default search action
Shahrulniza Musa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Mohammad Riyaz Belgaum, Shahrulniza Musa, Fuead Ali, Muhammad Mansoor Alam, Zainab Alansari, Safeeullah Soomro, Mazliham Mohd Su'ud:
Self-Socio Adaptive Reliable Particle Swarm Optimization Load Balancing in Software-Defined Networking. IEEE Access 11: 101666-101677 (2023) - [j14]Muhammad Bilal, Atif Khan, Salman Jan, Shahrulniza Musa, Shaukat Ali:
Roman Urdu Hate Speech Detection Using Transformer-Based Model for Cyber Security Applications. Sensors 23(8): 3909 (2023) - 2022
- [j13]Muhammad Bilal, Atif Khan, Salman Jan, Shahrulniza Musa:
Context-Aware Deep Learning Model for Detection of Roman Urdu Hate Speech on Social Media Platform. IEEE Access 10: 121133-121151 (2022) - [j12]Asim Iftikhar, Shahrulniza Musa, Muhammad Mansoor Alam, Rizwan Ahmed, Mazliham Mohd Su'ud, Laiq Muhammad Khan, Syed Mubashir Ali:
Risk Classification in Global Software Development Using a Machine Learning Approach: A Result Comparison of Support Vector Machine and K-Nearest Neighbor Algorithms. J. Inf. Technol. Res. 15(1): 1-21 (2022) - 2021
- [j11]Asim Iftikhar, Muhammad Alam, Rizwan Ahmed, Shahrulniza Musa, Mazliham Mohd Su'ud:
Risk Prediction by Using Artificial Neural Network in Global Software Development. Comput. Intell. Neurosci. 2021: 2922728:1-2922728:25 (2021) - [j10]Muhammad Asim Shahid, Noman Islam, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Shahrulniza Musa:
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment. Comput. Sci. Rev. 40: 100398 (2021) - [j9]Salman Jan, Shahrulniza Musa, Toqeer Ali Syed, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, Babar Shah:
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models. Expert Syst. J. Knowl. Eng. 38(4) (2021) - 2020
- [j8]Mohammad Riyaz Belgaum, Shahrulniza Musa, Muhammad Mansoor Alam, Mazliham Mohd Su'ud:
A Systematic Review of Load Balancing Techniques in Software-Defined Networking. IEEE Access 8: 98612-98636 (2020) - [j7]Muhammad Asim Shahid, Noman Islam, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Shahrulniza Musa:
A Comprehensive Study of Load Balancing Approaches in the Cloud Computing Environment and a Novel Fault Tolerance Approach. IEEE Access 8: 130500-130526 (2020) - [i6]Jawad Ali, Toqeer Ali Syed, Shahrulniza Musa, Ali Zahrani:
Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure. CoRR abs/2001.01837 (2020) - [i5]Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed:
Towards a secure behavior modeling for IoT networks using Blockchain. CoRR abs/2001.01841 (2020) - [i4]Jawad Ali, Toqeer Ali Syed, Yazed Alsaawy, Ahmad Shahrafidz Khalid, Shahrulniza Musa:
Blockchain-based Smart-IoT Trust Zone Measurement Architecture. CoRR abs/2001.03002 (2020)
2010 – 2019
- 2019
- [c22]Siti-Farhana Lokman, Abu Talib Othman, Muhamad-Husaini Abu-Bakar, Shahrulniza Musa:
The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN). ACeS 2019: 195-205 - [c21]Jawad Ali, Toqeer Ali Syed, Yazed Alsaawy, Ahmad Shahrafidz Khalid, Shahrulniza Musa:
Blockchain-based Smart-IoT Trust Zone Measurement Architecture. COINS 2019: 152-157 - [c20]Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed:
Towards a Secure Behavior Modeling for IoT Networks Using Blockchain. ICAI Workshops 2019: 244-258 - [i3]Mohammad Riyaz Belgaum, Shahrulniza Musa, Mazliham Mohd Su'ud, Muhammad Alam, Safeeullah Soomro, Zainab Alansari:
Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks. CoRR abs/1904.01826 (2019) - [i2]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Shahrulniza Musa, Muhammad Alam, Mazliham Mohd Su'ud:
Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing. CoRR abs/1905.03094 (2019) - 2018
- [j6]Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan:
Design and implementation of an attestation protocol for measured dynamic behavior. J. Supercomput. 74(11): 5746-5773 (2018) - [c19]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, Shahrulniza Bin Musa, Munaisyah Abdullah:
IT Students' Sentiment of Faculty Evaluations and Posting Opinions on Social Media Networks. IMCOM 2018: 15:1-15:5 - [i1]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam, Shahrulniza Musa, Mazliham Mohd Su'ud:
Challenges: Bridge between Cloud and IoT. CoRR abs/1803.02890 (2018) - 2017
- [j5]Abdulaziz Aborujilah, Shahrulniza Musa:
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach. J. Comput. Networks Commun. 2017: 7674594:1-7674594:8 (2017) - 2016
- [j4]Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa, Toqeer Ali Syed:
TSSDroid: realization of an efficient and usable TSS API for the Android software stack. Secur. Commun. Networks 9(11): 1553-1576 (2016) - [c18]Toqeer Ali Syed, Jawad Ali, Tamleek Ali, Mohammad Nauman, Shahrulniza Musa:
Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario. ICCSA (4) 2016: 407-421 - 2015
- [j3]Mohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa:
Realization of a user-centric, privacy preserving permission framework for Android. Secur. Commun. Networks 8(3): 368-382 (2015) - 2014
- [j2]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed. J. Comput. Sci. 10(4): 652-659 (2014) - [j1]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication. J. Comput. Sci. 10(10): 2006-2019 (2014) - [c17]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. ICUIMC 2014: 7:1-7:6 - [c16]Roslan Ismail, Toqeer Ali Syed, Shahrulniza Musa:
Design and implementation of an efficient framework for behaviour attestation using n-call slides. ICUIMC 2014: 36:1-36:8 - [c15]Abu Talib Othman, Mohammad Nauman, Shahrulniza Musa, Sohail Khan:
Transforming high-level requirements to executable policies for Android. ICUIMC 2014: 112:1-112:8 - 2013
- [c14]Toqeer Ali Syed, Tamleek Ali Tanveer, Roslan Ismail, Shahrulniza Musa:
End to End Verification Mechanism for Dynamic Behavior Attestation. ICISA 2013: 1-4 - [c13]Abu Talib Othman, Sohail Khan, Mohammad Nauman, Shahrulniza Musa:
Towards a high-level trusted computing API for Android software stack. ICUIMC 2013: 17 - [c12]Roslan Ismail, Toqeer Ali Syed, Shahrulniza Musa, Mohammad Nauman, Sohail Khan:
Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace. ICUIMC 2013: 18 - [c11]Shahrulniza Musa, Aamir Shahzad, Abdulaziz Aborujilah:
Simulation base implementation for placement of security services in real time environment. ICUIMC 2013: 31 - [c10]Shahrulniza Musa, Aamir Shahzad, Abdulaziz Aborujilah:
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security. ICUIMC 2013: 32 - [c9]Mohd Nazri Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, Aamir Shahzad:
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. ICUIMC 2013: 36 - 2012
- [c8]Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa:
How secure is your smartphone: An analysis of smartphone security mechanisms. CyberSec 2012: 76-81 - [c7]Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan:
A sense of others: behavioral attestation of UNIX processes on remote platforms. ICUIMC 2012: 51:1-51:7 - [c6]Mohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa, Najeeb Ur Rehman:
POAuth: privacy-aware open authorization for native apps on smartphone platforms. ICUIMC 2012: 60:1-60:8 - [c5]Muhammad Alam, Mohd Su'ud Mazliham, Patrice Boursier, Shahrulniza Musa, Jawahir Che Mustapha Yusuf:
Terrain/clutter based location prediction by using multi-condition Bayesian decision theory. ICUIMC 2012: 110:1-110:9 - 2011
- [c4]Muhammad Alam, Mazliham Mohd Su'ud, Patrice Boursier, Shahrulniza Musa:
Modeling Interpolated Distance Error for Clutter Based Location Estimation of Wireless Nodes. DICTAP (2) 2011: 115-130 - 2010
- [c3]Muhammad Alam, Mazliham Muhammad Suud, Patrice Boursier, Shahrulniza Musa, Jawahir Che Mustapha Yusuf:
Predicted and Corrected Location Estimation of Mobile Nodes Based on the Combination of Kalman Filter and the Bayesian Decision Theory. MOBILWARE 2010: 313-325
2000 – 2009
- 2008
- [b1]Shahrulniza Musa:
Visualising network security attacks with multiple 3D visualisation and false alert classification. Loughborough University, UK, 2008 - [c2]Shahrulniza Musa, David J. Parish:
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. VizSEC 2008: 169-180 - 2007
- [c1]Shahrulniza Musa, David J. Parish:
Visualising Communication Network Security Attacks. IV 2007: 726-733
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint