A survey on routing techniques in underwater wireless sensor networks M Ayaz, I Baig, A Abdullah, I Faye Journal of Network and Computer Applications 34 (6), 1908-1927, 2011 | 430 | 2011 |
Hop-by-hop dynamic addressing based (H2-DAB) routing protocol for underwater wireless sensor networks M Ayaz, A Abdullah 2009 international conference on information and multimedia technology, 436-441, 2009 | 217 | 2009 |
Ransomware, threat and detection techniques: A review S Kok, A Abdullah, N Jhanjhi, M Supramaniam Int. J. Comput. Sci. Netw. Secur 19 (2), 136, 2019 | 144 | 2019 |
Load balancing techniques in cloud computing environment: A review DA Shafiq, NZ Jhanjhi, A Abdullah Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022 | 141 | 2022 |
A load balancing algorithm for the data centres to optimize cloud computing applications DA Shafiq, NZ Jhanjhi, A Abdullah, MA Alzain IEEE Access 9, 41731-41744, 2021 | 129 | 2021 |
Application of artificial neural network in detection of DOS attacks I Ahmad, AB Abdullah, AS Alghamdi Proceedings of the 2nd international conference on Security of information …, 2009 | 124 | 2009 |
Phishing website detection: An improved accuracy through feature selection and ensemble learning AA Ubing, SKB Jasmi, A Abdullah, NZ Jhanjhi, M Supramaniam International Journal of Advanced Computer Science and Applications 10 (1), 2019 | 115 | 2019 |
An efficient dynamic addressing based routing protocol for underwater wireless sensor networks M Ayaz, A Abdullah, I Faye, Y Batira Computer Communications 35 (4), 475-486, 2012 | 114 | 2012 |
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning S Lee, A Abdullah, N Jhanjhi, S Kok PeerJ Computer Science 7, e350, 2021 | 113 | 2021 |
Prevention of crypto-ransomware using a pre-encryption detection algorithm SH Kok, A Abdullah, NZ Jhanjhi, M Supramaniam Computers 8 (4), 79, 2019 | 94 | 2019 |
Performance optimization of criminal network hidden link prediction model with deep reinforcement learning M Lim, A Abdullah, NZ Jhanjhi Journal of King Saud University-Computer and Information Sciences 33 (10 …, 2021 | 89 | 2021 |
Usability testing methodology: Effectiveness of heuristic evaluation in E-government website development A Sivaji, A Abdullah, AG Downe 2011 fifth Asia modelling symposium, 68-72, 2011 | 87 | 2011 |
Early detection of crypto-ransomware using pre-encryption detection algorithm SH Kok, A Abdullah, NZ Jhanjhi Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022 | 84 | 2022 |
Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study VE Adeyemo, A Abdullah, NZ JhanJhi, M Supramaniam, AO Balogun International Journal of Advanced Computer Science and Applications 10 (9), 2019 | 84 | 2019 |
Evaluation metric for crypto-ransomware detection using machine learning SH Kok, A Azween, NZ Jhanjhi Journal of Information Security and Applications 55, 102646, 2020 | 81 | 2020 |
Systematic analysis of applied data mining based optimization algorithms in clinical attribute extraction and classification for diagnosis of cardiac patients N Kausar, S Palaniappan, BB Samir, A Abdullah, N Dey Applications of Intelligent Optimization in Biology and Medicine: Current …, 2016 | 81 | 2016 |
Importance of incorporating fundamental usability with social & trust elements for e-commerce website A Sivaji, AG Downe, MF Mazlan, ST Soo, A Abdullah 2011 International Conference on Business, Engineering and Industrial …, 2011 | 81 | 2011 |
A new model for predicting component-based software reliability using soft computing C Diwaker, P Tomar, A Solanki, A Nayyar, NZ Jhanjhi, A Abdullah, ... IEEE Access 7, 147191-147203, 2019 | 80 | 2019 |
Hidden link prediction in criminal networks using the deep reinforcement learning technique M Lim, A Abdullah, NZ Jhanjhi, M Supramaniam Computers 8 (1), 8, 2019 | 78 | 2019 |
Application of artificial neural network in detection of probing attacks I Ahmad, AB Abdullah, AS Alghamdi 2009 IEEE Symposium on Industrial Electronics & Applications 2, 557-562, 2009 | 77 | 2009 |