default search action
Azana Hafizah Mohd Aman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, Azana Hafizah Mohd Aman, Jin Fang, Xuting Hu, Atta ur Rehman Khan:
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things. IEEE Access 12: 4745-4761 (2024) - [j19]Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Imran Memon, Azana Hafizah Mohd Aman, Shayla Islam, Thippa Reddy Gadekallu, Sufyan Ali Memon:
Secure AI for 6G Mobile Devices: Deep Learning Optimization Against Side-Channel Attacks. IEEE Trans. Consumer Electron. 70(1): 3951-3959 (2024) - 2023
- [j18]Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Hasimi Sallehuddin, Khalid Abualsaud, Norhisham Mansor:
The Emerging of Named Data Networking: Architecture, Application, and Technology. IEEE Access 11: 23620-23633 (2023) - [j17]Rana Muhammad Abdul Haseeb-ur-rehman, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail, Ki-Hyung Kim:
High-Speed Network DDoS Attack Detection: A Survey. Sensors 23(15): 6850 (2023) - [c12]Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Hasimi Sallehuddin, Zhang Wenhua:
Producer Mobility in Named Data Networking: Handoff Latency and Packet Arrival Rate. ICEEI 2023: 1-6 - [c11]Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Nurhizam Safie Mohd Satar, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Saif Aamer Fadhil:
Detection of Crucial Power Side Channel Data Leakage in Neural Networks. ITNAC 2023: 57-62 - [c10]Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Mohammad Siab Nahi:
Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks. ITNAC 2023: 80-83 - [c9]Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Saif Aamer Fadhil:
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks. ITNAC 2023: 325-328 - 2022
- [j16]Farhan Ahmed Karim, Azana Hafizah Mohd Aman, Rosilah Hassan, Kashif Nisar, Mueen Uddin:
Named Data Networking: A Survey on Routing Strategies. IEEE Access 10: 90254-90270 (2022) - [j15]Rajesh Kumar Shrivastava, Simar Preet Singh, Mohammad Kamrul Hasan, Gagandeep, Shayla Islam, Salwani Abdullah, Azana Hafizah Mohd Aman:
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming. Comput. Commun. 193: 38-46 (2022) - [j14]Abdulrahman Sameer Sadeq, Rosilah Hassan, Hasimi Sallehudin, Azana Hafizah Mohd Aman, Anwar Hassan Ibrahim:
Conceptual Framework for Future WSN-MAC Protocol to Achieve Energy Consumption Enhancement. Sensors 22(6): 2129 (2022) - [j13]Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Rosilah Hassan, Norhisham Mansor:
Comparison of Named Data Networking Mobility Methodology in a Merged Cloud Internet of Things and Artificial Intelligence Environment. Sensors 22(17): 6668 (2022) - [j12]Rana Muhammad Abdul Haseeb-ur-rehman, Misbah Liaqat, Azana Hafizah Mohd Aman, Abdulwahab Ali Almazroi, Mohammad Kamrul Hasan, Zeeshan Ali, Rana Liaqat Ali:
LR-AKAP: A Lightweight and Robust Security Protocol for Smart Home Environments. Sensors 22(18): 6902 (2022) - [c8]Zhang Wenhua, Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Hasimi Sallehudin, Yanke Zhang:
Simulation cycle for network scenario based on AD-Campus solution. ICCR 2022: 1-5 - 2021
- [j11]Taj-Aldeen Naser Abdali, Rosilah Hassan, Azana Hafizah Mohd Aman, Quang Ngoc Nguyen:
Fog Computing Advancement: Concept, Architecture, Applications, Advantages, and Open Issues. IEEE Access 9: 75961-75980 (2021) - [j10]Ahmed Mahdi Jubair, Rosilah Hassan, Azana Hafizah Mohd Aman, Hasimi Sallehudin:
Social class particle swarm optimization for variable-length Wireless Sensor Network Deployment. Appl. Soft Comput. 113(Part): 107926 (2021) - [j9]Ahmed Salih Al-Khaleefa, Rosilah Hassan, Mohd Riduan Ahmad, Faizan Qamar, Zheng Wen, Azana Hafizah Mohd Aman, Keping Yu:
Performance Evaluation of Online Machine Learning Models Based on Cyclic Dynamic and Feature-Adaptive Time Series. IEICE Trans. Inf. Syst. 104-D(8): 1172-1184 (2021) - [j8]Azana Hafizah Mohd Aman, Wan Haslina Hassan, Shilan Sameen, Zainab Senan Attarbashi, Mojtaba Alizadeh, Liza Abdul Latiff:
IoMT amid COVID-19 pandemic: Application, architecture, technology, and security. J. Netw. Comput. Appl. 174: 102886 (2021) - [j7]Abdulrahman Sameer Sadeq, Rosilah Hassan, Azana Hafizah Mohd Aman, Hasimi Sallehudin, Khalid Hamed S. Allehaibi, Nasser N. Albogami, Anton Satria Prabuwono:
MAC protocol with grouping awareness GMAC for large scale Internet-of-Things network. PeerJ Comput. Sci. 7: e733 (2021) - [j6]Taj-Aldeen Naser Abdali, Rosilah Hassan, Azana Hafizah Mohd Aman, Quang Ngoc Nguyen, Ahmed Salih Al-Khaleefa:
Hyper-Angle Exploitative Searching for Enabling Multi-Objective Optimization of Fog Computing. Sensors 21(2): 558 (2021) - [c7]Taj-Aldeen Naser Abdali, Rosilah Hassan, Azana Hafizah Mohd Aman:
A New Feature in Mysejahtera Application to Monitoring the Spread of COVID-19 Using Fog Computing. CRC 2021: 1-4 - [c6]Tan Woei Ching, Azana Hafizah Mohd Aman, Wan Muhd Hazwan Azamuddin, Zainab Senan Attarbashi:
Performance Evaluation of AODV Routing Protocol in MANET using NS-3 Simulator. CRC 2021: 1-4 - [c5]Tan Woei Ching, Azana Hafizah Mohd Aman, Wan Muhd Hazwan Azamuddin, Hasimi Sallehuddin, Zainab Senan Attarbashi:
Performance Analysis of Internet of Things Routing Protocol for Low Power and Lossy Networks (RPL): Energy, Overhead and Packet Delivery. CRC 2021: 1-6 - [c4]Ahmed Mahdi Jubair, Azana Hafizah Mohd Aman, Rosilah Hassan, Hasimi Sallehudin:
Dimensionality Inspection for Wireless Sensor Network Deployment using Multi-Objective Optimization. CRC 2021: 1-5 - [c3]Abdulrahman Sameer Sadeq, Azana Hafizah Mohd Aman, Rosilah Hassan, Hasimi Sallehudin:
Quantitative Evaluation of IEEE 802.15.4 and ISA 100.11a for large scale Wireless Sensor Network. CRC 2021: 1-5 - [c2]Mustafa Sabah Taha, Mohammed Hashim Mahdi, Hiyam N. Khalid, Azana Hafizah Mohd Aman, Zainab Senan Attarbashi:
A Steganography Embedding Method Based on Psingle / Pdouble and Huffman Coding. CRC 2021: 1-6 - 2020
- [j5]Azana Hafizah Mohd Aman, Elaheh Yadegaridehkordi, Zainab Senan Attarbashi, Rosilah Hassan, Yong-Jin Park:
A Survey on Trend and Classification of Internet of Things Reviews. IEEE Access 8: 111763-111782 (2020) - [j4]Wan Muhd Hazwan Azamuddin, Rosilah Hassan, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Ahmed Salih Al-Khaleefa:
Quality of Service (QoS) Management for Local Area Network (LAN) Using Traffic Policy Technique to Secure Congestion. Comput. 9(2): 39 (2020) - [j3]Taj-Aldeen Naser Abdali, Rosilah Hassan, Ravie Chandren Muniyandi, Azana Hafizah Mohd Aman, Quang Ngoc Nguyen, Ahmed Salih Al-Khaleefa:
Optimized Particle Swarm Optimization Algorithm for the Realization of an Enhanced Energy-Aware Location-Aided Routing Protocol in MANET. Inf. 11(11): 529 (2020) - [j2]Kashif Nisar, Emilia Rosa Jimson, Mohd. Hanafi Ahmad Hijazi, Ian Welch, Rosilah Hassan, Azana Hafizah Mohd Aman, Ali Hassan Sodhro, Sandeep Pirbhulal, Sohrab Khan:
A survey on the architecture, application, and security of software defined networking: Challenges and open issues. Internet Things 12: 100289 (2020) - [j1]Rosilah Hassan, Faizan Qamar, Mohammad Kamrul Hasan, Azana Hafizah Mohd Aman, Amjed Sid Ahmed:
Internet of Things and Its Applications: A Comprehensive Survey. Symmetry 12(10): 1674 (2020)
2010 – 2019
- 2019
- [c1]Azana Hafizah Mohd Aman:
Effect of Zinc Oxide Nanoparticles Biosynthesized by Leuconostoc Mesenteroides ssp. Dextranicum Against Bacterial Skin Infections. DeSE 2019: 755-760
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint