top of page

Publications

Journal

ISI/Scopus Indexed

  • Article Title , Journal Title, Year

    • IF, Vol/Issue, Page, Type, Quartile, Category Author

​

  • Friend-assisted Intrusion Detection and Response Mechanisms for Mobile Ad Hoc Networks, Ad Hoc Network Journal, 2008

    • 3.178, Vol: 6 Isssue: -, 1151- 1167, ISI, 1, Corresponding Author

​

  • Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network, Sensors, 2011

    • ​2.964, Vol: 11 Issue: 3, 3163 – 3176, ISI, 1, UTM First Author

​

  • Towards providing a new lightweight authentication and encryption scheme for MANET, Wireless Networks, 2011

    • ​2.023, Vol: 17 Issue: 4, 833-842, ISI, 2, UTM First Author

​

  • EF-MPR, a New Energy Efficeient Multi-Point Relay Selection Algorithm for MANET, Journal of Supercomputing,  2012

    • ​1.349, Vol: 59 Issue: 2, 744 – 761, ISI, 2, Co Author

​

  • Overview of Data Routing Approaches for Wireless Sensor Networks, Sensors, 2012

    • ​2.964, Vol: 12 Issue: 4, 3964 – 3996, ISI, 1, Co Author

​

  • Efficient Data Gathering in Mobile Wireless Sensor Networks, Life Science Journal-Acta Zhengzhou University Overseas Edition, 2012

    • ​0.165, Vol: 9 Issue: 4, 2152 – 2157, ISI, 4, Co Author

​

  • Fundamental Lifetime Mechanisms in Routing Protocols for Wireless Sensor Networks: A Survey and Open Issues, Sensors, 2012

    • ​2.964, Vol: 12 Issue: 10, 13508 - 13544, ISI, 1, UTM First Author

​

  • A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks, Arabian Journal for Science and Engineering, 2012

    • 0.932, Vol: 37 Issue: 8, 2179 – 2192, ISI, 3, UTM First Author

​

  • EEDARS: An Energy-Efficient Dual-Sink Algorithm with Role Switching Mechanism for Event-Driven Wireless Sensor Networks, KSII Transactions On Internet And Information Systems, 2012

    • ​0.467, Vol: 6 Issue: -, 2473 – 2492, ISI, 4, UTM First Author

​

  • A Location Based Prediction Service Protocol For Vanet City Environment, International Journal Of Innovative Computing Information And Control, 2012

    • 1.667, Vol: 8 Issue: 10(1), 6811 – 6836, ISI, 1, Co Author

​

  • Classification of Energy- Efficient Routing Protocols for Wireless Sensor Networks, Ad Hoc Sensor and Wireless Networks, 2013

    • ​0.788, Vol: 17 Issue: 1- 2, 103 – 129, ISI, 4, UTM First Author

​

  • Trust-based Routing Mechanism in MANET: Design and Implementation, Journal Mobile Networks and Applications, 2013

    • ​2.788, Vol: 18 Issue: 5, 666 - 677, ISI, 1, UTM First Author

​

  • Energy- efficient and Reliable data Delivery in Wireless Sensor Networks, Wireless Networks, 2013

    • 1.555, Vol: 19 Issue: 4, 495 - 505, ISI, 3, Co Author

​

  • Quorum-Based Location Service Protocol Service Protocol for Vehicular Ad Hoc Networks in Urban Environment, International Journal of Ad Hoc and Ubiquitous Computing, 2013

    • ​0.656, Vol: 14 Issue: 1,  27 - 43, ISI, 4, Co Author

​

  • EDR: Efficient Data Routing in Wireless Sensor Networks, International Journal of Ad Hoc and Ubiquitous Computing, 2013

    • ​0.656, Vol: 12 Issue: 1,  46 -55, ISI, 4, Co Author

​

  • Analysing wireless sensor network deployment performance using connectivity, ScienceAsia, 2013

    • 0.447, Vol: 39 Issue: S, 80 -84, ISI, 4, UTM First Author

​

  • Location Service Protocol for Highly Mobile Ad Hoc Network, Arabian Journal of Science and Engineering, 2014

    • ​0.832, Vol: 39 Issue: 2, 861 - 873, ISI/ Scopus, 3, Co Author

​

  • Local coverage measurement algorithm in GPSfree wireless sensor networks, Ad Hoc Networks, 2014

    • 3.178, Vol: 23 Issue: -, 1-17, ISI/ Scopus, 1, UTM First Author

​

  • IM2PR: interferenceminimized multipath routing protocol for wireless sensor networks, Wireless Networks, 2014

    • ​1.555, Vol: 20 Issue: 7, 1807 – 1823, ISI/ Scopus, 3, Co Author

​

  • DICSA: Distributed and Concurrent Link Scheduling Algorithm for Data Gathering in Wireless Sensor Networks, Ad Hoc Networks, 2014

    • 3.178, Vol: 25 Issue: A, 54 – 71, ISI/ Scopus, 1, UTM First Author

​

  • CAMA: Efficient Modeling of the Capture Effect for Low-Power Wireless Networks, ACM Transactions on Sensor Networks (TOSN), 2014

    • 2.662, Vol: 11 Issue: 1, 1 – 43, ISI/ Scopus, 2, UTM First Author

​

  • Integration and Analysis of Neighbor Discovery and Link Quality Estimation in Wireless Sensor Networks, The Scientific World Journal, Hindawi, 2014

    • 1.3, Vol: 2014 Issue: -, ID: 789642, ISI/ Scopus, 2, Co Author

​

  • Network Initialization in Low-Power Wireless Networks: A Comprehensive Study, The Computer Journal, 2014

    • 0.93, Vol: 57 Issue: 8, 1238 - 1261, ISI/ Scopus, 4, Co Author

​

  • Improving Broadcast Reliability for Neighbor Discovery, Link Estimation and Collection Tree Construction in Wireless Sensor Networks, Computer Networks, 2014

    • 2.594, Vol: 62 Issue: -, 101- 121, ISI/ Scopus, 1, UTM First Author

​

  • LINKORD: Link Ordering Based Collection Tree Protocol for Wireless Sensor Networks, Computing, 2015

    • 1.476, Vol: 97 Issue: 3, 205- 236, ISI/ Scopus, 2, Co Author

​

  • Modeling Low- Power Wireless Communications, Journal of Network and Computer Applications, 2015

    • 3.492, Vol: 51 Issue: -, ID: 102126, ISI/ Scopus, 1, UTM First Author

​

  • A Lightweight One-Pass Authentication Mechanism For Agent Communication In Multi-Agent System Based Applications, Jurnal Teknologi, 2015

    • -, Vol: 77 Issue: 18, 1-9, ISI/ Scopus, -, UTM First Author​

​

  • A Threshold- Based Controller For Multi-Agent Systems, Jurnal Teknologi, 2015

    • -, Vol: 77 Issue: 18, 37-42, ISI/ Scopus, -, UTM First Author

​

  • Interconfidentiality Protection Of Agent Communication In Multi-Agent System Based Applications, Jurnal Teknologi, 2015

    • -, Vol: 77 Issue: 13, 1-10, ISI/ Scopus, -, UTM First Author

​

  • A Performance Improved Certificateless Key Agreement Scheme Over Elliptic Curve Based Algebraic Groups, Jurnal Teknologi, 2015

    • -, Vol: 77 Issue: 20, 47-52, ISI/ Scopus, -, Co Author

​

  • Observing Consistency in Online Communication Patterns for User Re-Identification, PLoS ONE, 2016

    • 3.394, Vol: 11 Issue: 12, e01669 30, ISI/ Scopus, 1, UTM First Author

​

  • A Generic Database Forensic Investigation Process Model, Jurnal Teknologi, 2016

    • -, Vol: 78 Issue: 6- 11, 45-57, ISI/ Scopus, -, UTM First Author

​

  • CDBFIP: Common Database Forensic Investigation Process for Internet of Things, IEEE Access, 2017

    • 3.244, Vol: 5 Issue: -, 24401- 24416, ISI/ Scopus, 1, UTM First Author

​

  • A Metamodel for Mobile Forensics Investigation, Domain PLoS ONE, 2017

    • 2.806, Vol: 12 Issue: 4, e01752 23, ISI/ Scopus, 1, UTM First Author

​

  • Development and Validation of a Database Forensic Metamodel (DBFM), PLoS ONE, 2017

    • 2.806, Vol: 12 Issue: 2, e01707 93, ISI/ Scopus, 1, UTM First Author

​

  • Two-stage motion artefact reduction algorithm for electrocardiogram using weighted adaptive noise cancelling and recursive Hampel filter, PLoS ONE, 2018

    • 2.74, Vol: 13 Issue: 11, e02071 76, ISI/ Scopus, 1, Co Author

​

  • Polychronicity tendency-based online behavioral signature, International Journal Of Machine Learning And Cybernetics, 2019

    • 3.844, Vol: 10 Issue: 8, 2103- 2118, ISI/ Scopus, 1, UTM First Author

​

  • Database Forensic Investigation Process Models: A Review, IEEE Access, 2020

    • 3.745, Vol: 8 Issue: -, 48477- 48490, ISI/ Scopus, 1, UTM First Author

​

  • Data Anonymization Using Pseudonym System to Preserve Data Privacy, IEEE Access, 2020

    • 3.745, Vol: 8 Issue: -, 43256- 43264, ISI/ Scopus, 1, Corresponding Author

​

  • Review of Mobile Forensic Investigation Process Models, IEEE Access, 2020

    • 3.745, Vol: 8 Issue: -, 173359 - 173375, ISI/ Scopus, 1, UTM First Author

​

  • Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field, IEEE Access, 2020

    • 3.745, Vol: 8 Issue: -, 145018 - 145032, ISI/ Scopus, 1, UTM First Author

​

  • Categorization and Organization of Database Forensic Investigation Processes, IEEE Access, 2020

    • 3.745, Vol: 8 Issue: -, 112846 - 112858, ISI/ Scopus, 1, UTM First Author

​

  • Optimized backoff scheme for prioritized data in wireless sensor networks: A class of service approach ,PLoS ONE, 2020

    • 2.74, Vol: 15 Issue: 8, e02371 54, ISI/ Scopus, 2, UTM First Author

​

  • Biometrics authentication techniques: A comparative study, International Journal of Advanced and Applied Sciences, 2020

    • -, Vol: 7 Issue: 9, 97-103, ISI, -, UTM First Author

​

  • Interference- Aware Multipath Routing Protocol for QoS Improvement in Event-Driven Wireless Sensor Networks, Tsinghua Science & Technology, 2011

    • -, Vol: 16 Issue: 5, 475- 490, Scopus, -, Co Author

​

  • A Location Based Prediction Service Protocol for VANET City Environment, International Journal of Innovative Computing, Information and Control (IJICIC), 2012

    • -, Vol: 8 Issue: 10A, 6811- 6836, Scopus, -, Co Author

​

  • A Review on the Implementation of Multiobjective Algorithms in Wireless Sensor Network, World Applied Science Journal, 2012

    • -, Vol: 19 Issue: 6, 772- 779, Scopus, -, UTM First Author

​

  • Location Service Management Protocol for Vehicular Ad Hoc Network Urban Environment, Advances in Computer Science and Information Technology. Computer Science and Engineering, 2012

    • -, Vol: 85 Issue: -, 563- 574, Scopus, -, Co Author

​

  • Robust and Energy-efficient Data Gathering in Mobile Wireless Sensor Networks, Przeglad Elektrotechniczny, 2013

    • -, Vol: 89 Issue: 1, 191- 196, Scopus, -, Co Author

​

  • Agent-based approach for modeling evacuee uncertainty behavior using game theory model, Lifescience Journal, 2013

    • -, Vol: 10 Issue: 3, 1350- 1355, Scopus, -, UTM First Author

​

  • A Review of Current Research in Network Forensic Analysis, International Journal of Digital Crime and Forensic, 2013

    • -, Vol: 5 Issue: 1, 1-26, Scopus, -, UTM First Author

​

  • A Conceptual Model for Holistic Classification of Insider, Asian Journal of Applied Sciences, 2014

    • -, Vol: 7 Issue: 5, 343- 359, Scopus, -, UTM First Author

​

  • Broadcasting in Connected and Fragmented Vehicular Ad Hoc Networks, International Journal of Vehicular Technology, 2014

    • -, Vol: 2014 Issue: 1, 1-15, Scopus, -, Co Author

​

  • Research on security protocol for collaborating mobile agents in network intrusion detection systems, American Journal of Applied Sciences, 2014

    • -, Vol: 10 Issue: 12, 1638- 1647, Scopus, -, UTM First Author

​

  • Attacks and Security Solutions for Agent Communication in Multi-Agent Systems,  International Journal of Soft Computing, 2015

    • -, Vol: 10 Issue: 2, 99-109, Scopus, -, UTM First Author

​

  • Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure, Journal of Theoretical and Applied Information Technology, 2015

    • -, Vol: 71 Issue: 3, 417- 423, Scopus, -, UTM First Author

​

  • Two Secure Non- Symmetric Role Key-Agreement Protocols, ARPN Journal of Engineering and Applied Sciences, 2016

    • -, Vol: 11 Issue: 5, 1-15, Scopus, -, Co Author

​

  • Understanding online behavior: Exploring the probability of online personality trait using supervised machine-learning approach, Frontiers in ICT, 2016

    • -, Vol: 3 Issue: May, 1-8, Scopus, -, UTM First Author

​

  • Leveraging Human Thinking Style for User Attribution in Digital Forensic Process, International Journal on Advanced Science, Engineering and Information Technology, 2017

    • -, Vol: 7 Issue: 1, 198- 206, Scopus, -, UTM First Author

​

  • To Share or not share: Tabayyun made possible with MyVeri5, Advanced Science Letters, 2017

    • -, Vol: 23 Issue: 5, 4542- 4545, Scopus, -, Co Author

​

  • A Secure Idendity-Based Key Agreement Protocol Without Key-Escrow, Journal of Engineering and Applied Sciences, 2017

    • -, Vol: 12 Issue: 9, 4809- 4813, Scopus, -, Co Author

​

  • Online Crowdfunding as Academic Grants: A Systematic Literature Review, Journal of Telecommunicati on, Electronic and Computer Engineering, 2017

    • -, Vol: 9 Issue: 3- 4 SI), 187- 193, Scopus, -, Co Author

​

  • Computer forensic problem of sample size in file type analysis, International Journal of Advanced Intelligence Paradigms, 2018

    • -, Vol: 11 Issue: 1- 2, 58-74, Scopus, -, UTM First Author

​

  • Routing protocol for low-power and lossy network performance comparison for objective functions, International Journal of Advanced Trends in Computer Science and Engineering, 2019

    • -, Vol: 8 Issue: 1.6 SI, 109- 115, Scopus, -, UTM First Author

Journal

Non Indexed

  • Salim M Zaki, Mohd Asri Ngadi, Shukor Abd Razak (2009), "A Review of Delay Aware Routing Protocols in MANET", ISSR Journals, CS Letters, Vol. 1(1), pp. 1- 12

​

  • Salim M Zaki, Mohd Asri Ngadi, Shukor Abd Razak (2009), "A Review of Delay Aware Routing Protocols in MANET", ISSR Journals, CS Letters, Vol. 1(1), pp. 1- 12

​

  • Salim M Zaki, Mohd Asri Ngadi, Shukor Abd Razak (2009), "A Review of Delay Aware Routing Protocols in MANET", ISSR Journals, CS Letters, Vol. 1(1), pp. 1- 12

​

  • Mahdi Maliki, Shukor Abd Razak (2011), "Application Porting Issues for C++ Applications", Journal of Theoretical and Applied Information Technology, Vol. 23(1), pp.51-59

​

  • Ramin Karimi, Norafida Ithnin ,Shukor Abd Razak,Sara Najafzadeh (2011), “Non DTN Geographic Routing Protocols for Vehicular Ad Hoc Networks”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5

​

  • Mohammad Hossein Anisi, Abdul Hanan Abdullah, Shukor Abd Razak (2011), "Energy- Efficient Data Collection in Wireless Sensor Networks", Wireless Sensor Networks, Vol. 3, No. 10, pp.338-342

​

  • M. R. Eslaminejad, M. Sookhak, S. A. Razak and M. Haghparast (2011), "A Review of Routing Mechanisms in Wireless Sensor Networks", International Journal of Computer Science and Telecommunications Vol. 2, Issue 7, pp. 1-9

​

  • Ramin Karimi, Norafida Ithnin ,Shukor Abd Razak,Sara Najafzadeh (2011), “DTN Routing Protocols for VANETs:Issues and Approaches”, IJCSI International Journal of Computer Science Issues, Volume 8, Issue 6, pp.89-93

​

  • Salim M. Zaki and Shukor Abd Razak (2011), Mitigating Packet Loss in Mobile IPv6 Using Two-Tier Buffer Scheme. CSL, ISSRES, Vol. 3(2), pp. 1—10

​

  • Hassan Chizari, Majid Hosseini, Shukor Abd Razak, Abdul Hanan Abdullah (2011), "Triangle Area Segmentation for Coverage Measurement in Wireless Sensor Networks", IJCCN International Journal of Computer Communications and Networks, Vol. 1(1), pp. 1-5

​

  • Abdul Sattar Raja, Shukor Abd Razak, Ashiquee Rasool Mohammad, Khalid Mohiuddin (2012), "High Performance Technical Computing through Cloud Infrastructure Services", IJITCS, pp.29-38

​

  • Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan (2012),"Identifying Critical Features For Network Forensics Investigation Perspectives", International journal of Computer science and information security, Vol 10(9) pp.106-128

​

  • Sara Najafzadeh, Norafida Ithnin ,Shukor Abd Razak, Ramin Karimi (2013), “Dynamic Broadcasting in Vehicular Ad hoc Networks”, International Journal of Computer Theory and Engineering, Vol 5(4), Issue 6, pp.629-632

​

  • Nor Amira Nor Azhan, Shukor Abd Razak, Ikuesan R. Adeyemi (2013), "Analysis of DQT and DHT in JPEG Files ", International Journal of Information Technology & Computer Science ( IJITCS ), Vol. 10(2), pp.1-11

​

  • Salim M. Zaki, M. A. Ngadi, Shukor Abd Razak (2015), “Location Server Selection Techniques in Vehicular Ad-Hoc Network”, IJCSI International Journal of Computer Science Issues, Volume 12, Issue 5, pp.149-154

​

  • Adeyemi IR, Abd Razak S and Salleh M (2016) Understanding Online Behavior: Exploring the Probability of Online Personality Trait Using Supervised Machine- Learning Approach. Front. ICT 3:8. doi: 10.3389/fict.2016.00008

​

  • Aarafat Aldhaqm, Shukor Abd Razak, Siti Hajar Othman, Abdulalem Ali and Asri Ngadi (2016) Conceptual Investigation Process Model for Managing Database Forensic Investigation Knowledge. Applied Sciences, Engineering and Technology 12(14): 386-394. doi: 10.19026/rjaset.12.237

​

​

H-Index :

  • Scoups = 15

  • WoS = 13

Proceeding / Conference

  • Shukor Razak, Steven Furnell, Nathan Clarke, Phil Brooke, "Attacks against Mobile Ad Hoc Networks Routing Protocols", Proceedings of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, pp. 147-152, Liverpool, June 2004

​

  • Shukor Razak, Steven Furnell, Nathan Clarke, Phil Brooke, "A Two-tier IDS for MANETs", Proceedings of the 4th European Conference on Information Warfare and Security, 2005, pp. 271-280

​

  • Shukor Razak, Steven Furnell, Nathan Clarke, Phil Brooke, "A Two-tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach", Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2006), 2006, pp. 590- 595, LNCS 3975

​

  • Shukor Razak, Steven Furnell, Nathan Clarke, Phil Brooke, "Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation", AdHocNow 2007, 2007, pp. 15- 27, LNCS 4686

​

  • Shukor Razak, Normalia Samian, Aizaini Maarof, "A Friend Mechanism for Mobile Ad Hoc Networks", Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security, 2008, pp. 243-248, IEEE Computer Society

​

  • Shukor Razak, Normalia Samian, Aizaini Maarof, "Towards Identifying Features of Trust in Mobile Ad Hoc Network", Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS), 2008, pp. 271-276, IEEE Computer Society

​

  • Shukor Razak, Aziah Asmawi, Zailani, "System Architecture for SQL Injection and Insider Misuse Detection System for DBMS", Proceedings of the Information Technology, 2008. ITSim, 2008, Vol. 4, pp. 1-6, IEEE Explore

​

  • Shukor Razak, Tameem Eissa, Asri Ngadi, "Enhancing MANET Security Using Secret Public Keys", International Conference on Future Network, 2009, pp. 130-134, IEEE Computer Society

​

  • Hassan Chizari, Majid Hosseini, Shukor Abd Razak, "Multi Point Relay Selection Using GA", Proceedings of the IEEE Symposium on Industrial Electronics and Applications, ISIEA, 2009, pp. 957-962

​

  • Marjan Radi, Behnam Dezfouli, Shukor Abd Razak, Kamalrulnizam Abu Bakar, "LIEMRO: A Low-Interference Energy-Efficient Multipath Routing Protocol for Improving QoS in Event- Based Wireless Sensor Networks", The 4th International Conference on Sensor Technologies and Applications (SENSORCOMM'10), July 2010, Italy, pp. 551-557

​

  • SaraNajafzadeh, Norafida Ithnin, Shukor Abd Razak, Ramin Karimi, "DPB: Dynamic Probabilistic Broadcasting in Vehicular Ad Hoc Networks", 2010 International Conference on Intelligent Network and Computing, IEEE, Kuala Lumpur, Malaysia, 2010

​

  • Ramin Karimi, Norafida Ithnin, Shukor Abd Razak, Sara Najafzadeh, " A Comparative Study of Disruption Tolerant Network Routing Protocols for Vehicular Networks", IEEE 2010 International Conference on Intelligence and Information Technology, Lahore, Pakistan, 2010

​

  • Ramin Karimi, Norafida Ithnin, Shukor Abd Razak, Sara Najafzadeh, "Geographic Routing Protocols for Vehicular Ad Hoc Networks", 2010 International Conference on Intelligent Network and Computing, Kuala Lumpur, Malaysia, 2010

​

  • Salim M. Zaki, M. A. Ngadi, Shukor Abd Razak, (2010), “A Reliable Location Service Protocol for Vehicular Ad Hoc Networks Environment”, The 2010 International Conference on Intelligent Network and Computing (ICINC 2010), Malaysia, Kuala Lumpur, November 2010

​

  • Salim M. Zaki, M. A. Ngadi, Shukor Abd Razak, (2010), “Towards Deploying Vehicular Ad Hoc Networks on Aerodromes to Mitigate Incursions”, The 2010 International Conference on Mechanical and Aerospace Engineering (ICMAE 2010), Malaysia, Kuala Lumpur, November 2010

​

  • Mohammad Hossein Anisi., Abdul Hanan Abdullah., Shukor Abd Razak. “Efficient Data Aggregation in Wireless Sensor Networks” International Proceedings of Computer Science and Information Technology, Vol 13, Sep, 2011. (Indexed by ISI and Elsevier)

​

  • Mohammad Hossein Anisi, Abdul Hanan Abdullah, Shukor Abd Razak. “Evaluation of Object-Based and Ontology-Based Models in Context Aware Systems” Published in the Fifith Asia International Conference on Mathematical Modeling and Computer Simulation, AMS 2011, Manila, Philippines, May 24-26, 2011. (Indexed by IEEE Computer Society and Scopus)

​

  • Salim M. Zaki, M. A. Ngadi, Maznah Kamat, Shukor Abd Razak, and Johan Mohamad Shariff (2011), Multi Servers Location Service Management for VANET. CET 2011, China, Vol. 4, pp. 931—936.

​

  • Salim M. Zaki, M.A. Ngadi, Shukor Abd Razak, Maznah Kamat, and Johan Mohamad Shariff (2012), Location Service Management Protocol for Vehicular Ad Hoc Network Urban Environment. India, CCSIT 2012, Part II, LNICST Vol. 85, pp. 573– 584

​

  • Ikuesan R. Adeyemi, Shukor Abd Razak, Anazida Zainal Nor Amira Nor Azhan (2013), "A Digital Forensic Investigation Model for Insider Misuse", In Proc. of 3rd International Conference on Computational Science, Engineering and Information Technology, CCSEIT 2013, pp.293-305 (Scopus)

​

  • M. R. Al- Dhaqm, S. H. Othman, S. Abd Razak and A. Ngadi (2014), "Towards adapting metamodelling technique for database forensics investigation domain," Biometrics and Security Technologies (ISBAST), 2014 International Symposium on, Kuala Lumpur, 2014, pp. 322-327.

​

  • S. M. Ghoreishi, S. Abd Razak, I. F. Isnin and H. Chizari, "Rushing attack against routing protocols in Mobile Ad-Hoc Networks," Biometrics and Security Technologies (ISBAST), 2014 International Symposium on, Kuala Lumpur, 2014, pp. 220-224.

​

  • S. M. Ghoreishi, S. Abd Razak, I. F. Isnin and H. Chizari, "Security evaluation over lightweight cryptographic protocols," Biometrics and Security Technologies (ISBAST), 2014 International Symposium on, Kuala Lumpur, 2014, pp. 171-175.

​

  • S. M. Ghoreishi, S. Abd Razak, I. F. Isnin and H. Chizari, "New secure identitybased and certificateless authenticated Key Agreement protocols without pairings," Biometrics and Security Technologies (ISBAST), 2014 International Symposium on, Kuala Lumpur, 2014, pp. 188-192.

​

  • I. R. Adeyemi, S. Abd Razak and M. Salleh, "A psychographic framework for online user identification," Biometrics and Security Technologies (ISBAST), 2014 International Symposium on, Kuala Lumpur, 2014, pp. 198-203.

​

  • Abdulalem Ali, Shukor Abd Razak, Siti Hajar Othman, Arafat Mohammed (2015) “Towards Adapting Metamodeling approach for the Mobile Forensics Investigation Domain”, In: (SDNLC) SDNLC (ed) The 1st ICRIL-International Conference on Innovation in Science and Technology (IICIST 2015) Kuala Lumpur, Malaysia, 2015. pp 382-386

​

  • S. M. Ghoreishi, I. F. Isnin, S. Abd Razak and H. Chizari (2015), "Secure and Authenticated Key Agreement protocol with minimal complexity of operations in the context of identity-based cryptosystems," Computer, Communications, and Control Technology (I4CT), 2015 International Conference on, Kuching, 2015, pp. 299-303.

​

  • Abdul Kadir, N.F, Abd Razak, S., Chizari, H., "Identification of Fragmented JPEG Files in the Absence of File Systems", 2015 IEEE Conference on Open Systems, Melaka (2016), pp.1-6.

​

  • I. R. Adeyemi, S. A. Razak and M. Salleh, "Individual difference for HCI systems: Examining the probability of thinking style signature in online interaction," 2016 4th International Conference on User Science and Engineering (i-USEr), Melaka (2017), Article Number pp. 1-6. doi: 10.1109/IUSER.2016.7857933

​

  • Adeyemi, I. R., Razak, S. A., Venter, H. S., Salleh, M. (2017) "High Level Online User Attribution Model Based on Human Polychronic-Monochronic Tendency" 2017 IEEE International Conference on Big Data and Smart Computing, BigComp 2017, Jeju South Korea (2017), pp.445-450

​

  • Ali A., Razak S.A., Othman S.H., Mohammed A. (2018) Extraction of Common Concepts for the Mobile Forensics Domain. In: Saeed F., Gazem N., Patnaik S., Saed Balaid A., Mohammed F. (eds) Recent Trends in Information and Communication Technology. IRICT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 5. Springer, Cham

​

  • Fuad A. Ghaleb, Maznah Kamat, Mazleena Salleh, Mohd. Foad Rohani, Shukor Abd Razak, and Mohd Arief Shah. (2018). Fairness of Channel Assignment Algorithm Based on Weighted Links Ranking Scheme for Wireless Mesh Network. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 (ICEMIS '18). Association for Computing Machinery, New York, NY, USA, Article 28, 1–6.

​

  • A. Al-Dhaqm, S. Razak and S. H. Othman, (2019) "Model Derivation System to Manage Database Forensic Investigation Domain Knowledge," 2018 IEEE Conference on Application, Information and Network Security (AINS), Langkawi, Malaysia, 2018, pp. 75-80

​

  • Zainon, N.A.F.M., Razak, S.A., (2019) " Region of interest extraction for biometric cryptosystem," 2018 IEEE Conference on Application, Information and Network Security (AINS), Langkawi, Malaysia, 2018, pp. 33-37

​

  • Nazari, N.H.M., Razak, S.A, (2019) " Palm vein pseudonym for anonymous database record," 2018 IEEE Conference on Application, Information and Network Security (AINS), Langkawi, Malaysia, 2018, pp. 38-42

​

  • S. Rashid and S. A. Razak, "Big Data Challenges in 5G Networks," 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia, 2019, pp. 152-157

​

  • I. U. Onwuegbuzie, S. A. Razak and I. F. Isnin, "Performance Evaluation for ContikiMAC, XMAC, CXMAC and NullMAC Protocols for Energy Efficient Wireless Sensor Networks," 2019 IEEE Conference on Wireless Sensors (ICWiSe), Pulau Pinang, Malaysia, 2019, pp. 12-17

​

  • A. Elhigazi, S. A. Razak, M. Hamdan, B. Mohammed, I. Abaker and A. Elsafi, (2020) Authentication Flooding DOS Attack Detection and Prevention in 802.11, IEEE Student Conference on Research and Development (SCOReD), Batu Pahat, Johor, Malaysia, pp. 325-329

​

  • Zubair A.A., Razak S.B.A., Ngadi M.A.B., Ahmed A., Madni S.H.H. (2020) Convergence-Based Task Scheduling Techniques in Cloud Computing: A Review. In: Saeed F., Mohammed F., Gazem N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham

​

  • Abdallah A.E., Razak S.A., Ghalib F.A. (2020) Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network. In: Saeed F., Mohammed F., Gazem N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham

Co Supervisor

  • Name, Status

    • Title (Year)

​

  • Normalia Saliman (Graduated)

    • Towards Achieving Cooperation in a Trusted MANET Community: A Friendship Mechanism Approach (2011)

​

  • Aziah Asmawi (Graduated)

    • ISQL Injections and Insider Misuse Detection Systems for DBMS (2011)

​

  • Majid Hosseini (Graduated)

    • A Novel Localization Technique for Underwater Wireless Sensor Networks (2010)

​

  • Kam Kui Lin (Graduated)

    • Wavelet Transform Based Electrocardiogra m Delineation Method and Its Application in a WebBased Telecardiology System (2019)

Thesis

  • Shukor Abd Razak, Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks, Ph.D. Thesis, University of Plymouth, UK (2007)

Book Chapter

  • Bander Ali Saleh Al-rimy, Maznah Kamat, Fuad A. Ghaleb, Mohd. Foad Rohani, Shukor Abd Razak, Mohd Arief Shah, (2019) A User Mobility-Aware Fair Channel Assignment Scheme for Wireless Mesh Network, Computational Science and Technology, Lecture Notes in Technical Engineering, Springer. pp. 531-541

​

  • Ali A., Razak S.A., Othman S.H., Mohammed A. (2018) Extraction of Common Concepts for the Mobile Forensics Domain. Recent Trends in Information and Communication Technology. Lecture Notes on Data Engineering and Communications Technologies, vol 5. Springer. pp. 141-154

​

  • Abdulalem Ali, Shukor Abd Razak, Siti Hajar Othman, Arafat Mohamed, (2018) An Overview of the Smartphone’s Digital Forensics, Advances in Data Mining and Business Intelligence (Series 1), Penerbit UTM Press. pp. 93-116

​

  • Nor Amira Nor Azhan, Shukor Abd Razak, Hassan Chizari, (2015) A Review of JPEG Fragment Classification Methods in File Carving, Security in Computing and Networking Part 2, Penerbit UTM Press. pp. 1-23

​

  • Ghoreishi SM., Isnin I.F., Razak S.A., Chizari H. (2015) An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves. In: Abraham A., Muda A., Choo YH. (eds) Pattern Analysis, Intelligent Security and the Internet of Things. Advances in Intelligent Systems and Computing, vol 355. Springer, Cham, pp. 295-302

​

  • Ghoreishi SM., Isnin I.F., Razak S.A., Chizari H. (2015) A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings. In: Abraham A., Muda A., Choo YH. (eds) Pattern Analysis, Intelligent Security and the Internet of Things. Advances in Intelligent Systems and Computing, vol 355. Springer, Cham, pp. 287-294

​

  • Ikuesan R. Adeyemi (2015) A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings. In: Abraham A., Muda A., Choo YH. (eds) Pattern Analysis, Intelligent Security and the Internet of Things. Advances in Intelligent Systems and Computing, vol 355. Springer, Cham, pp. 287-294

​

  • Adeyemi I.R., Razak S.A., Zainal A., Azhan N.A.N. (2013), A Digital Forensic Investigation Model for Insider Misuse. In: Nagamalai D., Kumar A., Annamalai A. (eds) Advances in Computational Science, Engineering and Information Technology. Advances in Intelligent Systems and Computing, vol 225. Springer, Heidelberg, pp. 293-305

bottom of page