default search action
Khairul Akram Zainol Ariffin
Person information
- affiliation: Universiti Kebangsaan Malaysia, Selangor, Malaysia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Liwen Zhang, Faizan Qamar, Mahrukh Liaqat, Mohammad Nour Hindia, Khairul Akram Zainol Ariffin:
Toward Efficient 6G IoT Networks: A Perspective on Resource Optimization Strategies, Challenges, and Future Directions. IEEE Access 12: 76606-76633 (2024) - [j18]Mohammad Kamrul Hasan, Md. Sarwar Hosain, Md. Kawsar Ahmed, Shayla Islam, Arwa N. Aledaily, Safia Yasmeen, Khairul Akram Zainol Ariffin:
Encrypted images in a V-BLAST assisted SC-FDMA wireless communication system. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j17]Faizan Qamar, Syed Hussain Ali Kazmi, Khairul Akram Zainol Ariffin, Muhammad Tayyab, Quang Ngoc Nguyen:
Multi-Antenna Array-Based Massive MIMO for B5G/6G: State of the Art, Challenges, and Future Research Directions. Inf. 15(8): 442 (2024) - [j16]Hiba A. Tarish, Rosilah Hassan, Khairul Akram Zainol Ariffin, Mustafa Musa Jaber:
Network security framework for Internet of medical things applications: A survey. J. Intell. Syst. 33(1) (2024) - [j15]Faizan Qamar, Syed Hussain Ali Kazmi, Maraj Uddin Ahmed Siddiqui, Rosilah Hassan, Khairul Akram Zainol Ariffin:
Federated learning for millimeter-wave spectrum in 6G networks: applications, challenges, way forward and open research issues. PeerJ Comput. Sci. 10: e2360 (2024) - 2023
- [j14]Rana Muhammad Abdul Haseeb-ur-rehman, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail, Ki-Hyung Kim:
High-Speed Network DDoS Attack Detection: A Survey. Sensors 23(15): 6850 (2023) - [j13]Dyala Ibrahim, Rami Sihwail, Khairul Akram Zainol Ariffin, Ala Abuthawabeh, Manar A. Mizher:
A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm. Symmetry 15(7): 1305 (2023) - 2022
- [j12]Sarah K. Taylor, Steve Ho-yong Kim, Khairul Akram Zainol Ariffin, Siti Norul Huda Sheikh Abdullah:
A comprehensive forensic preservation methodology for crypto wallets. Digit. Investig. 42-43: 301477 (2022) - [j11]Rami Sihwail, Obadah Said Solaiman, Khairul Akram Zainol Ariffin:
New robust hybrid Jarratt-Butterfly optimization algorithm for nonlinear models. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8207-8220 (2022) - [c7]Ali Lamjid, Khairul Akram Zainol Ariffin, Mohd Juzaiddin AB Aziz, Nor Samsiah Sani:
Determine the optimal Hidden Layers and Neurons in the Generative Adversarial Networks topology for the Intrusion Detection Systems. ICCR 2022: 1-7 - [c6]Muhammad Haziq Mohd Zainudin, Khairul Akram Zainol Ariffin, Dahlia Asyiqin Ahmad Zainaddin, Ahmad Tarmizi Abdul Ghani, Siti Norul Huda Sheikh Abdullah:
Cloud-based Data Extraction From Mobile Devices: A Preliminary Analysis. ICCR 2022: 1-5 - 2021
- [j10]Rami Sihwail, Obadah Said Solaiman, Khairuddin Omar, Khairul Akram Zainol Ariffin, Mohammed Alswaitti, Ishak Hashim:
A Hybrid Approach for Solving Systems of Nonlinear Equations Using Harris Hawks Optimization and Newton's Method. IEEE Access 9: 95791-95807 (2021) - [j9]Muataz Salam Al Daweri, Salwani Abdullah, Khairul Akram Zainol Ariffin:
An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system. Comput. Commun. 180: 57-76 (2021) - [j8]Khairul Akram Zainol Ariffin, Faris Hanif Ahmad:
Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0. Comput. Secur. 105: 102237 (2021) - [j7]Muataz Salam Al Daweri, Salwani Abdullah, Khairul Akram Zainol Ariffin:
A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem. Int. J. Crit. Infrastructure Prot. 34: 100449 (2021) - [j6]C. H. Chin, Salwani Abdullah, S. S. K. Singh, Khairul Akram Zainol Ariffin, Dieter Schramm:
Computing low-frequency vibration energy with Hölder singularities as durability predictive criterion of random road excitation. Soft Comput. 25(8): 6469-6487 (2021) - [c5]Ahmad Mustafa Mohamad Al-Aboosi, Samar Kamil, Siti Norul Huda Sheikh Abdullah, Khairul Akram Zainol Ariffin:
Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation. CRC 2021: 1-6 - [c4]Sarah K. Taylor, Aswami Ariffin, Khairul Akram Zainol Ariffin, Siti Norul Huda Sheikh Abdullah:
Cryptocurrencies Investigation: A Methodology for the Preservation of Cryptowallets. CRC 2021: 1-5 - [c3]Abbas Salimi Zaini, Siti Norul Huda Sheikh Abdullah, Khairul Akram Zainol Ariffin, Meng Chun Lam, Rusdi Bin Abd Rashid, Zainudin Muhamad:
Health Monitoring Framework for Drug Addict Rehab in Cure & Care Service Centre Malaysia. ICEEI 2021: 1-6 - 2020
- [j5]Muataz Salam Al Daweri, Salwani Abdullah, Khairul Akram Zainol Ariffin:
A Migration-Based Cuttlefish Algorithm With Short-Term Memory for Optimization Problems. IEEE Access 8: 70270-70292 (2020) - [j4]Rami Sihwail, Khairuddin Omar, Khairul Akram Zainol Ariffin, Mohammad Tubishat:
Improved Harris Hawks Optimization Using Elite Opposition-Based Learning and Novel Search Mechanism for Feature Selection. IEEE Access 8: 121127-121145 (2020) - [j3]Imran Memon, Riaz Ahmed Shaikh, Mohammad Kamrul Hasan, Rosilah Hassan, Amin Ul Haq, Khairul Akram Zainol:
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology. Secur. Commun. Networks 2020: 8897098:1-8897098:12 (2020) - [j2]Muataz Salam Al Daweri, Khairul Akram Zainol Ariffin, Salwani Abdullah, Mohamad Firham Efendy Md. Senan:
An Analysis of the KDD99 and UNSW-NB15 Datasets for the Intrusion Detection System. Symmetry 12(10): 1666 (2020) - [c2]Sarah K. Taylor, M. Sharizuan M. Omar, Nooraiman Noorashid, Aswami Ariffin, K. Akram Z. Ariffin, S. N. Huda S. Abdullah:
People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study. ACeS 2020: 297-312
2010 – 2019
- 2018
- [j1]Amjad Mehmood, Akbar Khanan, Muhammad Muneer Umar, Salwani Abdullah, Khairul Akram Zainol Ariffin, Houbing Song:
Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks. IEEE Access 6: 5688-5694 (2018) - 2015
- [c1]Khairul Akram Zainol Ariffin, Ahmad Kamil Mahmood, Jafreezal Jaafar, Solahuddin Shamsuddin:
Tracking File's Metadata from Computer Memory Analysis. CIT/IUCC/DASC/PICom 2015: 975-980
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint