Johari Abdullah
Johari Abdullah
Associate Professor, Faculty of Computer Science & IT, Universiti Malaysia Sarawak (UNIMAS)
Verified email at - Homepage
Cited by
Cited by
Network intrusion detection system: A systematic study of machine learning and deep learning approaches
Z Ahmad, A Shahid Khan, C Wai Shiang, J Abdullah, F Ahmad
Transactions on Emerging Telecommunications Technologies 32 (1), e4150, 2021
Secure trust-based blockchain architecture to prevent attacks in VANET
AS Khan, K Balan, Y Javed, S Tarmizi, J Abdullah
Sensors 19 (22), 4954, 2019
Defending malicious script attacks using machine learning classifiers
N Khan, J Abdullah, AS Khan
Wireless Communications and Mobile Computing 2017, 2017
MyMobiHalal 2.0: Malaysian mobile halal product verification using camera phone barcode scanning and MMS
SN Junaini, J Abdullah
2008 International Conference on Computer and Communication Engineering, 528-532, 2008
A spectrogram image-based network anomaly detection system using deep convolutional neural network
AS Khan, Z Ahmad, J Abdullah, F Ahmad
IEEE Access 9, 87079-87093, 2021
Towards vulnerability prevention model for web browser using interceptor approach
N Khan, J Abdullah, AS Khan
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
A framework for traceable and transparent supply chain management for agri-food sector in malaysia using blockchain technology
KY Chan, J Abdullah, AS Khan
International Journal of Advanced Computer Science and Applications 10 (11), 2019
Effective way to defend the hypervisor attacks in cloud computing
MS Dildar, N Khan, JB Abdullah, AS Khan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 154-159, 2017
A graph-theoretic approach for the detection of phishing webpages
CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian
Computers & Security 95, 101793, 2020
Security issues in 5G device to device communication
AS Khan, Y Javed, J Abdullah, JM Nazim, N Khan
IJCSNS 17 (5), 366, 2017
Building standard offline anti-phishing dataset for benchmarking
KL Chiew, EH Chang, CL Tan, J Abdullah, KSC Yong
International Journal of Engineering & Technology 7 (4.31), 7-14, 2018
An IT governance framework for achieving the development of academic programme in higher institutions: A case of Universiti Malaysia Sarawak (UNIMAS)
N Musa, DHA Ibrahim, NA Bolhassan, J Abdullah, N Kulathuramaiyer, ...
The 5th International Conference on Information and Communication Technology …, 2014
Quantum-elliptic curve cryptography for multihop communication in 5G networks
S Khan, J Abdullah, N Khan, AA Julahi, S Tarmizi
International Journal of Computer Science and Network Security (IJCSNS) 17 …, 2017
EEoP: A lightweight security scheme over PKI in D2D cellular networks
Y Javed, AS Khan, A Qahar, J Abdullah
J. Telecommun. Electron. Comput. Eng 9 (3-11), 99-105, 2017
A methodology for implementation of service learning in higher education institution: A case study from faculty of computer science and information technology, UNIMAS
N Musa, DHA Ibrahim, J Abdullah, S Saee, F Ramli, AR Mat, MJA Khiri
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS)
AS Khan, Y Javed, J Abdullah, K Zen
Journal of Ambient Intelligence and Humanized Computing, 1-18, 2021
Preventing DoS attacks in IoT using AES
Y Javed, AS Khan, A Qahar, J Abdullah
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
Malicious code intrusion detection using machine learning and indicators of compromise
CI Rene, J Abdullah
International Journal of Computer Science and Information Security (IJCSIS …, 2017
RETRACTED ARTICLE: Analysis of the social capital indicators by using DEMATEL approach: the case of Islamic Azad University
D Kiakojuri, S Shamshirband, NB Anuar, J Abdullah
Quality & Quantity 49, 1985-1995, 2015
Secure authentication and key management protocols for mobile multihop WiMAX networks
AS Khan, J Abdullah, N Fisal
Jurnal Teknologi 73 (1), 2015
The system can't perform the operation now. Try again later.
Articles 1–20