Iznan Husainy Hasbullah

Orcid: 0000-0002-2275-3201

According to our database1, Iznan Husainy Hasbullah authored at least 22 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RPL-based attack detection approaches in IoT networks: review and taxonomy.
Artif. Intell. Rev., September, 2024

Neighbor discovery protocol anomaly-based detection system using neural network algorithm.
Int. J. Inf. Sec., June, 2024

2023
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things.
Internet Things, July, 2023

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking.
Sensors, 2023

2022
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection.
Symmetry, 2022

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
Sensors, 2022

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.
Sensors, 2022

Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges.
Comput. Syst. Sci. Eng., 2022

2021
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
Sensors, 2021

Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic.
PeerJ Comput. Sci., 2021

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey.
IEEE Access, 2021

Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2021

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms.
IEEE Access, 2021

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP).
IEEE Access, 2021

Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP).
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

2020
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network.
Symmetry, 2020

Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks.
IEEE Access, 2020

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review.
IEEE Access, 2020

Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
Authentication and Privacy Approach for DHCPv6.
IEEE Access, 2019

2016
Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Comparative performance analysis of classification algorithms for intrusion detection system.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016


  Loading...