrete Symbiotic Organism Search Algorithm for Optimal Task Scheduling in the Cloud.
Algorithms, 2021

Vigorous Replication Strategy With Balanced Quorum for Minimizing the Storage Consumption and Response Time in Cloud Environments.
IEEE Access, 2021

Resource Selection Mechanism For Brokering Services In Multi-cloud Environment.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2021

Optimization on Replication Performance via Balance Quorum (BQ) and Data Center Selection Method (DCSM) Algorithms in Cloud Environment.
Proceedings of the ICECC 2021: The 4th International Conference on Electronics, Communications and Control Engineering, Seoul, Republic of Korea, April 9, 2021

2020
Dynamic Job Scheduling Strategy Using Jobs Characteristics in Cloud Computing.
Symmetry, 2020

Hyper-Heuristic Framework for Sequential Semi-Supervised Classification Based on Core Clustering.
Symmetry, 2020

2019
Reliable Access Control for Mobile Cloud Computing (MCC) With Cache-Aware Scheduling.
IEEE Access, 2019

2018
Class-based QoS scheduling of WiMAX networks.
J. High Speed Networks, 2018

Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks.
Int. J. Netw. Virtual Organisations, 2018

Optimized topology control in mobile IP networks using a new parametric routing algorithm.
Comput. Electr. Eng., 2018

2017
A particle swarm optimization and min-max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids.
J. Supercomput., 2017

An effective approach for managing power consumption in cloud computing infrastructure.
J. Comput. Sci., 2017

State of the Art in Biometric Key Binding and Key Generation Schemes.
Int. J. Commun. Networks Inf. Secur., 2017

An Adaptive Call Admission Control With Bandwidth Reservation for Downlink LTE Networks.
IEEE Access, 2017

Energy-Efficient Algorithms for Dynamic Virtual Machine Consolidation in Cloud Data Centers.
IEEE Access, 2017

An Improved Quality-of-Service Performance Using RED's Active Queue Management Flow Control in Classifying Networks.
IEEE Access, 2017

Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

2016
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks.
EURASIP J. Wirel. Commun. Netw., 2016

A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Recharge-as-Reward Mechanism to Incentivize Cooperative Nodes in Mobile Ad Hoc Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

A Hybrid Scheme for Face Template Protection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Great Deluge and Extended Great Deluge Based Job Scheduling in Grid Computing Using GridSim.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
Cooperation stimulation mechanisms for wireless multihop networks: A survey.
J. Netw. Comput. Appl., 2015

Detecting an Anomaly Behavior through Enhancing the Mechanism of Packet Filtering.
J. Comput. Sci., 2015

Mobility and Handover Technique in Heterogeneous Wireless Networks.
J. Comput. Sci., 2015

Compare and measure selfishness detection (CMSD) mechanism: Promptness and accuracy.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

2014
A Network Selection Algorithm Based on Enhanced Access Router Discovery in Heterogeneous Wireless Networks.
Wirel. Pers. Commun., 2014

Optimized performance data transmission in Mobile IP networks.
J. Supercomput., 2014

Resource Broker Management by Adopting Self-adaptive Multi-Instance Broker Scheduling in Grid Computing.
J. Comput. Sci., 2014

An Event Driven simulation for adaptive Gentle Random Early Detection (Agred) Algorithm.
J. Comput. Sci., 2014

A Clustering-based Hybrid Replica control Protocol for High Availability in Grid Environment.
J. Comput. Sci., 2014

Enhancing the Performance of Advanced Fine-Grained Grid Authorization System.
J. Comput. Sci., 2014

Intrusion Detection System in Secure Shell Traffic in Cloud Environment.
J. Comput. Sci., 2014

Disaster Recovery in Cloud Computing: A Survey.
Comput. Inf. Sci., 2014

Packet Header Anomaly Detection Using Statistical Analysis.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Signature-Based Anomaly intrusion detection using Integrated data mining classifiers.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Distributed Denial of Service detection using hybrid machine learning technique.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A review of cloud security based on cryptographic mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Adaptive Resource Allocation for Reliable Performance in Heterogeneous Distributed Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

The Idle Resource Items Workload and Implication on Different Weight Balance Rate in Grid Scheduling.
Proceedings of the First International Conference on Advanced Data and Information Engineering, 2013

A Model for Client Recommendation to a Desktop Grid Server.
Proceedings of the First International Conference on Advanced Data and Information Engineering, 2013

2012
Evaluation of an Economy-Based File Replication Strategy for Malaysian Research and Education Network (MYREN) Data Grid Model.
Comput. Inf. Sci., 2012

A Cloud-based Intrusion Detection Service framework.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Hierarchical secure virtualization model for cloud.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Dynamic Load Balancing Policy in Grid Computing with Multi-Agent System Integration.
Proceedings of the Software Engineering and Computer Systems, 2011

Fast Handover Technique for Efficient IPv6 Mobility Support in Heterogeneous Networks.
Proceedings of the Software Engineering and Computer Systems, 2011

2009
Quorum-based Data Replication in Grid Environment.
Int. J. Comput. Intell. Syst., 2009

2008
High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment.
Comput. Inf. Sci., 2008

2007
Diagonal Data Replication in Grid Environment.
Proceedings of the Computational Science and Its Applications, 2007

2005
Data discovery algorithm for scientific data grid environment.
J. Parallel Distributed Comput., 2005

2004
Data Discovery Mechanism for a Large Peer-to-Peer Based Scientific Data Grid Environment.
Proceedings of the Computational Science and Its Applications, 2004

2001
The Web based Information Grid: Highly Reliable Global Information Services Infrastructure.
Proceedings of WebNet 2001, 2001


  Loading...