Johari Abdullah
Johari Abdullah
Associate Professor, Faculty of Computer Science & IT, Universiti Malaysia Sarawak (UNIMAS)
Verified email at - Homepage
Cited by
Cited by
Network intrusion detection system: A systematic study of machine learning and deep learning approaches
Z Ahmad, A Shahid Khan, C Wai Shiang, J Abdullah, F Ahmad
Transactions on Emerging Telecommunications Technologies 32 (1), e4150, 2021
Secure trust-based blockchain architecture to prevent attacks in VANET
AS Khan, K Balan, Y Javed, S Tarmizi, J Abdullah
Sensors 19 (22), 4954, 2019
Defending malicious script attacks using machine learning classifiers
N Khan, J Abdullah, AS Khan
Wireless Communications and Mobile Computing 2017 (1), 5360472, 2017
A spectrogram image-based network anomaly detection system using deep convolutional neural network
AS Khan, Z Ahmad, J Abdullah, F Ahmad
IEEE access 9, 87079-87093, 2021
A framework for traceable and transparent supply chain management for agri-food sector in malaysia using blockchain technology
KY Chan, J Abdullah, AS Khan
International Journal of Advanced Computer Science and Applications 10 (11), 2019
MyMobiHalal 2.0: Malaysian mobile halal product verification using camera phone barcode scanning and MMS
SN Junaini, J Abdullah
2008 International Conference on Computer and Communication Engineering, 528-532, 2008
A graph-theoretic approach for the detection of phishing webpages
CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian
Computers & Security 95, 101793, 2020
Effective way to defend the hypervisor attacks in cloud computing
MS Dildar, N Khan, JB Abdullah, AS Khan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 154-159, 2017
Security issues in 5G device to device communication
AS Khan, Y Javed, J Abdullah, JM Nazim, N Khan
IJCSNS 17 (5), 366, 2017
Towards vulnerability prevention model for web browser using interceptor approach
N Khan, J Abdullah, AS Khan
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
A methodology for implementation of service learning in higher education institution: A case study from faculty of computer science and information technology, UNIMAS
N Musa, DHA Ibrahim, J Abdullah, S Saee, F Ramli, AR Mat, MJA Khiri
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
Quantum-elliptic curve cryptography for multihop communication in 5G networks
S Khan, J Abdullah, N Khan, AA Julahi, S Tarmizi
International Journal of Computer Science and Network Security (IJCSNS) 17 …, 2017
Building standard offline anti-phishing dataset for benchmarking
KL Chiew, EH Chang, CL Tan, J Abdullah, KSC Yong
International Journal of Engineering & Technology 7 (4.31), 7-14, 2018
Malicious code intrusion detection using machine learning and indicators of compromise
CI Rene, JJI Abdullah
Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS)
AS Khan, Y Javed, J Abdullah, K Zen
Journal of Ambient Intelligence and Humanized Computing, 1-18, 2021
Preventing DoS attacks in IoT using AES
Y Javed, AS Khan, A Qahar, J Abdullah
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
EEoP: A lightweight security scheme over PKI in D2D cellular networks
Y Javed, AS Khan, A Qahar, J Abdullah
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
An IT governance framework for achieving the development of academic programme in higher institutions: A case of Universiti Malaysia Sarawak (UNIMAS)
N Musa, DHA Ibrahim, NA Bolhassan, J Abdullah, N Kulathuramaiyer, ...
The 5th International Conference on Information and Communication Technology …, 2014
A comprehensive study on DNA based Security scheme Using Deep Learning in Healthcare
S Aqeel, A Shahid Khan, Z Ahmad, J Abdullah
EDPACS 66 (3), 1-17, 2022
Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review
J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad, S Honey, S Afzal, ...
Applied Sciences 12 (7), 3551, 2022
The system can't perform the operation now. Try again later.
Articles 1–20