Shahrulniza Musa
Shahrulniza Musa
Professor, Universiti Kuala Lumpur (UniKL)
Zweryfikowany adres z unikl.edu.my - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach
MN Ismail, A Aborujilah, S Musa, AA Shahzad
Proceedings of the 7th international conference on ubiquitous information …, 2013
562013
How secure is your smartphone: An analysis of smartphone security mechanisms
S Khan, M Nauman, AT Othman, S Musa
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
502012
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security
S Musa, AA Shahzad, A Aborujilah
Proceedings of the 7th International Conference on Ubiquitous Information …, 2013
312013
Cloud-based DDoS HTTP attack detection using covariance matrix approach
A Aborujilah, S Musa
Journal of Computer Networks and Communications 2017, 2017
292017
Visualising communication network security attacks
S Musa, DJ Parish
2007 11th International Conference Information Visualization (IV'07), 726-733, 2007
262007
Challenges: Bridge between cloud and IoT
MR Belgaum, S Soomro, Z Alansari, S Musa, M Alam, MM Su'ud
2017 4th IEEE International Conference on Engineering Technologies and …, 2017
242017
The SCADA review: system components, architecture, protocols and future security trends
A Shahzad, S Musa, A Aborujilah, M Irfan
American Journal of Applied Sciences 11 (8), 1418, 2014
222014
A new cloud based supervisory control and data acquisition implementation to enhance the level of security using testbed
A Aborujilah, A Shahzad, M Irfan, S Musa
Science Publications, 2014
212014
Conceptual model of real time infrastructure within cloud computing environment
S Shahzad, S Musa, A Aborujilah, MN Ismail, M Irfan
Int. J. Comput. Networks 5, 18-24, 2013
182013
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment
MN Ismail, A Aborujilah, S Musa, AA Shahzad
International Journal of Computer Science and Security (IJCSS) 6 (4), 226-237, 2012
172012
Design and implementation of an efficient framework for behaviour attestation using n-call slides
R Ismail, TA Syed, S Musa
Proceedings of the 8th International Conference on Ubiquitous Information …, 2014
162014
Industrial control systems (icss) vulnerabilities analysis and scada security enhancement using testbed encryption
AA Shahzad, S Musa, A Aborujilah, M Irfan
Proceedings of the 8th International Conference on Ubiquitous Information …, 2014
162014
A performance approach: SCADA system implementation within cloud computing environment
AA Shahzad, S Musa, A Aborujilah, M Irfan
2013 International Conference on Advanced Computer Science Applications and …, 2013
162013
Towards secure IoT communication with smart contracts in a blockchain infrastructure
J Ali, T Ali, S Musa, A Zahrani
arXiv preprint arXiv:2001.01837, 2020
152020
Blockchain-based smart-IoT trust zone measurement architecture
J Ali, T Ali, Y Alsaawy, AS Khalid, S Musa
Proceedings of the International Conference on Omni-Layer Intelligent …, 2019
152019
Simulation base implementation for placement of security services in real time environment
S Musa, AA Shahzad, A Aborujilah
Proceedings of the 7th International Conference on Ubiquitous Information …, 2013
152013
Cryptography and authentication placement to provide secure channel for SCADA communication
A Shahzad, S Musa
International Journal of Security 6 (3), 28-44, 2012
142012
Detecting TCP SYN Based Flooding Attacks by Analyzing CPU and Network Resources Performance
A Aborujilah, S Musa, MN Ismail
Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd …, 2014
132014
Secure cryptography testbed implementation for scada protocols security
AA Shahzad, S Musa, A Aborujilah, M Irfan
2013 International Conference on Advanced Computer Science Applications and …, 2013
132013
Predicted and corrected location estimation of mobile nodes based on the combination of kalman filter and the bayesian decision theory
M Alam, MM Suud, P Boursier, S Musa, JCM Yusuf
International Conference on Mobile Wireless Middleware, Operating Systems …, 2010
132010
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20