|
SHAHRULNIZA BIN MUSA, PROFESSOR DR. PROFESSORCOMPUTER ENGINEERING TECHNOLOGY SECTION MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY 60 publications, 65 citations |
Division | Category | Group | Area |
---|---|---|---|
ICT | INFORMATION, COMPUTER AND COMMUNICATIONS TECHNOLOGY (ICT) | Security System | Intrusion Detection System |
Security Protocols | |||
Data Management | Data Security |
Title | Cited By | Year | |
---|---|---|---|
![]() |
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Shahrulniza Shahzad, Ismail Nazri, AAmir Shahzad, Shahrulniza Musa, Muhammad Irfan |
8 | Oct 2013 |
![]() |
A Complete Behavioral Measurement and Reporting: Optimized for Mobile Devices
Toqeer Ali Syed, Megat Farez Zuhairi, Jawad Ali, Shahrulniza Musa, Mohammad Nauman |
Jan 2017 | |
![]() |
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach
Abdulaziz Aborujilah, Shahrulniza Musa |
Jan 2017 | |
![]() |
Critical review of intrusion detection systems in cloud computing environment
Abdulaziz Aborujilah, Shahrulniza Musa |
Jan 2016 | |
![]() |
Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa |
Jan 2011 | |
![]() |
Muhammad Alam, M. S. Mazliham, Shahrulniza Musa, M. Amir |
7 | Jan 2009 |
![]() |
Location Prediction by using Bayesian Decision Theory
Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa |
Dec 2011 | |
![]() |
Modelling Error between Clutter Based Enhance Error Rate Table and Error Rate Table
Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa |
Dec 2011 | |
![]() |
The First Approach towards the Location Estimation of Cellular Nodes by using Movable GSM Antennas
Muhammad Alam, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa, Jawahir Mustapha |
Dec 2009 | |
![]() |
Design and implementation of an attestation protocol for measured dynamic behavior
Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan |
Apr 2017 | |
|
Blockchain-based smart-IoT trust zone measurement architecture
Ali, J., Ali, T., Alsaawy, Y., Khalid, A.S., Musa, S. |
2019 | |
|
SPL Features Quantification and Selection Based on Multiple Multi-Level Objectives
Fazal Qudus Khan, Shahrulniza Musa, Georgios Tsaramirsis, Seyed M. Buhari |
2019 | |
|
A novel requirements analysis approach in SPL based on collateral, KAOS and feature model
Khan, F.Q., Musa, S., Tsaramirsis, G., Khan, S. |
2018 | |
|
A survey of soft computing applications in global software development
Iftikhar, A., Musa, S., Alam, M., Su'Ud, M.M., Ali, S.M. |
2018 | |
|
Challenges: Bridge between cloud and IoT
Belgaum, M.R., Soomro, S., Alansari, Z., Musa, S., Alam, M., Su'Ud, M.M. |
4 | 2018 |
|
Checkpoints and requirements based cloud service ranking
Belgaum, M.R., Musa, S., Alam, M., Mohd Su¿ud, M., Soomro, S., Alansari, Z. |
2018 | |
|
Deep convolutional generative adversarial networks for in-tent-based dynamic behavior capture
Jan, S., Musa, S., Ali, T., Alzahrani, A. |
1 | 2018 |
|
Effect of lean systematic method on specimen handling activities for patients in medical wards
Abu Bakar, N.W., Mohamad, A.H., Jatavakabhulla, P.K., Musa, S., Rahman, M.A., Soon, L.F., Geek, T.S., Rahim, A.A. |
1 | 2018 |
|
IT students' sentiment of faculty evaluations and posting opinions on social media networks
Aborujilah, A., Nassr, R.M., Musa, S.B., Abdullah, M. |
2018 | |
|
Load balancing with preemptive and non-preemptive task scheduling in cloud computing
Belgaum, M.R., Soomro, S., Alansari, Z., Alam, M., Musa, S., Su'Ud, M.M. |
2 | 2018 |
|
Malware analysis and detection approaches: Drive to deep learning
Ali, T., Jan, S., Musa, S.N., Rahman, A. |
2018 | |
|
Pilgrims' acceptance of using augmented reality applications while performing the Hajj
Nassr, R., Saleh, A.H., Almalki, H.M., Almalki, S., Musa, S. |
2018 | |
|
Towards secure IoT communication with smart contracts in a Blockchain infrastructure
Ali, J., Ali, T., Musa, S., Zahrani, A. |
2 | 2018 |
|
Iftikhar, A., Alam, M., Musa, S., Su'Ud, M.M. |
1 | 2018 |
|
Foreword by the main organising committee, universiti Kuala Lumpur (unikl), Malaysia
Othman, J., Musa, S. |
2017 | |
|
Musa, S. |
2017 | |
![]() |
Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario
Toqeer Ali Syed, Jawad Ali, Tamleek Ali, Shahrulniza Musa |
2016 | |
![]() |
Providing Efficient, Scalable and Privacy Preserved Verification Mechanism in Remote Attestation
Toqeer Ali Syed, Salman Jan, Shahrulniza Musa, Jawad Ali |
3 | 2016 |
|
TSSDroid: Realization of an efficient and usable TSS API for the Android software stack
Khan, S., Nauman, M., Othman, A.T., Musa, S., Syed, T.A. |
1 | 2016 |
|
Realization of a user-centric, privacy preserving permission framework for Android
Nauman, M., Khan, S., Othman, A.T., Musa, S. |
7 | 2015 |
|
Towards Secure Instance Migration in the Cloud
Syed, T.A., Musa, S., Rahman, A., Jan, S. |
5 | 2015 |
![]() |
A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan |
8 | 2014 |
|
A performance approach: SCADA system implementation within cloud computing environment
Shahzad, A.A., Musa, S., Aborujilah, A., Irfan, M. |
6 | 2014 |
![]() |
A review: Industrial Control System (ICS) and their secuity issues
A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan |
2014 | |
![]() |
Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement
A. Shahzad, Shahrulniza Musa, M. Irfan, S. Asadullah |
12 | 2014 |
|
Design and implementation of an efficient framework for behaviour attestation using N-call slides
Ismail, R., Syed, T.A., Musa, S. |
9 | 2014 |
|
Detecting TCP SYN based flooding attacks by analyzing CPU and network resources performance
Aborujilah, A., Ismail, M.N., Musa, S. |
2 | 2014 |
|
Shahzad, A., Musa, S., Irfan, M., Aborujilah, A. |
6 | 2014 |
![]() |
Key Encryption Method for SCADA Security Enhancement
A. Shahzad, Shahrulniza Musa, M. Irfan, S. Asadullah |
5 | 2014 |
![]() |
N-Secure Cryptography Solution for SCADA Security Enhancement
A. Shahzad, Shahrulniza Musa, M. Irfan |
10 | 2014 |
|
Secure cryptography testbed implementation for SCADA protocols security
Shahzad, A.A., Musa, S., Aborujilah, A., Irfan, M. |
8 | 2014 |
![]() |
Security Solution for SCADA Protocols Communication during Multicasting and Polling Scenario
A. Shahzad, Shahrulniza Musa, M. Irfan |
1 | 2014 |
|
The SCADA review: System components, architecture, protocols and future security trends
Shahzad, A., Musa, S., Aborujilah, A., Irfan, M. |
2 | 2014 |
![]() |
The security survey and anaylsis on supervisory control and data acquisition communication
A. Shahzad, Shahrulniza Musa, A. Aborujilah, M. Irfan |
2 | 2014 |
|
Transforming high-level requirements to executable policies for Android
Othman, A.T., Nauman, M., Musa, S., Khan, S. |
2014 | |
|
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach
Ismail, M.N., Aborujilah, A., Musa, S., Shahzad, A. |
12 | 2013 |
![]() |
Flooding Based DoS Attack Feature Selection Using Remove Correlated Attributes Algorithm
Abdulaziz Hadi saleh Aborujilah, Shahrulniza Musa, AAmir Shahzad, Mohd Nazri Bin Mohd Warip |
2013 | |
|
Musa, S., Shahzad, A., Aborujilah, A. |
18 | 2013 |
|
Simulation base implementation for placement of security services in real time environment
Musa, S., Shahzad, A., Aborujilah, A. |
8 | 2013 |
|
How secure is your smartphone: An analysis of smartphone security mechanisms
Khan, S., Nauman, M., Othman, A.T., Musa, S. |
17 | 2012 |
|
POAuth: Privacy-aware open authorization for native apps on smartphone platforms
Nauman, M., Khan, S., Othman, A.T., Musa, S.U., Rehman, N.U. |
3 | 2012 |
|
Securing SCADA communication using hybrid cryptography
Shahzad, A., Musa, S. |
1 | 2012 |
|
Terrain/clutter based location prediction by using multi-condition Bayesian decision theory
A. Muhammad, M. S. Mazliham, Patrice Boursier, M. Shahrulniza, Jawahir Che Mustapha Yusuf |
2012 | |
|
Location Estimation and Filtering of Wireless Nodes in an Open Environment
Shahrulniza Musa |
2011 | |
|
Modeling interpolated distance error for clutter based location estimation of wireless nodes
Alam, M., Mohd Su'Ud, M., Boursier, P., Musa, S. |
1 | 2011 |
|
Alam, M., Suud, M.M., Boursier, P., Musa, S., Yusuf, J.C.M. |
6 | 2010 |
|
Using time series 3D AlertGraph and false alert classification to analyse Snort alerts
Musa, S., Parish, D.J. |
7 | 2008 |
|
Visualising communication network security attacks
Musa, S., Parish, D.J. |
13 | 2007 |
|
Shahrulniza Musa |
||
|
Shahrulniza Musa |