Follow
shukor razak
Title
Cited by
Cited by
Year
Trust-based routing mechanism in MANET: Design and implementation
T Eissa, S Abdul Razak, RH Khokhar, N Samian
Mobile Networks and Applications 18, 666-677, 2013
1182013
Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review
MA Alsoufi, S Razak, MM Siraj, I Nafea, FA Ghaleb, F Saeed, M Nasser
Applied sciences 11 (18), 8383, 2021
1102021
Interference-aware multipath routing protocol for QoS improvement in event-driven wireless sensor networks
M Radi, B Dezfouli, KA Bakar, S Abd Razak, MA Nematbakhsh
Tsinghua Science and Technology 16 (5), 475-490, 2011
922011
LIEMRO: a Low-Interference energy-efficient multipath routing protocol for improving QoS in event-based wireless sensor networks
M Radi, B Dezfouli, S Abd Razak, KA Bakar
2010 Fourth International Conference on Sensor Technologies and Applications …, 2010
832010
Energy-efficient data collection in wireless sensor networks
MH Anisi, AH Abdullah, S Abd Razak
Wireless Sensor Network 3 (10), 329, 2011
792011
An overview of data routing approaches for wireless sensor networks
MH Anisi, AH Abdullah, SA Razak, MA Ngadi
Sensors 12 (4), 3964-3996, 2012
662012
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
SA Razak, SM Furnell, NL Clarke, PJ Brooke
Ad Hoc Networks 6 (7), 1151-1167, 2008
642008
Modeling low-power wireless communications
B Dezfouli, M Radi, S Abd Razak, T Hwee-Pink, KA Bakar
Journal of Network and Computer Applications 51, 102-126, 2015
612015
Delaunay triangulation as a new coverage measurement method in wireless sensor network
H Chizari, M Hosseini, T Poston, SA Razak, AH Abdullah
Sensors 11 (3), 3163-3176, 2011
602011
CDBFIP: Common database forensic investigation processes for Internet of Things
A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar
IEEE Access 5, 24401-24416, 2017
532017
Categorization and organization of database forensic investigation processes
A Al-Dhaqm, S Abd Razak, DA Dampier, KKR Choo, K Siddique, ...
IEEE Access 8, 112846-112858, 2020
512020
A review of mobile forensic investigation process models
A Al-Dhaqm, S Abd Razak, RA Ikuesan, VR Kebande, K Siddique
IEEE access 8, 173359-173375, 2020
502020
Attacks against mobile ad hoc networks routing protocol
SA Razak, SM Furnell, PJ Brooke
482004
Financial fraud detection based on machine learning: a systematic literature review
A Ali, S Abd Razak, SH Othman, TAE Eisa, A Al-Dhaqm, M Nasser, ...
Applied Sciences 12 (19), 9637, 2022
462022
Towards the development of an integrated incident response model for database forensic investigation field
A Al-Dhaqm, S Abd Razak, K Siddique, RA Ikuesan, VR Kebande
IEEE Access 8, 145018-145032, 2020
462020
Fundamental lifetime mechanisms in routing protocols for wireless sensor networks: A survey and open issues
M Eslaminejad, SA Razak
sensors 12 (10), 13508-13544, 2012
462012
Involvement of surveillance drones in smart cities: A systematic review
A Gohari, AB Ahmad, RBA Rahim, ASM Supa’at, S Abd Razak, ...
IEEE Access 10, 56611-56628, 2022
442022
Research challenges and opportunities in drone forensics models
A Al-Dhaqm, RA Ikuesan, VR Kebande, S Razak, FM Ghabban
Electronics 10 (13), 1519, 2021
432021
Development and validation of a database forensic metamodel (DBFM)
A Al-Dhaqm, S Razak, SH Othman, A Ngadi, MN Ahmed, ...
PloS one 12 (2), e0170793, 2017
432017
A review of current research in network forensic analysis
IR Adeyemi, S Abd Razak, NAN Azhan
International Journal of Digital Crime and Forensics (IJDCF) 5 (1), 1-26, 2013
432013
The system can't perform the operation now. Try again later.
Articles 1–20