Nur Izura Udzir
Orcid: 0000-0002-0543-3329
According to our database1,
Nur Izura Udzir
authored at least 91 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
A novel approach for handling missing data to enhance network intrusion detection system.
Cyber Secur. Appl., 2025
2023
EAI Endorsed Trans. Scalable Inf. Syst., 2023
2022
Symmetry, 2022
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data.
IEEE Access, 2022
2021
An Effective Naming Heterogeneity Resolution for XACML Policy Evaluation in a Distributed Environment.
Symmetry, 2021
Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.
Sensors, 2021
J. Ind. Inf. Integr., 2021
Efficient Skyline Computation Over an Incomplete Database With Changing States and Structures.
IEEE Access, 2021
Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2021
2020
SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud.
CoRR, 2020
IEEE Access, 2020
Proceedings of the iiWAS '20: The 22nd International Conference on Information Integration and Web-based Applications & Services, Virtual Event / Chiang Mai, Thailand, November 30, 2020
2019
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework.
Scalable Comput. Pract. Exp., 2019
A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction.
J. Medical Syst., 2019
2018
Int. Arab J. Inf. Technol., 2018
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018
2017
J. Intell. Inf. Syst., 2017
Int. J. Commun. Networks Inf. Secur., 2017
2016
Secur. Commun. Networks, 2016
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016
A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016
Proceedings of the Trends in Applied Knowledge-Based Systems and Data Science, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
2015
J. Inf. Sci. Eng., 2015
CoRR, 2015
Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015
2014
Windows Web Proxy Caching simulation: a Tool for simulating Web Proxy Caching under Windows Operating Systems.
J. Comput. Sci., 2014
J. Comput. Sci., 2014
J. Commun., 2014
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks.
Clust. Comput., 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Intelligent Cooperative Least Recently Used Web Caching Policy based on J48 Classifier.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014
XACML Policy Inconsistency Analysis and Resolution.
Proceedings of the DATA 2014, 2014
2012
Wirel. Pers. Commun., 2012
Proceedings of the 3rd International Conference on Ambient Systems, 2012
A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database.
Proceedings of the 3rd International Conference on Ambient Systems, 2012
Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks.
Peer-to-Peer Netw. Appl., 2012
J. Syst. Softw., 2012
Generating Pareto-Optimal Offers in Bilateral Automated Negotiation with One-Side Uncertain Importance Weights.
Comput. Informatics, 2012
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
The Learning of an Opponent's Approximate Preferences in Bilateral Automated Negotiation.
J. Theor. Appl. Electron. Commer. Res., 2011
A Framework for Checking and Ranking Integrity Constraints in a Distributed Database.
J. Next Gener. Inf. Technol., 2011
Comput. Inf. Sci., 2011
Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating.
Proceedings of the Networked Digital Technologies - Third International Conference, 2011
Proceedings of the Networked Digital Technologies - Third International Conference, 2011
Proceedings of the Networked Digital Technologies - Third International Conference, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011
Performance Analysis of Transport Control Protocol Flavours in the Existence of Packet Reordering Phenomena.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Int. J. Inf. Technol. Web Eng., 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
Improved Integrity Constraints Checking in Distributed Databases by Exploiting Local Checking.
J. Comput. Sci. Technol., 2009
Mobility support across hybrid IP-based wireless environment: review of concepts, solutions, and related issues.
Ann. des Télécommunications, 2009
A Frequent Path Mining Algorithm to Intelligent Business Process Decomposition.
Proceedings of the 2009 International Conference on Semantic Web & Web Services, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the iiWAS'2009, 2009
Proceedings of the International Conference on Information, 2009
Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009
2008
A Study on Feature Selection and Classification Techniques for Automatic Genre Classification of Traditional Malay Music.
Proceedings of the ISMIR 2008, 2008
Artificial Immune Recognition System with Nonlinear Resource Allocation Method and Application to Traditional Malay Music Genre Classification.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008
Notes on Using Nonlinear Resource Allocation Methods in AIRS Classifier.
Proceedings of The 2008 International Conference on Data Mining, 2008
A Comprehensive Study in Benchmarking Feature Selection and Classification Approaches for Traditional Malay Music Genre Classification.
Proceedings of The 2008 International Conference on Data Mining, 2008
A Review on Concepts, Algorithms and Recognition Based Applications of Artificial Immune System.
Proceedings of the Advances in Computer Science and Engineering, 2008
2007
Checking Integrity Constraints with Various Types of Integrity Tests for Distributed Databases.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
2006
2004
Implementing contract net in tuple space models.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004