Follow
Shahrulniza Musa
Shahrulniza Musa
Professor, Universiti Kuala Lumpur Malaysian Institute of Information Technology (UniKL MIIT)
Verified email at unikl.edu.my - Homepage
Title
Cited by
Cited by
Year
A comprehensive study of load balancing approaches in the cloud computing environment and a novel fault tolerance approach
MA Shahid, N Islam, MM Alam, MM Su’ud, S Musa
IEEE Access 8, 130500-130526, 2020
762020
A systematic review of load balancing techniques in software-defined networking
MR Belgaum, S Musa, MM Alam, MM Su’ud
IEEE Access 8, 98612-98636, 2020
732020
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach
MN Ismail, A Aborujilah, S Musa, AA Shahzad
Proceedings of the 7th international conference on ubiquitous information …, 2013
682013
How secure is your smartphone: An analysis of smartphone security mechanisms
S Khan, M Nauman, AT Othman, S Musa
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
562012
Cloud-based DDoS HTTP attack detection using covariance matrix approach
A Aborujilah, S Musa
Journal of Computer Networks and Communications 2017, 2017
532017
Towards secure IoT communication with smart contracts in a blockchain infrastructure
J Ali, T Ali, S Musa, A Zahrani
arXiv preprint arXiv:2001.01837, 2020
462020
Blockchain-based smart-IoT trust zone measurement architecture
J Ali, T Ali, Y Alsaawy, AS Khalid, S Musa
Proceedings of the International Conference on Omni-Layer Intelligent …, 2019
452019
Challenges: Bridge between cloud and IoT
MR Belgaum, S Soomro, Z Alansari, S Musa, M Alam, MM Su'ud
2017 4th IEEE international conference on engineering technologies and …, 2017
452017
The SCADA review: system components, architecture, protocols and future security trends
A Shahzad, S Musa, A Aborujilah, M Irfan
American Journal of Applied Sciences 11 (8), 1418, 2014
422014
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security
S Musa, AA Shahzad, A Aborujilah
Proceedings of the 7th International Conference on Ubiquitous Information …, 2013
322013
Role of artificial intelligence in cloud computing, IoT and SDN: Reliability and scalability issues
MR Belgaum, Z Alansari, S Musa, MM Alam, MS Mazliham
International Journal of Electrical and Computer Engineering 11 (5), 4458, 2021
302021
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment
MA Shahid, N Islam, MM Alam, MS Mazliham, S Musa
Computer Science Review 40, 100398, 2021
302021
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption
AA Shahzad, S Musa, A Aborujilah, M Irfan
Proceedings of the 8th international conference on ubiquitous information …, 2014
282014
Visualising communication network security attacks
S Musa, DJ Parish
2007 11th International Conference Information Visualization (IV'07), 726-733, 2007
262007
Towards a secure behavior modeling for iot networks using blockchain
J Ali, AS Khalid, E Yafi, S Musa, W Ahmed
arXiv preprint arXiv:2001.01841, 2020
232020
Deep contractive autoencoder-based anomaly detection for in-vehicle controller area network (CAN)
SF Lokman, AT Othman, S Musa, MH Abu Bakar
Progress in Engineering Technology: Automotive, Energy Generation, Quality …, 2019
222019
Trust Development in virtual teams to implement global software development (GSD): A structured approach to overcome communication barriers
A Iftikhar, M Alam, S Musa, MM Su'ud
2017 IEEE 3rd International Conference on Engineering Technologies and …, 2017
222017
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment
MN Ismail, A Aborujilah, S Musa, AA Shahzad
International Journal of Computer Science and Security (IJCSS) 6 (4), 226-237, 2012
212012
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models
S Jan, S Musa, T Ali, M Nauman, S Anwar, T Ali Tanveer, B Shah
Expert Systems 38 (4), e12611, 2021
202021
Detecting TCP SYN Based Flooding Attacks by Analyzing CPU and Network Resources Performance
A Aborujilah, S Musa, MN Ismail
Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd …, 2014
192014
The system can't perform the operation now. Try again later.
Articles 1–20