default search action
Abdulaziz Aborujilah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Abdulaziz Aborujilah, Jibril Adamu, Shamsul Anuar Mokhtar, AbdulAleem Al-Othmani, Elham Yahya Al-alwi, Dawood Abdulmalek Yahya Al-Hidabi:
CIA-based Analysis for E-Leaming Systems Threats and Countermeasures in Malaysian Higher Education: Review Paper. IMCOM 2023: 1-8 - [c16]Abdulaziz Aborujilah, Abdulaziz Alashbi, Ibraheem Shayea, Abdul Hakim H. M. Mohamed, Abdulraqeb Alhammadi, Ayman A. El-Saleh, Abdul Ahad:
IoT Integration in Agriculture: Advantages, Challenges, and Future Perspectives: Short survey. WINCOM 2023: 1-7 - 2022
- [c15]Abdulaziz Aborujilah, Jibril Adamu, Shafiza Mohd Shariff, Zalizah Awang Long:
Descriptive Analysis of Built-in Security Features in Web Development Frameworks. IMCOM 2022: 1-8 - [c14]Abdulaziz Aborujilah, Abubaker-Eseddig Fathi Mahmoud Elsebaie, Shamsul Anuar Mokhtar, Zalizah Awang Long, Shafiza Mohd Shariff, Nur Syahela Hussien, Mohd Nizam Husen:
A Conceptual Framework for an Integrated Healthcare Information Systems from an Organizational Perspective. IMCOM 2022: 1-8 - 2021
- [j6]Abdulaziz Aborujilah, Abubaker-Eseddig Fathi Mahmoud Elsebaie, Shamsul Anuar Mokhtar:
IoT MEMS: IoT-Based Paradigm for Medical Equipment Management Systems of ICUs in Light of COVID-19 Outbreak. IEEE Access 9: 131120-131133 (2021) - [j5]Nur Syahela Hussien, Sarina Sulaiman, Abdulaziz Aborujilah, Merlinda Wibowo, Hussein Samma:
Scalability of Mobile Cloud Storage. Int. J. Interact. Mob. Technol. 15(21): 199 (2021) - 2020
- [j4]Rasheed Mohammad Nassr, Abdulaziz Aborujilah, Danah Ahmed Aldossary, Alia Ahmed Abdullah Aldossary:
Understanding Education Difficulty During COVID-19 Lockdown: Reports on Malaysian University Students' Experience. IEEE Access 8: 186939-186950 (2020) - [c13]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Nor Azlina Ali, Zalizah Awang Long, Mohd Nizam Husen, Tawfik Al Hadhrami, Hideya Ochiai:
SMOTE-Based Framework for IoT Botnet Attack Detection. ACeS 2020: 287-296 - [c12]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Mohd Nizam Husen, Zalizah Awang Long, Nor Azlina Ali, Vickneshwaran A. L. Murugan:
Adoption and Continuance Intention Model of Applying Telemedicine Technology in Digital Games Addiction. IMCOM 2020: 1-9 - [c11]AbdulAleem Al-Othmani, Azizah Abdul Manaf, Akram M. Zeki, Qusay Al-Maatouk, Abdulaziz Aborujilah, Maen T. Al-Rashdan:
Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal. IMCOM 2020: 1-6 - [c10]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Mustapha Hamdi:
Comparative Study of SMOTE and Bootstrapping Performance Based on Predication Methods. IRICT 2020: 3-9
2010 – 2019
- 2019
- [c9]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othman, Sultan H. Almotiri:
A Conceptual Framework for Applying Telemedicine Mobile Applications in Treating Computer Games Addiction. IMCOM 2019: 599-609 - [c8]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Nur Syahela, Hideya Ochiai:
Security Assessment Model to Analysis DOS Attacks in WSN. IRICT 2019: 789-800 - 2018
- [c7]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, Shahrulniza Bin Musa, Munaisyah Abdullah:
IT Students' Sentiment of Faculty Evaluations and Posting Opinions on Social Media Networks. IMCOM 2018: 15:1-15:5 - 2017
- [j3]Abdulaziz Aborujilah, Shahrulniza Musa:
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach. J. Comput. Networks Commun. 2017: 7674594:1-7674594:8 (2017) - [c6]Abdulaziz Aborujilah, Rasheed Nassr, Md. Nazmus Saadat, Munaisyah Abdullah:
Lecturers' perception on social media networks uses in education. IMCOM 2017: 15 - 2014
- [j2]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed. J. Comput. Sci. 10(4): 652-659 (2014) - [j1]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication. J. Comput. Sci. 10(10): 2006-2019 (2014) - [c5]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. ICUIMC 2014: 7:1-7:6 - 2013
- [c4]Shamsul Anuar Mokhtar, Siti Haryani Shaikh Ali, Abdulkarem Al-Sharafi, Abdulaziz Aborujilah:
Cloud computing in academic institutions. ICUIMC 2013: 2 - [c3]Shahrulniza Musa, Aamir Shahzad, Abdulaziz Aborujilah:
Simulation base implementation for placement of security services in real time environment. ICUIMC 2013: 31 - [c2]Shahrulniza Musa, Aamir Shahzad, Abdulaziz Aborujilah:
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security. ICUIMC 2013: 32 - [c1]Mohd Nazri Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, Aamir Shahzad:
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. ICUIMC 2013: 36
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint