Rosilah Hassan

Orcid: 0000-0003-1348-5804

According to our database1, Rosilah Hassan authored at least 65 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Network security framework for Internet of medical things applications: A survey.
J. Intell. Syst., February, 2024

Secured finance handling for supply chain integrated business intelligence using blockchain application scenarios.
Intell. Data Anal., 2024

Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis.
Comput. Networks, 2024

2023
Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions.
Wirel. Pers. Commun., 2023

Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions.
Symmetry, 2023

Routing-Based Interference Mitigation in SDN Enabled Beyond 5G Communication Networks: A Comprehensive Survey.
IEEE Access, 2023

Successive Interference Cancellation Approach to Estimated Outage and Coverage Probability for UDN B5G Network.
Proceedings of the IEEE International Conference on Artificial Intelligence in Engineering and Technology, 2023

Minor Program Mapping based on Multiple Intelligences with Cluster Analysis Approach.
Proceedings of the Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, 2023

AI-Based Feature Extraction and Cosine Similarity for Automation of Student Learning Assessment.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

Evaluation and Optimization of Computer Multimedia Assisted Network Teaching Information Ecosystem.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

GoJejak: IoT-Based Object Tracker Application Using WiFi and Bluetooth.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

Threat Intelligence with Non-IID Data in Federated Learning enabled Intrusion Detection for SDN: An Experimental Study.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

Enforcing Social Distancing with YOLO Algorithm Utilizing Object-to-Object Distance.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
A Cross-Layer Green Information-Centric Networking Design Toward the Energy Internet.
IEEE Trans. Netw. Sci. Eng., 2022

Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

VLMOO: A framework for benchmarking Variable-length Multiobjective Optimization problems with WSN focus.
Softw. Impacts, 2022

Conceptual Framework for Future WSN-MAC Protocol to Achieve Energy Consumption Enhancement.
Sensors, 2022

A Novel Prototype for Safe Driving Using Embedded Smart Box System.
Sensors, 2022

Comparison of Named Data Networking Mobility Methodology in a Merged Cloud Internet of Things and Artificial Intelligence Environment.
Sensors, 2022

Cloud to cloud data migration using self sovereign identity for 5G and beyond.
Clust. Comput., 2022

Energy efficient data detection with low complexity for an uplink multi-user massive MIMO system.
Comput. Electr. Eng., 2022

Named Data Networking: A Survey on Routing Strategies.
IEEE Access, 2022

Successive Interference Cancellation for Ultra-Dense 5G Heterogeneous Network.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2022

Improved QoS in Internet of Things (IoTs) through Short Messages Encryption Scheme for Wireless Sensor Communication.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2022

2021
Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature.
Wirel. Commun. Mob. Comput., 2021

Hyper-Angle Exploitative Searching for Enabling Multi-Objective Optimization of Fog Computing.
Sensors, 2021

Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications.
Secur. Commun. Networks, 2021

MAC protocol with grouping awareness GMAC for large scale Internet-of-Things network.
PeerJ Comput. Sci., 2021

Performance Evaluation of Online Machine Learning Models Based on Cyclic Dynamic and Feature-Adaptive Time Series.
IEICE Trans. Inf. Syst., 2021

Social class particle swarm optimization for variable-length Wireless Sensor Network Deployment.
Appl. Soft Comput., 2021

Interference Management in 5G and Beyond Network: Requirements, Challenges and Future Directions.
IEEE Access, 2021

Fog Computing Advancement: Concept, Architecture, Applications, Advantages, and Open Issues.
IEEE Access, 2021

Mobility and Queue Length Aware Routing Approach for Network Stability and Load Balancing in MANET.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2021

Quantitative Evaluation of IEEE 802.15.4 and ISA 100.11a for large scale Wireless Sensor Network.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

Dimensionality Inspection for Wireless Sensor Network Deployment using Multi-Objective Optimization.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

A New Feature in Mysejahtera Application to Monitoring the Spread of COVID-19 Using Fog Computing.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

Analyzing Data Transfer Rate Movement for Visible Light Communication.
Proceedings of the 22nd International Arab Conference on Information Technology, 2021

2020
Internet of Things and Its Applications: A Comprehensive Survey.
Symmetry, 2020

Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology.
Secur. Commun. Networks, 2020

A survey on the architecture, application, and security of software defined networking: Challenges and open issues.
Internet Things, 2020

Optimized Particle Swarm Optimization Algorithm for the Realization of an Enhanced Energy-Aware Location-Aided Routing Protocol in MANET.
Inf., 2020

6RLR-ABC: 6LoWPAN Routing Protocol With Local Repair Using Bio Inspired Artificial Bee Colony.
CoRR, 2020

Quality of Service (QoS) Management for Local Area Network (LAN) Using Traffic Policy Technique to Secure Congestion.
Comput., 2020

Image Retrieval Scheme Using Quantized Bins of Color Image Components and Adaptive Tetrolet Transform.
IEEE Access, 2020

A Survey on Trend and Classification of Internet of Things Reviews.
IEEE Access, 2020

Hybrid Network Mobility Support in Named Data Networking.
Proceedings of the 2020 International Conference on Information Networking, 2020

2019
Introduction to the Special Issue on Opportunistic Network and its Security Challenges.
Scalable Comput. Pract. Exp., 2019

Addressing the Literacy Skills of B40 Students towards 4IR Workplace: Development of FutureProof Graduate Module (FPGM).
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

2018
Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review.
Int. J. Netw. Secur., 2018

A Survey of Medium Access Mechanisms for Providing Robust Audio Video Streaming in IEEE 802.11aa Standard.
IEEE Access, 2018

2017
IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey.
IEEE Access, 2017

2015
Achievable Throughput-Based Admission Control for Mobile Ad Hoc Network: Cross Layer Approach.
Wirel. Pers. Commun., 2015

Performance Evaluation of Handover in WiMax with TCP and UDP as Underlying Protocol.
J. Comput. Sci., 2015

2014
Enhanced encapsulated Security payload a New Mechanism to Secure Internet Protocol Version 6 over Internet Protocol Version 4.
J. Comput. Sci., 2014

Lightweight Multicast Routing Based on Stable Core for MANETs.
KSII Trans. Internet Inf. Syst., 2014

Performance evaluation of mobile ad hoc networks under flooding-based attacks.
Int. J. Commun. Syst., 2014

2013
Comparison between android and iOS Operating System in terms of security.
Proceedings of the 8th International Conference on Information Technology in Asia, 2013

2011
Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET.
Proceedings of the Software Engineering and Computer Systems, 2011

Flash notes and easy electronic software (EES): New technique to improve Digital Logic Design learning.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011

Spectrum management system: A study.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011

A local intrusion detection routing security over MANET network.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011

Local Positioning System Performance Evaluation with Cosine Correlation Similarity Measure.
Proceedings of the Sixth International Conference on Bio-Inspired Computing: Theories and Applications, 2011

A performance study of various mobility speed on AODV routing protocol in homogeneous and heterogeneous MANET.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

2010
Architecture of Network Management Tools for Heterogeneous System
CoRR, 2010

2009
Design and implementation of a virtual bus transport.
PhD thesis, 2009


  Loading...