Shahrulniza Musa
Orcid: 0000-0003-4867-5085
According to our database1,
Shahrulniza Musa
authored at least 43 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
2023
Roman Urdu Hate Speech Detection Using Transformer-Based Model for Cyber Security Applications.
Sensors, 2023
Self-Socio Adaptive Reliable Particle Swarm Optimization Load Balancing in Software-Defined Networking.
IEEE Access, 2023
2022
Risk Classification in Global Software Development Using a Machine Learning Approach: A Result Comparison of Support Vector Machine and K-Nearest Neighbor Algorithms.
J. Inf. Technol. Res., 2022
Context-Aware Deep Learning Model for Detection of Roman Urdu Hate Speech on Social Media Platform.
IEEE Access, 2022
2021
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models.
Expert Syst. J. Knowl. Eng., 2021
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment.
Comput. Sci. Rev., 2021
Comput. Intell. Neurosci., 2021
2020
Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure.
CoRR, 2020
A Comprehensive Study of Load Balancing Approaches in the Cloud Computing Environment and a Novel Fault Tolerance Approach.
IEEE Access, 2020
IEEE Access, 2020
2019
Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing.
CoRR, 2019
Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks.
CoRR, 2019
Proceedings of the Joint Proceedings of AIESD 2019, WDEA 2019, EduSynergies 2019, IKIT 2019, ISTIHMR 2019, WSSC 2019, VGameEdu 2019, Madrid, Spain, November 6th - to, 2019
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019
The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN).
Proceedings of the Advances in Cyber Security - First International Conference, 2019
2018
J. Supercomput., 2018
IT Students' Sentiment of Faculty Evaluations and Posting Opinions on Social Media Networks.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
2017
J. Comput. Networks Commun., 2017
2016
TSSDroid: realization of an efficient and usable TSS API for the Android software stack.
Secur. Commun. Networks, 2016
Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
2015
Secur. Commun. Networks, 2015
2014
The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication.
J. Comput. Sci., 2014
A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed.
J. Comput. Sci., 2014
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Design and implementation of an efficient framework for behaviour attestation using n-call slides.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
2013
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Simulation base implementation for placement of security services in real time environment.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Terrain/clutter based location prediction by using multi-condition Bayesian decision theory.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Modeling Interpolated Distance Error for Clutter Based Location Estimation of Wireless Nodes.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
2010
Predicted and Corrected Location Estimation of Mobile Nodes Based on the Combination of Kalman Filter and the Bayesian Decision Theory.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010
2008
Visualising network security attacks with multiple 3D visualisation and false alert classification.
PhD thesis, 2008
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
2007
Proceedings of the 11th International Conference on Information Visualisation, 2007