Profile

ABORUJILAH ABDULAZIZ HADI SALEH, DR.

SENIOR LECTURER
CYBERSECURITY & TECHNOLOGICAL CONVERGENCE (CTC)
MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY

Abdulazizsaleh@unikl.edu.my

14 publications, 18 citations
Researcher Identities
ORCID ID : 
Publication(s)
  Title Cited By Year

A new cloud based supervisory control and data acquisition implementation to enhance the level of security using testbed

Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.
Journal of Computer Science

5 2014

A performance approach: SCADA system implementation within cloud computing environment

Shahzad, A.A., Musa, S., Aborujilah, A., Irfan, M.
Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013

6 2014

A review: Industrial Control System (ICS) and their secuity issues

Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.
American Journal of Applied Sciences

2014

Detecting TCP SYN based flooding attacks by analyzing CPU and network resources performance

Aborujilah, A., Ismail, M.N., Musa, S.
Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014

2 2014

Flooding based DoS attack feature selection using remove correlated attributes algorithm

Aborujilah, A.H.S., Musa, S., Shahzad, A.A., Alsharafi, A., Nazri, M.
Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013

1 2014

Industrial Control Systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption

Shahzad, A., Musa, S., Irfan, M., Aborujilah, A.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014

6 2014

Organizational factors in the adoption of cloud computing in E-Learning

Mokhtar, S.A., Ali, S.H.S., Al-Sharafi, A., Aborujilah, A.
Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014

3 2014

Secure cryptography testbed implementation for SCADA protocols security

Shahzad, A.A., Musa, S., Aborujilah, A., Irfan, M.
Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013

8 2014

The SCADA review: System components, architecture, protocols and future security trends

Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.
American Journal of Applied Sciences

2 2014

The security survey and anaylsis on supervisory control and data acquisition communication

Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.
Journal of Computer Science

2 2014

Cloud computing in academic institutions

Mokhtar, S.A., Ali, S.H.S., Al-Sharafi, A., Aborujilah, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

17 2013

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach

Ismail, M.N., Aborujilah, A., Musa, S., Shahzad, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

12 2013

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security

Musa, S., Shahzad, A., Aborujilah, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

18 2013

Simulation base implementation for placement of security services in real time environment

Musa, S., Shahzad, A., Aborujilah, A.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

8 2013
UniKL Researcher - ABORUJILAH ABDULAZIZ HADI SALEH