Profile

SHAHRULNIZA BIN MUSA, PROFESSOR DR.

DEAN
MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY

shahrulniza@unikl.edu.my

56 publications, 65 citations
Researcher Identities
ORCID ID : 
Academia ID : 
ResearchGate : 
SCOPUS ID : 
Expert Area(s)
Division Category Group Area
ICT INFORMATION, COMPUTER AND COMMUNICATIONS TECHNOLOGY (ICT) Security System Intrusion Detection System
Security Protocols
Data Management Data Security
Publication(s)
  Title Cited By Year

Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

Shahrulniza Shahzad, Ismail Nazri, AAmir Shahzad, Shahrulniza Musa, Muhammad Irfan

6 Oct 2013

A Complete Behavioral Measurement and Reporting: Optimized for Mobile Devices

Toqeer Ali Syed, Megat Farez Zuhairi, Jawad Ali, Shahrulniza Musa, Mohammad Nauman
First EAI International Conference on Computer Science and Engineering

Jan 2017

Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach

Abdulaziz Aborujilah, Shahrulniza Musa
Journal of Computer Networks and Communications

Jan 2017

Critical review of intrusion detection systems in cloud computing environment

Abdulaziz Aborujilah, Shahrulniza Musa
2016 International Conference on Information and Communication Technology (ICICTM)

Jan 2016

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach

Mohd Nazri Bin Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, AAmir Shahzad

14 Jan 2013

Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace

Roslan Ismail, Toqeer Ali Syed, Shahrulniza Musa, Mohammad Nauman, Sohail Khan
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication

Jan 2013

Towards a high-level trusted computing API for Android software stack

Abu Talib Othman, Sohail Khan, Mohammad Nauman, Shahrulniza Musa
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication

1 Jan 2013

k-nearest neighbor algorithm for improving accuracy in clutter based location estimation of wireless nodes

Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa
Malaysian Journal of Computer Science

Jan 2011

Posterior Probabilities based Location Estimation (P2LE) algorithm for locating a mobile node in a disaster area

Muhammad Alam, M. S. Mazliham, Shahrulniza Musa, M. Amir

4 Jan 2009

A sense of others: behavioral attestation of UNIX processes on remoteplatforms

Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan

3 Feb 2012

Location Prediction by using Bayesian Decision Theory

Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa
4th MIIT R&D Colloquium 2011

Dec 2011

Modelling Error between Clutter Based Enhance Error Rate Table and Error Rate Table

Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa
3rd International Conference on Engineering Technology ICET 2011

Dec 2011

The First Approach towards the Location Estimation of Cellular Nodes by using Movable GSM Antennas

Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa, Jawahir Mustapha
ICET 2009

Dec 2009

Design and implementation of an attestation protocol for measured dynamic behavior

Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan
The Journal of Supercomputing

Apr 2017

Foreword by the main organising committee, universiti Kuala Lumpur (unikl), Malaysia

Othman, J., Musa, S.
2nd International Symposium on Agent, Multi-Agent Systems and Robotics, ISAMSR 2016

2017

Message from the dean, Malaysian institute of information technology, Universiti Kuala Lumpur (UNIKL)

Musa, S.
ICICTM 2016 - Proceedings of the 1st International Conference on Information and Communication Technology

2017

Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario

Toqeer Ali Syed, Jawad Ali, Tamleek Ali, Shahrulniza Musa
The 16th International Conference on Computational Science and Its Applications (ICCSA 2016), Springer LNCS, At Beijing, China

2016

Providing Efficient, Scalable and Privacy Preserved Verification Mechanism in Remote Attestation

Toqeer Ali Syed, Salman Jan, Shahrulniza Musa, Jawad Ali
Internation Conference on Information and Communication Technology, At Malaysia

3 2016

TSSDroid: Realization of an efficient and usable TSS API for the Android software stack

Khan, S., Nauman, M., Othman, A.T., Musa, S., Syed, T.A.
Security and Communication Networks

1 2016

Realization of a user-centric, privacy preserving permission framework for Android

Nauman, M., Khan, S., Othman, A.T., Musa, S.
Security and Communication Networks

6 2015

Towards Secure Instance Migration in the Cloud

Syed, T.A., Musa, S., Rahman, A., Jan, S.
2015 International Conference on Cloud Computing, ICCC 2015

4 2015

A new cloud based supervisory control and data acquisition implementation to enhance the level of security using testbed

A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan

7 2014

A performance approach: SCADA system implementation within cloud computing environment

Shahzad, A.A., Musa, S., Aborujilah, A., Irfan, M.
Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013

4 2014

A review: Industrial Control System (ICS) and their secuity issues

A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan

2014

Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement

A. Shahzad, Shahrulniza Musa, M. Irfan, S. Asadullah

12 2014

Design and implementation of an efficient framework for behaviour attestation using N-call slides

Ismail, R., Syed, T.A., Musa, S.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014

5 2014

Detecting TCP SYN Based Flooding Attacks by Analyzing CPU and Network Resources Performance

Abdulaziz Aborujilah, Mohd Nazri Ismail, Shahrulniza Musa
2014 3rd International Conference on Advanced Computer Science Applications and Technologies

2014

Detecting TCP SYN based flooding attacks by analyzing CPU and network resources performance

Aborujilah, A., Ismail, M.N., Musa, S.
Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014

2014

Industrial Control Systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption

Shahzad, A., Musa, S., Irfan, M., Aborujilah, A.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014

4 2014

Key Encryption Method for SCADA Security Enhancement

A. Shahzad, Shahrulniza Musa, M. Irfan, S. Asadullah

5 2014

N-Secure Cryptography Solution for SCADA Security Enhancement

A. Shahzad, Shahrulniza Musa, M. Irfan

10 2014

Secure cryptography testbed implementation for SCADA protocols security

Shahzad, A.A., Musa, S., Aborujilah, A., Irfan, M.
Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013

5 2014

Security Solution for SCADA Protocols Communication during Multicasting and Polling Scenario

A. Shahzad, Shahrulniza Musa, M. Irfan

1 2014

The security survey and anaylsis on supervisory control and data acquisition communication

A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan

2 2014

Transforming high-level requirements to executable policies for Android

Othman, A.T., Nauman, M., Musa, S., Khan, S.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014

2014

A Performance Approach: SCADA System Implementation within Cloud Computing Environment

AAmir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan
2013 International Conference on Advanced Computer Science Applications and Technologies

2013

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach

Ismail, M.N., Aborujilah, A., Musa, S., Shahzad, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

11 2013

Flooding Based DoS Attack Feature Selection Using Remove Correlated Attributes Algorithm

Abdulaziz Hadi saleh Aborujilah, Shahrulniza Musa, AAmir Shahzad, Mohd Nazri Bin Mohd Warip
2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)

2013

Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace

Roslan Ismail, Toqeer Ali Syed, Shahrulniza Musa, Sohail Khan
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication

2013

Secure Cryptography Testbed Implementation for SCADA Protocols Security

AAmir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan
2013 International Conference on Advanced Computer Science Applications and Technologies

2013

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security

Musa, S., Shahzad, A., Aborujilah, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

15 2013

Simulation base implementation for placement of security services in real time environment

Musa, S., Shahzad, A., Aborujilah, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

8 2013

Towards a high-level trusted computing API for Android software stack

Abu Talib Othman, Sohail Khan, Mohammad Nauman, Shahrulniza Musa
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication

1 2013

A sense of others: behavioral attestation of UNIX processes on remoteplatforms

Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Sohail Khan

3 2012

How secure is your smartphone: An analysis of smartphone security mechanisms

Khan, S., Nauman, M., Othman, A.T., Musa, S.
Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012

16 2012

POAuth: Privacy-aware open authorization for native apps on smartphone platforms

Nauman, M., Khan, S., Othman, A.T., Musa, S.U., Rehman, N.U.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12

3 2012

Securing SCADA communication using hybrid cryptography

Shahzad, A., Musa, S.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12

1 2012

Terrain/clutter based location prediction by using multi-condition Bayesian decision theory

A. Muhammad, M. S. Mazliham, Patrice Boursier, M. Shahrulniza, Jawahir Che Mustapha Yusuf
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication - ICUIMC '12

2012

Location Estimation and Filtering of Wireless Nodes in an Open Environment

Shahrulniza Musa

2011

Modeling interpolated distance error for clutter based location estimation of wireless nodes

Alam, M., Mohd Su'Ud, M., Boursier, P., Musa, S.
Communications in Computer and Information Science

1 2011

Predicted and corrected location estimation of mobile nodes based on the combination of Kalman Filter and the Bayesian decision theory

Alam, M., Suud, M.M., Boursier, P., Musa, S., Yusuf, J.C.M.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

6 2010

Using time series 3D AlertGraph and false alert classification to analyse Snort alerts

Musa, S., Parish, D.J.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

7 2008

Visualising communication network security attacks

Musa, S., Parish, D.J.
Proceedings of the International Conference on Information Visualisation

11 2007

Clutter based Enhance Error Rate Table (CERT) for error correction in location estimation of mobile nodes

Shahrulniza Musa

How secure is your smartphone: An analysis of smartphone security mechanisms

Shahrulniza Musa

Terrain/clutter based error calculation in location estimation of wireless nodes by using receive signal strength

Shahrulniza Musa

UniKL Researcher - SHAHRULNIZA MUSA