Shukor Abd Razak
YOU?
Author Swipe
View article: Feature Substitution Using Latent Dirichlet Allocation for Text Classification
Feature Substitution Using Latent Dirichlet Allocation for Text Classification Open
View article: The Effect of Preexisting Fracture Angles on Crack Propagation in Sandstone
The Effect of Preexisting Fracture Angles on Crack Propagation in Sandstone Open
The fracture propagation on the rock causes failure and impacts the sustainability time of the structure. As part of the present work, sandstone with the variation of preexisting crack angle was simulated using the extended finite element …
View article: Recent Advances in Sharding Techniques for Scalable Blockchain Networks: A Review
Recent Advances in Sharding Techniques for Scalable Blockchain Networks: A Review Open
Blockchain is a technology that has gained popularity in recent years due to its immutability and decentralized features. Various industries have started integrating this technology into their business models, resulting in the development …
View article: A Comprehensive Review of Recent Types of Flooding Attack and Defense Methods in IoT-Based Smart Environments
A Comprehensive Review of Recent Types of Flooding Attack and Defense Methods in IoT-Based Smart Environments Open
View article: Quantifying the Return of Security Investments for Technology Startups
Quantifying the Return of Security Investments for Technology Startups Open
تعتبر الشركات الناشئة في مجال التكنولوجيا بالغة الأهمية في النهوض بالمبادرات الرقمية في العديد من البلدان التي تخضع لأجندة الدولة الذكية. وبالتالي ، فإن الشركات الناشئة في مجال التكنولوجيا هي بائعون وموردون للخدمات للمنظمات الكبيرة مثل الق…
View article: INTRUSION DETECTION AND PREVENTION SYSTEM IN SME'S LOCAL NETWORK BY USING SURICATA
INTRUSION DETECTION AND PREVENTION SYSTEM IN SME'S LOCAL NETWORK BY USING SURICATA Open
In the present era, Cybercriminals are increasingly focusing their attention on the local networks of SMEs. Due to the lack of resources and skilled workers in the cybersecurity field., SMEs struggle to prevent and detect fraudulent activi…
View article: Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network Open
IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLA…
View article: Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review Open
Cybersecurity has gained increasing importance among firms of different sizes and industries due to the significant rise of cyber-attacks over time. Technology startups are particularly vulnerable to cyber-attacks due to the lack of cyber …
View article: Financial Fraud Detection Based on Machine Learning: A Systematic Literature Review
Financial Fraud Detection Based on Machine Learning: A Systematic Literature Review Open
Financial fraud, considered as deceptive tactics for gaining financial benefits, has recently become a widespread menace in companies and organizations. Conventional techniques such as manual verifications and inspections are imprecise, co…
View article: Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis
Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis Open
The popularity of unique image compression features of image files opens an interesting research analysis process, given that several digital forensics cases are related to diverse file types. Of interest has been fragmented file carving a…
View article: A Unified Forensic Model Applicable to the Database Forensics Field
A Unified Forensic Model Applicable to the Database Forensics Field Open
The Database Forensics Investigation (DBFI) field is focused on capturing and investigating database incidents. DBFI is a subdomain of the digital forensics domain, which deals with database files and dictionaries to identify, acquire, pre…
View article: Towards Development of a High Abstract Model for Drone Forensic Domain
Towards Development of a High Abstract Model for Drone Forensic Domain Open
Drone Forensics (DRF) is one of the subdomains of digital forensics, which aims to capture and analyse the drone’s incidents. It is a diverse, unclear, and complex domain due to various drone field standards, operating systems, and infrast…
View article: Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks
Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks Open
Routing Protocol for Low-power and Lossy Networks (RPL), the de facto standard routing protocol for the Internet of Things (IoT) administers the smooth transportation of data packets across the Wireless Sensor Network (WSN). However, the m…
View article: Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks
Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks Open
Routing Protocol for Low-power and Lossy Networks (RPL), the de facto standard routing protocol for the Internet of Things (IoT) administers the smooth transportation of data packets across the Wireless Sensor Network (WSN). However, the m…
View article: A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm (AI) for Optimal Task Scheduling
A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm (AI) for Optimal Task Scheduling Open
The search algorithm based on symbiotic organisms’ interactions is a relatively recent bio-inspired algorithm of the swarm intelligence field for solving numerical optimization problems. It is meant to optimize applications based on the si…
View article: COCP: Coupling Parameters Content Placement Strategy for In-Network Caching-Based Content-Centric Networking
COCP: Coupling Parameters Content Placement Strategy for In-Network Caching-Based Content-Centric Networking Open
On-path caching is the prominent module in Content-Centric Networking (CCN), equipped with the capability to handle the demands of future networks such as the Internet of Things (IoT) and vehicular networks. The main focus of the CCN cachi…
View article: Involvement of Surveillance Drones in Smart Cities: A Systematic Review
Involvement of Surveillance Drones in Smart Cities: A Systematic Review Open
Drones, or unmanned aerial vehicles (UAVs), are among the most beneficial and emerging technologies, with a wide range of applications that can support the sustainability concerns of smart cities and ultimately improve citizens’ quality of…
View article: IMU: A Content Replacement Policy for CCN, Based on Immature Content Selection
IMU: A Content Replacement Policy for CCN, Based on Immature Content Selection Open
In-network caching is the essential part of Content-Centric Networking (CCN). The main aim of a CCN caching module is data distribution within the network. Each CCN node can cache content according to its placement policy. Therefore, it is…
View article: A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog
A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog Open
Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack …
View article: A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm for Ecosystem Sustainability
A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm for Ecosystem Sustainability Open
The search algorithm based on symbiotic organisms’ interactions is a relatively recent bio-inspired algorithm of the swarm intelligence field for solving numerical optimization problems. It is meant to optimize applications based on …
View article: Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review
Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review Open
The Internet of Things (IoT) concept has emerged to improve people’s lives by providing a wide range of smart and connected devices and applications in several domains, such as green IoT-based agriculture, smart farming, smart homes, smart…
View article: Research Challenges and Opportunities in Drone Forensics Models
Research Challenges and Opportunities in Drone Forensics Models Open
The emergence of unmanned aerial vehicles (also referred to as drones) has transformed the digital landscape of surveillance and supply chain logistics, especially in terrains where such was previously deemed unattainable. Moreover, the ad…
View article: An Adaptive Protection of Flooding Attacks Model for Complex Network Environments
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments Open
Currently, online organizational resources and assets are potential targets of several types of attack, the most common being flooding attacks. We consider the Distributed Denial of Service (DDoS) as the most dangerous type of flooding att…
View article: Face Validation of Database Forensic Investigation Metamodel
Face Validation of Database Forensic Investigation Metamodel Open
Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic…
View article: Current Perspective of Symbiotic Organisms Search Technique in Cloud Computing Environment: A Review
Current Perspective of Symbiotic Organisms Search Technique in Cloud Computing Environment: A Review Open
Nature-inspired algorithms in computer science and engineering are algorithms that take their inspiration from living things and imitate their actions in order to construct functional models. The SOS algorithm (symbiotic organisms search) …
View article: Fairness‐Oriented Semichaotic Genetic Algorithm‐Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks
Fairness‐Oriented Semichaotic Genetic Algorithm‐Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks Open
Wireless mesh networks (WMNs) have emerged as a scalable, reliable, and agile wireless network that supports many types of innovative technologies such as the Internet of Things (IoT), Wireless Sensor Networks (WSN), and Internet of Vehicl…
View article: Digital Forensics Subdomains: The State of the Art and Future Directions
Digital Forensics Subdomains: The State of the Art and Future Directions Open
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident. Mainly, traditional digital forensics te…
View article: Optimized backoff scheme for prioritized data in wireless sensor networks: A class of service approach
Optimized backoff scheme for prioritized data in wireless sensor networks: A class of service approach Open
Data prioritization of heterogeneous data in wireless sensor networks gives meaning to mission-critical data that are time-sensitive as this may be a matter of life and death. However, the standard IEEE 802.15.4 does not consider the prior…
View article: Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network
Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network Open
Multi-Radio Multi-Channel Wireless Mesh Networks (WMNs) have emerged as a scalable, reliable, and agile wireless network that supports many types of innovative technologies such as the Internet of Things (IoT) and vehicular networks. Due t…
View article: A heuristics for HTTP traffic identification in measuring user dissimilarity
A heuristics for HTTP traffic identification in measuring user dissimilarity Open
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, to layers such as layer 5 of the OSI model stack. This coupled with the integration-diversity of other layers and application layer protoco…