Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review MA Alsoufi, S Razak, MM Siraj, I Nafea, FA Ghaleb, F Saeed, M Nasser Applied sciences 11 (18), 8383, 2021 | 166 | 2021 |
Financial fraud detection based on machine learning: a systematic literature review A Ali, S Abd Razak, SH Othman, TAE Eisa, A Al-Dhaqm, M Nasser, ... Applied Sciences 12 (19), 9637, 2022 | 136 | 2022 |
Trust-based routing mechanism in MANET: Design and implementation T Eissa, S Abdul Razak, RH Khokhar, N Samian Mobile Networks and Applications 18, 666-677, 2013 | 121 | 2013 |
Involvement of surveillance drones in smart cities: A systematic review A Gohari, AB Ahmad, RBA Rahim, ASM Supa’at, S Abd Razak, ... IEEE Access 10, 56611-56628, 2022 | 90 | 2022 |
Interference-aware multipath routing protocol for QoS improvement in event-driven wireless sensor networks M Radi, B Dezfouli, KA Bakar, S Abd Razak, MA Nematbakhsh Tsinghua Science and Technology 16 (5), 475-490, 2011 | 90 | 2011 |
LIEMRO: a Low-Interference energy-efficient multipath routing protocol for improving QoS in event-based wireless sensor networks M Radi, B Dezfouli, S Abd Razak, KA Bakar 2010 Fourth International Conference on Sensor Technologies and Applications …, 2010 | 89 | 2010 |
Energy-efficient data collection in wireless sensor networks MH Anisi, AH Abdullah, S Abd Razak Wireless Sensor Network 3 (10), 329, 2011 | 82 | 2011 |
A review of mobile forensic investigation process models A Al-Dhaqm, S Abd Razak, RA Ikuesan, VR Kebande, K Siddique IEEE access 8, 173359-173375, 2020 | 78 | 2020 |
An overview of data routing approaches for wireless sensor networks MH Anisi, AH Abdullah, SA Razak, MA Ngadi Sensors 12 (4), 3964-3996, 2012 | 67 | 2012 |
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks SA Razak, SM Furnell, NL Clarke, PJ Brooke Ad Hoc Networks 6 (7), 1151-1167, 2008 | 65 | 2008 |
Categorization and organization of database forensic investigation processes A Al-Dhaqm, S Abd Razak, DA Dampier, KKR Choo, K Siddique, ... IEEE Access 8, 112846-112858, 2020 | 61 | 2020 |
CDBFIP: Common database forensic investigation processes for Internet of Things A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar IEEE Access 5, 24401-24416, 2017 | 61 | 2017 |
Modeling low-power wireless communications B Dezfouli, M Radi, S Abd Razak, T Hwee-Pink, KA Bakar Journal of Network and Computer Applications 51, 102-126, 2015 | 61 | 2015 |
Delaunay triangulation as a new coverage measurement method in wireless sensor network H Chizari, M Hosseini, T Poston, SA Razak, AH Abdullah Sensors 11 (3), 3163-3176, 2011 | 60 | 2011 |
Research challenges and opportunities in drone forensics models A Al-Dhaqm, RA Ikuesan, VR Kebande, S Razak, FM Ghabban Electronics 10 (13), 1519, 2021 | 57 | 2021 |
Towards the development of an integrated incident response model for database forensic investigation field A Al-Dhaqm, S Abd Razak, K Siddique, RA Ikuesan, VR Kebande IEEE Access 8, 145018-145032, 2020 | 54 | 2020 |
Data anonymization using pseudonym system to preserve data privacy S Abd Razak, NHM Nazari, A Al-Dhaqm Ieee Access 8, 43256-43264, 2020 | 50 | 2020 |
Development and validation of a Database Forensic Metamodel (DBFM) A Al-Dhaqm, S Razak, SH Othman, A Ngadi, MN Ahmed, ... PloS one 12 (2), e0170793, 2017 | 49 | 2017 |
Digital forensics subdomains: the state of the art and future directions A Al-Dhaqm, RA Ikuesan, VR Kebande, S Abd Razak, G Grispos, ... IEEE Access 9, 152476-152502, 2021 | 48 | 2021 |
A review of current research in network forensic analysis IR Adeyemi, S Abd Razak, NAN Azhan International Journal of Digital Crime and Forensics (IJDCF) 5 (1), 1-26, 2013 | 48 | 2013 |