Publications

YEAR: 2012

  • M. Salleh, N. D. • Oye and N. A. Iahad. “The Impact of E-learning in Workplace: Focus on Organization and Healthcare Environments”, International Arab Journal of e-Technology (IAJeT), Vol. 2, June, 2012, pp. 203 – 20. [More] [Bibtex]
  • M. Salleh, . Iman Saberi, B. Shojaie and M. Niknafskermani. “Preventing TMTO Attack in AES-CCMP in IEEE 802.11i”. Springer-Verlag in Communications in Computer and Information Science: 19th International Conference on Computer Networks 2012 (CN’12). 2012. [More] [Bibtex]
  • M. Salleh, . Iman Saberi, B. Shojaie and S. M. Alavi. “Improving Confidentiality of AES-CCMP in IEEE 802.11i”. Proceedings of 9th International Joint Conference on Computer Science and Software Engineering (JCSSE 2012). 2012. [More] [Bibtex]
  • M. Salleh, . Bahareh Shojaie and I. Saberi. “Comparison among Two Types of EAP-TLS Based on Cryptographic Mechanisms in IEEE 802.11i”. Proceedings of 4th International Conference on Electronics Computer Technology (ICECT 2012). 2012. [More][Bibtex]
  • N. D. • Oye, N. A. Iahad and M. Salleh. “E-Learning Methodologies and Tools”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, March, 2012, pp. 48 – 52. [More] [Bibtex]
  • M. Bakhtiari and M. A. Maarof. “Serious Weakness in RSA Cryptosystem”, International Journal of Computer Science Issues, Vol. 9, January, 2012, pp. 175-178. [More] [Online version] [Bibtex]
  • M. Bakhtiari and A. Ma’arof. “Method for Designing Nonlinear Boolean Functions of a Cryptography System”, 0000-00-00.[More] [Bibtex]
  • M. Bakhtiari and M. A. Maarof. “New Stream Cipher Algorithm – MAM263”, 0000-00-00. [More] [Bibtex]

YEAR: 2011

  • . Iman Saberi, B. Shojaie, M. Salleh and M. Niknafskermani. “Enhanced AES-CCMP Key Structure in IEEE 802.11i”. Proceedings of International Conference on Computer Science and Network Technology Conference (ICCSNT2011). 2011. [More] [Bibtex]
  • . S. F Tabatabaei, M. Salleh, M. R. Abbasy and N. Torkaman. “Denial of Service Attack Detection by Using Fuzzy Detection over Network Flows”. Proceeding of WorldComp ’11. 2011. [More] [Bibtex]
  • M. Bakhtiari and M. A. Maarof. “NEW STREAM CIPHER ALGORITHM WITH NONLINEAR BOOLEAN FUNCTIONS AND PARALLEL PSEUDO RANDOM NUMBER GENERATOR”, 2012-03-20. [More] [Bibtex]
  • M. Bakhtiari and M. A. Maarof. “An Efficient Stream Cipher Algorithm for Data Encryption”, International Journal of Computer Science Issues, Vol. 8, May, 2011, pp. 247-253. [More] [Online version] [Bibtex]
  • S. Abd RazakN. Ithnin, S. Najafzadeh and R. Karimi. “Non DTN Geographic Routing Protocols for Vehicular Ad Hoc Networks”,IJCSI International Journal of Computer Science Issues, Vol. 8. 2011. [More] [Bibtex]
  • S. Abd RazakN. Ithnin, S. Najafzadeh and R. Karimi. “Message Propagation in Vehicular Ad hocNetworks under free flow and congested flowScenarios”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), Vol. 2. 2011. [More][Bibtex]
  • S. Abd Razak, M. A. Ngadi and T. Eissa. “A Novel and Lightweight Authentication Scheme for Mobile Ad Hoc Networks”,ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, Vol. accepted. 2011. [More] [Bibtex]
  • S. Abd Razak, T. Eissa, R. Khokhar and N. Suliman. “Trust-based Routing Mechanism in MANET: Design and Implementation”,Mobile Networks and Applications, Vol. Online First. 2011. [More] [Bibtex]
  • S. Abd Razak, A. H. Abdullah, H. Chizari, T. Poston and M. Hosseini. “Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network”, Sensors, Vol. 3. 2011, pp. 3163-3176. [More] [Bibtex]
  • S. Abd Razak and M. Maliki. “Application Porting Issues for C++ Applications”, Theoretical and Applied Information Technology. 2011. [More] [Bibtex]
  • T. Eissa, S. Abd Razak and M. A. Ngadi. “Towards Providing a New Light Weight Authentication and Encryption Scheme for MANET”, Wireless Network, Vol. 17. 2011, pp. 833-842. [More] [Bibtex]

YEAR: 2010

  • S. M. Zaki, M. A. Ngadi and S. Abd Razak. “Towards Deploying Vehicular Ad Hoc Networks on Aerodromes to Mitigate Incursions”. International Conference on Mechanical and Aerospace Engineering (ICMAE 2010). 2010. [More] [Bibtex]
  • S. M. Zaki, M. A. Ngadi and S. Abd Razak. “A Reliable Location Service Protocol for Vehicular Ad Hoc Networks Environment”.International Conference on Intelligent Network and Computing (ICINC 2010). 2010. [More] [Bibtex]
  • R. Karimi, N. IthninS. Abd Razak and S. Najafzadeh. “Geographic Routing Protocols for Vehicular Ad Hoc Networks”.International Conference on Intelligent Network and Computing. 2010. [More] [Bibtex]
  • R. Karimi, N. IthninS. Abd Razak and S. Najafzadeh. “A Comparative Study of Disruption Tolerant Network Routing Protocols for Vehicular Networks”. IEEE 2010 International Conference on Intelligence and Information Technology. 2010. [More] [Bibtex]
  • S. Najafzadeh, N. IthninS. Abd Razak and R. Karimi. “DPB: Dynamic Probabilistic Broadcasting in Vehicular Ad Hoc Networks”.International Conference on Intelligent Network and Computing. 2010. [More] [Bibtex]
  • M. Radi, B. Dezfouli, S. Abd Razak and K. A. Bakar. “LIEMRO: A Low-Interference Energy-Efficient Multipath Routing Protocol for Improving QoS in Event-Based Wireless Sensor Networks”. The 4th International Conference on Sensor Technologies and Applications (SENSORCOMM’10). 2010. pp. 551-557. [More] [Bibtex]

YEAR: 2010

  • S. Abd Razak, B. Dezfouli and M. Radi. “A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks”, Computer Network and Communication (IJCNC), Vol. 2. 2010, pp. 126-142. [More] [Bibtex]
  • S. Abd Razak, A. H. Abdullah, H. Chizari, M. Hosseini and S. Salleh. “EF-MPR, a New Energy Efficeient Multi-Point Relay Selection Algorithm for MANET_1”, Supercomputing, Vol. Online First. 2010. [More] [Bibtex]

YEAR: 2009

  • . Mazleena Salleh and T. S. . “, Application of 2D Barcode in Hardcopy Document Verification”. Advances in Information Security and Assurance. 2009. pp. 644 – 651. [More] [Bibtex]
  • H. Chizari, M. Hosseini and S. Abd Razak. “Multi Point Relay Selection Using GA”. IEEE Symposium on Industrial Electronics and Applications, ISIEA. 2009. pp. 957-962. [More] [Bibtex]
  • T. Eissa, S. Abd Razak and M. A. Ngadi. “Enhancing MANET Security Using Secret Public Keys”. International Conference on Future Network. 2009. pp. 130-134. [More] [Bibtex]
  • S. Abd RazakA. Ma’arof, N. Suliman, S. Furnell, N. Clarke and P. Brooke. “A Friend Mechanism for Mobile Ad Hoc Network”,Information Assurance and Security, Vol. 4. 2009, pp. 440-448. [More] [Bibtex]
  • S. Abd Razak, S. M. Zaki and M. A. Ngadi. “A Review of Delay Aware Routing Protocols in MANET”, ISSR CS Letters, Vol. 1. 2009, pp. 1-12. [More] [Bibtex]

YEAR: 2008

  • A. Asmawi, S. Abd Razak and Zailani. “System Architecture for SQL Injection and Insider Misuse Detection System for DBMS”.Proceedings of the Information Technology, ITSim. 2008. pp. 1-6. [More] [Bibtex]
  • S. Abd Razak, N. Suliman and A. Ma’arof. “Towards Identifying Features of Trust in Mobile Ad Hoc Network”. Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS). 2008. pp. 271-276. [More] [Bibtex]
  • S. Abd Razak, N. Suliman and A. Ma’arof. “A Friend Mechanism for Mobile Ad Hoc Networks”. Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security. 2008. pp. 243-248. [More] [Bibtex]
  • S. Abd Razak, N. Clarke, S. Furnell and P. Brooke. “Friend-assisted Intrusion Detection and Response Mechanisms for Mobile Ad Hoc Networks”, Ad Hoc Network, Vol. 6. 2008, pp. 1151-1167. [More] [Bibtex]

YEAR: 2007

  • S. Abd Razak, S. Furnell, N. Clarke and P. Brooke. “Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation”. AdHocNow 2007. 2007. pp. 15-27. [More] [Bibtex]

YEAR: 2006

  • S. Abd Razak, S. Furnell, N. Clarke and P. Brooke. “A Two-tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach”. Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2006). 2006. pp. 590-595. [More] [Bibtex]

YEAR: 2005

  • S. Abd Razak, S. Furnell, N. Clarke and P. Brooke. “A Two-tier IDS for MANETs”. Proceedings of the 4th European Conference on Information Warfare and Security. 2005. pp. 271-280. [More] [Bibtex]

YEAR: 2004

  • S. Abd Razak, S. Furnell, N. Clarke and P. Brooke. “Attacks against Mobile Ad Hoc Networks Routing Protocols”. Proceedings of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting. 2004. pp. 147-152. [More] [Bibtex]