Profile

SHAHRULNIZA BIN MUSA, PROFESSOR DR.

PROFESSOR
COMPUTER ENGINEERING TECHNOLOGY SECTION
MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY

shahrulniza@unikl.edu.my

60 publications, 65 citations
Researcher Identities
ORCID ID : 
Academia ID : 
ResearchGate : 
SCOPUS ID : 
Expert Area(s)
Division Category Group Area
ICT INFORMATION, COMPUTER AND COMMUNICATIONS TECHNOLOGY (ICT) Security System Intrusion Detection System
Security Protocols
Data Management Data Security
Publication(s)
  Title Cited By Year

Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

Shahrulniza Shahzad, Ismail Nazri, AAmir Shahzad, Shahrulniza Musa, Muhammad Irfan

8 Oct 2013

A Complete Behavioral Measurement and Reporting: Optimized for Mobile Devices

Toqeer Ali Syed, Megat Farez Zuhairi, Jawad Ali, Shahrulniza Musa, Mohammad Nauman
First EAI International Conference on Computer Science and Engineering

Jan 2017

Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach

Abdulaziz Aborujilah, Shahrulniza Musa
Journal of Computer Networks and Communications

Jan 2017

Critical review of intrusion detection systems in cloud computing environment

Abdulaziz Aborujilah, Shahrulniza Musa
2016 International Conference on Information and Communication Technology (ICICTM)

Jan 2016

k-nearest neighbor algorithm for improving accuracy in clutter based location estimation of wireless nodes

Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa
Malaysian Journal of Computer Science

Jan 2011

Posterior Probabilities based Location Estimation (P2LE) algorithm for locating a mobile node in a disaster area

Muhammad Alam, M. S. Mazliham, Shahrulniza Musa, M. Amir

7 Jan 2009

Location Prediction by using Bayesian Decision Theory

Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa
4th MIIT R&D Colloquium 2011

Dec 2011

Modelling Error between Clutter Based Enhance Error Rate Table and Error Rate Table

Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa
3rd International Conference on Engineering Technology ICET 2011

Dec 2011

The First Approach towards the Location Estimation of Cellular Nodes by using Movable GSM Antennas

Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa, Jawahir Mustapha
ICET 2009

Dec 2009

Design and implementation of an attestation protocol for measured dynamic behavior

Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan
The Journal of Supercomputing

Apr 2017

Blockchain-based smart-IoT trust zone measurement architecture

Ali, J., Ali, T., Alsaawy, Y., Khalid, A.S., Musa, S.
ACM International Conference Proceeding Series

2019

SPL Features Quantification and Selection Based on Multiple Multi-Level Objectives

Fazal Qudus Khan, Shahrulniza Musa, Georgios Tsaramirsis, Seyed M. Buhari
Applied Sciences

2019

A novel requirements analysis approach in SPL based on collateral, KAOS and feature model

Khan, F.Q., Musa, S., Tsaramirsis, G., Khan, S.
International Journal of Engineering and Technology(UAE)

2018

A survey of soft computing applications in global software development

Iftikhar, A., Musa, S., Alam, M., Su'Ud, M.M., Ali, S.M.
2018 IEEE International Conference on Innovative Research and Development, ICIRD 2018

2018

Challenges: Bridge between cloud and IoT

Belgaum, M.R., Soomro, S., Alansari, Z., Musa, S., Alam, M., Su'Ud, M.M.
4th IEEE International Conference on Engineering Technologies and Applied Sciences, ICETAS 2017

4 2018

Checkpoints and requirements based cloud service ranking

Belgaum, M.R., Musa, S., Alam, M., Mohd Su¿ud, M., Soomro, S., Alansari, Z.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

2018

Deep convolutional generative adversarial networks for in-tent-based dynamic behavior capture

Jan, S., Musa, S., Ali, T., Alzahrani, A.
International Journal of Engineering and Technology(UAE)

1 2018

Effect of lean systematic method on specimen handling activities for patients in medical wards

Abu Bakar, N.W., Mohamad, A.H., Jatavakabhulla, P.K., Musa, S., Rahman, M.A., Soon, L.F., Geek, T.S., Rahim, A.A.
International Journal of Engineering and Technology(UAE)

1 2018

IT students' sentiment of faculty evaluations and posting opinions on social media networks

Aborujilah, A., Nassr, R.M., Musa, S.B., Abdullah, M.
ACM International Conference Proceeding Series

2018

Load balancing with preemptive and non-preemptive task scheduling in cloud computing

Belgaum, M.R., Soomro, S., Alansari, Z., Alam, M., Musa, S., Su'Ud, M.M.
2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences, ICETSS 2017

2 2018

Malware analysis and detection approaches: Drive to deep learning

Ali, T., Jan, S., Musa, S.N., Rahman, A.
Journal of Engineering and Applied Sciences

2018

Pilgrims' acceptance of using augmented reality applications while performing the Hajj

Nassr, R., Saleh, A.H., Almalki, H.M., Almalki, S., Musa, S.
International Journal of Engineering and Technology(UAE)

2018

Towards secure IoT communication with smart contracts in a Blockchain infrastructure

Ali, J., Ali, T., Musa, S., Zahrani, A.
International Journal of Advanced Computer Science and Applications

2 2018

Trust Development in virtual teams to implement global software development (GSD): A structured approach to overcome communication barriers

Iftikhar, A., Alam, M., Musa, S., Su'Ud, M.M.
2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences, ICETSS 2017

1 2018

Foreword by the main organising committee, universiti Kuala Lumpur (unikl), Malaysia

Othman, J., Musa, S.
2nd International Symposium on Agent, Multi-Agent Systems and Robotics, ISAMSR 2016

2017

Message from the dean, Malaysian institute of information technology, Universiti Kuala Lumpur (UNIKL)

Musa, S.
ICICTM 2016 - Proceedings of the 1st International Conference on Information and Communication Technology

2017

Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario

Toqeer Ali Syed, Jawad Ali, Tamleek Ali, Shahrulniza Musa
The 16th International Conference on Computational Science and Its Applications (ICCSA 2016), Springer LNCS, At Beijing, China

2016

Providing Efficient, Scalable and Privacy Preserved Verification Mechanism in Remote Attestation

Toqeer Ali Syed, Salman Jan, Shahrulniza Musa, Jawad Ali
Internation Conference on Information and Communication Technology, At Malaysia

3 2016

TSSDroid: Realization of an efficient and usable TSS API for the Android software stack

Khan, S., Nauman, M., Othman, A.T., Musa, S., Syed, T.A.
Security and Communication Networks

1 2016

Realization of a user-centric, privacy preserving permission framework for Android

Nauman, M., Khan, S., Othman, A.T., Musa, S.
Security and Communication Networks

7 2015

Towards Secure Instance Migration in the Cloud

Syed, T.A., Musa, S., Rahman, A., Jan, S.
2015 International Conference on Cloud Computing, ICCC 2015

5 2015

A new cloud based supervisory control and data acquisition implementation to enhance the level of security using testbed

A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan

8 2014

A performance approach: SCADA system implementation within cloud computing environment

Shahzad, A.A., Musa, S., Aborujilah, A., Irfan, M.
Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013

6 2014

A review: Industrial Control System (ICS) and their secuity issues

A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan

2014

Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement

A. Shahzad, Shahrulniza Musa, M. Irfan, S. Asadullah

12 2014

Design and implementation of an efficient framework for behaviour attestation using N-call slides

Ismail, R., Syed, T.A., Musa, S.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014

9 2014

Detecting TCP SYN based flooding attacks by analyzing CPU and network resources performance

Aborujilah, A., Ismail, M.N., Musa, S.
Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014

2 2014

Industrial Control Systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption

Shahzad, A., Musa, S., Irfan, M., Aborujilah, A.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014

6 2014

Key Encryption Method for SCADA Security Enhancement

A. Shahzad, Shahrulniza Musa, M. Irfan, S. Asadullah

5 2014

N-Secure Cryptography Solution for SCADA Security Enhancement

A. Shahzad, Shahrulniza Musa, M. Irfan

10 2014

Secure cryptography testbed implementation for SCADA protocols security

Shahzad, A.A., Musa, S., Aborujilah, A., Irfan, M.
Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013

8 2014

Security Solution for SCADA Protocols Communication during Multicasting and Polling Scenario

A. Shahzad, Shahrulniza Musa, M. Irfan

1 2014

The SCADA review: System components, architecture, protocols and future security trends

Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.
American Journal of Applied Sciences

2 2014

The security survey and anaylsis on supervisory control and data acquisition communication

A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan

2 2014

Transforming high-level requirements to executable policies for Android

Othman, A.T., Nauman, M., Musa, S., Khan, S.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014

2014

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach

Ismail, M.N., Aborujilah, A., Musa, S., Shahzad, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

12 2013

Flooding Based DoS Attack Feature Selection Using Remove Correlated Attributes Algorithm

Abdulaziz Hadi saleh Aborujilah, Shahrulniza Musa, AAmir Shahzad, Mohd Nazri Bin Mohd Warip
2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)

2013

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security

Musa, S., Shahzad, A., Aborujilah, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

18 2013

Simulation base implementation for placement of security services in real time environment

Musa, S., Shahzad, A., Aborujilah, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

8 2013

How secure is your smartphone: An analysis of smartphone security mechanisms

Khan, S., Nauman, M., Othman, A.T., Musa, S.
Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012

17 2012

POAuth: Privacy-aware open authorization for native apps on smartphone platforms

Nauman, M., Khan, S., Othman, A.T., Musa, S.U., Rehman, N.U.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12

3 2012

Securing SCADA communication using hybrid cryptography

Shahzad, A., Musa, S.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12

1 2012

Terrain/clutter based location prediction by using multi-condition Bayesian decision theory

A. Muhammad, M. S. Mazliham, Patrice Boursier, M. Shahrulniza, Jawahir Che Mustapha Yusuf
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication - ICUIMC '12

2012

Location Estimation and Filtering of Wireless Nodes in an Open Environment

Shahrulniza Musa

2011

Modeling interpolated distance error for clutter based location estimation of wireless nodes

Alam, M., Mohd Su'Ud, M., Boursier, P., Musa, S.
Communications in Computer and Information Science

1 2011

Predicted and corrected location estimation of mobile nodes based on the combination of Kalman Filter and the Bayesian decision theory

Alam, M., Suud, M.M., Boursier, P., Musa, S., Yusuf, J.C.M.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

6 2010

Using time series 3D AlertGraph and false alert classification to analyse Snort alerts

Musa, S., Parish, D.J.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

7 2008

Visualising communication network security attacks

Musa, S., Parish, D.J.
Proceedings of the International Conference on Information Visualisation

13 2007

Clutter based Enhance Error Rate Table (CERT) for error correction in location estimation of mobile nodes

Shahrulniza Musa

Terrain/clutter based error calculation in location estimation of wireless nodes by using receive signal strength

Shahrulniza Musa

UniKL Researcher - SHAHRULNIZA MUSA