Shahrulniza Musa
Shahrulniza Musa
Professor, Universiti Kuala Lumpur Malaysian Institute of Information Technology (UniKL MIIT)
Verified email at - Homepage
Cited by
Cited by
A comprehensive study of load balancing approaches in the cloud computing environment and a novel fault tolerance approach
MA Shahid, N Islam, MM Alam, MM Su’ud, S Musa
IEEE Access 8, 130500-130526, 2020
A systematic review of load balancing techniques in software-defined networking
MR Belgaum, S Musa, MM Alam, MM Su’ud
IEEE Access 8, 98612-98636, 2020
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach
MN Ismail, A Aborujilah, S Musa, AA Shahzad
Proceedings of the 7th international conference on ubiquitous information …, 2013
How secure is your smartphone: An analysis of smartphone security mechanisms
S Khan, M Nauman, AT Othman, S Musa
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
Cloud‐Based DDoS HTTP Attack Detection Using Covariance Matrix Approach
A Aborujilah, S Musa
Journal of Computer Networks and Communications 2017 (1), 7674594, 2017
Blockchain-based smart-IoT trust zone measurement architecture
J Ali, T Ali, Y Alsaawy, AS Khalid, S Musa
Proceedings of the International Conference on Omni-Layer Intelligent …, 2019
Towards secure IoT communication with smart contracts in a blockchain infrastructure
J Ali, T Ali, S Musa, A Zahrani
arXiv preprint arXiv:2001.01837, 2020
Challenges: Bridge between cloud and IoT
MR Belgaum, S Soomro, Z Alansari, S Musa, M Alam, MM Su'ud
2017 4th IEEE international conference on engineering technologies and …, 2017
The SCADA review: system components, architecture, protocols and future security trends
A Shahzad, S Musa, A Aborujilah, M Irfan
American Journal of Applied Sciences 11 (8), 1418, 2014
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment
MA Shahid, N Islam, MM Alam, MS Mazliham, S Musa
Computer Science Review 40, 100398, 2021
Role of artificial intelligence in cloud computing, IoT and SDN: Reliability and scalability issues
MR Belgaum, Z Alansari, S Musa, MM Alam, MS Mazliham
International Journal of Electrical and Computer Engineering 11 (5), 4458, 2021
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security
S Musa, AA Shahzad, A Aborujilah
Proceedings of the 7th International Conference on Ubiquitous Information …, 2013
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption
AA Shahzad, S Musa, A Aborujilah, M Irfan
Proceedings of the 8th international conference on ubiquitous information …, 2014
Visualising communication network security attacks
S Musa, DJ Parish
2007 11th International Conference Information Visualization (IV'07), 726-733, 2007
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models
S Jan, S Musa, T Ali, M Nauman, S Anwar, T Ali Tanveer, B Shah
Expert Systems 38 (4), e12611, 2021
Towards a secure behavior modeling for iot networks using blockchain
J Ali, AS Khalid, E Yafi, S Musa, W Ahmed
arXiv preprint arXiv:2001.01841, 2020
Deep contractive autoencoder-based anomaly detection for in-vehicle controller area network (CAN)
SF Lokman, AT Othman, S Musa, MH Abu Bakar
Progress in Engineering Technology: Automotive, Energy Generation, Quality …, 2019
Trust Development in virtual teams to implement global software development (GSD): A structured approach to overcome communication barriers
A Iftikhar, M Alam, S Musa, MM Su'ud
2017 IEEE 3rd International Conference on Engineering Technologies and …, 2017
Context-aware deep learning model for detection of roman urdu hate speech on social media platform
M Bilal, A Khan, S Jan, S Musa
IEEE Access 10, 121133-121151, 2022
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment
MN Ismail, A Aborujilah, S Musa, AA Shahzad
International Journal of Computer Science and Security (IJCSS) 6 (4), 226-237, 2012
The system can't perform the operation now. Try again later.
Articles 1–20