scispace - formally typeset
S

Shahrulniza Musa

Researcher at University of Kuala Lumpur

Publications -  78
Citations -  719

Shahrulniza Musa is an academic researcher from University of Kuala Lumpur. The author has contributed to research in topics: Cloud computing & SCADA. The author has an hindex of 12, co-authored 72 publications receiving 515 citations. Previous affiliations of Shahrulniza Musa include Loughborough University & Information Technology University.

Papers
More filters
Proceedings ArticleDOI

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach

TL;DR: A new model to detect flooding based DoS attack in cloud environment has been suggested consisting three phases and it is proven that it can detect the flooding attack effectively.
Journal ArticleDOI

A Systematic Review of Load Balancing Techniques in Software-Defined Networking

TL;DR: This paper extends and reviews the discussion with a taxonomy of current emerging load balancing techniques in SDN systematically by categorizing the techniques as conventional and artificial intelligence-based techniques to improve the service quality.
Journal ArticleDOI

A Comprehensive Study of Load Balancing Approaches in the Cloud Computing Environment and a Novel Fault Tolerance Approach

TL;DR: The research paper identifies the need for FT efficiency metric in LB algorithms which is one of the main concerns in cloud environments and proposes a novel algorithm that employs FT metrics in LB.
Proceedings ArticleDOI

How secure is your smartphone: An analysis of smartphone security mechanisms

TL;DR: This paper presents the current state of smartphone security mechanisms and their limitations in order to identify certain security requirements for proposing enhancements for the smartphone security model, and analyzes the improvements proposed for the basic Android security model.
Proceedings ArticleDOI

Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption

TL;DR: Based on existing and current SCADA/DNP3 security issues, the security solutions have been proposed to protect the communication (SCADA/ DNP3 protocol communication) and level of security is measured and compared with attack detection level and attack impact level.