Follow
shukor razak
Title
Cited by
Cited by
Year
Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review
MA Alsoufi, S Razak, MM Siraj, I Nafea, FA Ghaleb, F Saeed, M Nasser
Applied sciences 11 (18), 8383, 2021
1662021
Financial fraud detection based on machine learning: a systematic literature review
A Ali, S Abd Razak, SH Othman, TAE Eisa, A Al-Dhaqm, M Nasser, ...
Applied Sciences 12 (19), 9637, 2022
1362022
Trust-based routing mechanism in MANET: Design and implementation
T Eissa, S Abdul Razak, RH Khokhar, N Samian
Mobile Networks and Applications 18, 666-677, 2013
1212013
Involvement of surveillance drones in smart cities: A systematic review
A Gohari, AB Ahmad, RBA Rahim, ASM Supa’at, S Abd Razak, ...
IEEE Access 10, 56611-56628, 2022
902022
Interference-aware multipath routing protocol for QoS improvement in event-driven wireless sensor networks
M Radi, B Dezfouli, KA Bakar, S Abd Razak, MA Nematbakhsh
Tsinghua Science and Technology 16 (5), 475-490, 2011
902011
LIEMRO: a Low-Interference energy-efficient multipath routing protocol for improving QoS in event-based wireless sensor networks
M Radi, B Dezfouli, S Abd Razak, KA Bakar
2010 Fourth International Conference on Sensor Technologies and Applications …, 2010
892010
Energy-efficient data collection in wireless sensor networks
MH Anisi, AH Abdullah, S Abd Razak
Wireless Sensor Network 3 (10), 329, 2011
822011
A review of mobile forensic investigation process models
A Al-Dhaqm, S Abd Razak, RA Ikuesan, VR Kebande, K Siddique
IEEE access 8, 173359-173375, 2020
782020
An overview of data routing approaches for wireless sensor networks
MH Anisi, AH Abdullah, SA Razak, MA Ngadi
Sensors 12 (4), 3964-3996, 2012
672012
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
SA Razak, SM Furnell, NL Clarke, PJ Brooke
Ad Hoc Networks 6 (7), 1151-1167, 2008
652008
Categorization and organization of database forensic investigation processes
A Al-Dhaqm, S Abd Razak, DA Dampier, KKR Choo, K Siddique, ...
IEEE Access 8, 112846-112858, 2020
612020
CDBFIP: Common database forensic investigation processes for Internet of Things
A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar
IEEE Access 5, 24401-24416, 2017
612017
Modeling low-power wireless communications
B Dezfouli, M Radi, S Abd Razak, T Hwee-Pink, KA Bakar
Journal of Network and Computer Applications 51, 102-126, 2015
612015
Delaunay triangulation as a new coverage measurement method in wireless sensor network
H Chizari, M Hosseini, T Poston, SA Razak, AH Abdullah
Sensors 11 (3), 3163-3176, 2011
602011
Research challenges and opportunities in drone forensics models
A Al-Dhaqm, RA Ikuesan, VR Kebande, S Razak, FM Ghabban
Electronics 10 (13), 1519, 2021
572021
Towards the development of an integrated incident response model for database forensic investigation field
A Al-Dhaqm, S Abd Razak, K Siddique, RA Ikuesan, VR Kebande
IEEE Access 8, 145018-145032, 2020
542020
Data anonymization using pseudonym system to preserve data privacy
S Abd Razak, NHM Nazari, A Al-Dhaqm
Ieee Access 8, 43256-43264, 2020
502020
Development and validation of a Database Forensic Metamodel (DBFM)
A Al-Dhaqm, S Razak, SH Othman, A Ngadi, MN Ahmed, ...
PloS one 12 (2), e0170793, 2017
492017
Digital forensics subdomains: the state of the art and future directions
A Al-Dhaqm, RA Ikuesan, VR Kebande, S Abd Razak, G Grispos, ...
IEEE Access 9, 152476-152502, 2021
482021
A review of current research in network forensic analysis
IR Adeyemi, S Abd Razak, NAN Azhan
International Journal of Digital Crime and Forensics (IJDCF) 5 (1), 1-26, 2013
482013
The system can't perform the operation now. Try again later.
Articles 1–20