ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Data plane failure and its recovery techniques in SDN: A systematic literature review
2023
Author(s) : Rosli Bin Salleh Source :
Journal of King Saud University - Computer and Information Sciences
DOI :
10.1016/j.jksuci.2023.02.001
|
2. |
Ensuring reliable network operations and maintenance: The role of PMRF for switch maintenance and upgrades in SDN
2023
Author(s) : Rosli Bin Salleh Source :
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
DOI :
10.1016/j.jksuci.2023.101809
|
3. |
Data plane failure and its recovery techniques in SDN: A systematic literature review
2023
Author(s) : Rosli Bin Salleh Source :
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
DOI :
10.1016/j.jksuci.2023.02.001
|
4. |
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism
2022
Source :
Wireless Networks
DOI :
10.1007/s11276-021-02885-8
|
5. |
Hybrid Metaheuristics Using Rough Sets for QoS-Aware Service Composition
2022
Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2022.3213705
|
6. |
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism
2022
Source :
WIRELESS NETWORKS
DOI :
10.1007/s11276-021-02885-8
|
7. |
Hybrid Metaheuristics for QoS-Aware Service Composition: A Systematic Mapping Study
2022
Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2021.3133505
|
8. |
Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization
2022
Source :
MOBILE INFORMATION SYSTEMS
DOI :
10.1155/2022/9109300
|
9. |
R-IDPS: Real Time SDN-Based IDPS System for IoT Security
2022
Author(s) : Rosli Bin Salleh Source :
CMC-COMPUTERS MATERIALS & CONTINUA
DOI :
10.32604/cmc.2022.028285
|
10. |
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review
2022
Source :
MULTIMEDIA TOOLS AND APPLICATIONS
DOI :
10.1007/s11042-022-12010-2
|
11. |
A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network
2021
Author(s) : Ismail Bin Ahmedy, Mohd Yamani Idna Bin Idris, Rosli Bin Salleh, Aznul Qalid Bin Md Sabri Source :
Wireless Networks
|
12. |
Stakeholders’ Viewpoints toward Blockchain Integration within IoT-Based Smart Cities
2021
Author(s) : Nada Alasbali, Saaidal Razalli Bin Azzuhri, Rosli Bin Salleh Source :
JOURNAL OF SENSORS
DOI :
10.1155/2021/4680021
|
13. |
Stakeholders' Viewpoints toward Blockchain Integration within IoT-Based Smart Cities
2021
Author(s) : Rosli Bin Salleh, Saaidal Razalli Bin Azzuhri Source :
JOURNAL OF SENSORS
DOI :
10.1155/2021/4680021
|
14. |
A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network
2021
Author(s) : Rosli Bin Salleh, Mohd Yamani Idna Bin Idris, Ismail Bin Ahmedy, Aznul Qalid Bin Md Sabri Source :
WIRELESS NETWORKS
DOI :
10.1007/s11276-021-02608-z
|
15. |
Enabling Reachability Across Multiple Domains Without Controller Synchronization in SDN
2021
Author(s) : Rosli Bin Salleh Source :
CMC-COMPUTERS MATERIALS & CONTINUA
DOI :
10.32604/cmc.2021.017394
|
16. |
Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey
2021
Author(s) : Rosli Bin Salleh Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2021.3065123
|
17. |
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network
2020
Author(s) : Rosli Bin Salleh, Ismail Bin Ahmedy Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2020.2965206
|
18. |
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network
2020
Source :
IEEE Access
|
19. |
SDN based Intrusion Detection System and Prevention Systems Using Manufacturer Usage Description: A Survey
2020
Author(s) : Rosli Bin Salleh Source :
International Journal of Advanced Computer Science and Applications (IJACSA)
|
20. |
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network
2020
Source :
IEEE ACCESS
|
21. |
Time Division Multiple Access Scheduling Strategies for Emerging Vehicular Ad hoc Network Medium Access Control Protocols: A Survey
2019
Author(s) : Rafidah Binti Md Noor, Rosli Bin Salleh Source :
Telecommunication Systems
|
22. |
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
2019
Author(s) : Rosli Bin Salleh, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Ahsiah Binti Ismail Source :
FORENSIC SCIENCE INTERNATIONAL
|
23. |
Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey
2019
Author(s) : Rosli Bin Salleh, Rafidah Binti Md Noor Source :
TELECOMMUNICATION SYSTEMS
|
24. |
Less Give More: Evaluate and zoning Android applications
2019
Author(s) : Rosli Bin Salleh, Nor Badrul Anuar Bin Juma'at Source :
MEASUREMENT
|
25. |
Enhanced Weight-based Clustering Algorithm to provide Reliable Delivery for VANET Safety Applications
2019
Author(s) : Rosli Bin Salleh, Rafidah Binti Md Noor Source :
PLOS-ONE
|
26. |
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
2019
Author(s) : Rosli Bin Salleh, Rafidah Binti Md Noor Source :
PLOS ONE
|
27. |
Evaluation of Network Traffic Analysis Using Fuzzy C-Means Clustering Algorithm in Mobile Malware Detection
2018
Author(s) : Yap Teng Teng Source :
Advanced Science Letters
DOI :
10.1166/asl.2018.10660
|
28. |
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet
2018
Author(s) : Rosli Bin Salleh Source :
IET Network
|
29. |
Bio-inspired for Features Optimization and Malware Detection
2018
Source :
Arabian Journal for Science and Engineering
|
30. |
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
2018
Author(s) : Ponmalar A/p N Alagappar Source :
IEEE Access
DOI :
10.1109/access.2017.2789281
|
31. |
Bio-inspired for Features Optimization and Malware Detection
2018
Author(s) : Fazidah Binti Othman, Rosli Bin Salleh Source :
Arabian Journal for Science and Engineering
DOI :
10.1007/s13369-017-2951-y
|
32. |
Bio-inspired for Features Optimization and Malware Detection
2018
Source :
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
|
33. |
SIFT-Symmetry: A Robust Detection Method for Copy-Move Forgery with Reflection Attack
2017
Author(s) : Rosli Bin Salleh, Mohd Yamani Idna Bin Idris, Fazidah Binti Othman, Ainuddin Wahid Bin Abdul Wahab Source :
Journal of Visual Communication and Image Representation
DOI :
10.1016/j.jvcir.2017.04.004
|
34. |
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
2017
Source :
Computers Security
|
35. |
SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack
2017
Author(s) : Rosli Bin Salleh, Fazidah Binti Othman, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
|
36. |
A multi-objective software defined network traffic measurement
2017
Author(s) : Nurul Ashikin Binti Abdullah Source :
Measurement
DOI :
10.1016/j.measurement.2016.10.0
|
37. |
The Evolution of Android Malware and Android Analysis Techniques
2017
Source :
ACM Computing Surveys
DOI :
10.1145/3017427
|
38. |
On the Analysis and Detection of Mobile Botnet Applications
2016
Source :
Journal of Universal Computer Science
|
39. |
The rise of "malware": Bibliometric analysis of malware study
2016
Author(s) : Rosli Bin Salleh, Nor Badrul Anuar Bin Juma'at Source :
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
DOI :
10.1016/j.jnca.2016.08.022
|
40. |
SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications
2016
Author(s) : Rosli Bin Salleh Source :
PLoS ONE
DOI :
10.1371/journal.pone.0150077
|
41. |
The rise of "malware": Bibliometric analysis of malware study
2016
Source :
Journal of Network and Computer Applications
DOI :
10.1016/j.jnca.2016.08.022
|
42. |
Copy-move forgery detection: Survey, challenges and future directions
2016
Source :
Journal of Network and Computer Applications
DOI :
10.1016/j.jnca.2016.09.008
|
43. |
Mobile Botnet Attacks an Emerging Threat: Classification, Review and Open Issues
2015
Author(s) : Rosli Bin Salleh, Rafidah Binti Md Noor Source :
Ksii Transactions on Internet and Information Systems
|
44. |
Botnet detection techniques: review, future trends and issues
2014
Author(s) : Nor Badrul Anuar Bin Juma'at, Rosli Bin Salleh Source :
Journal of Zhejiang University
|
45. |
Electronics and Telecommunications Research Institute (ETRI)
2014
Author(s) : Rosli Bin Salleh Source :
Etri Journal
|
46. |
A Survey of Secure Protocols in Mobile IPv6
2014
Author(s) : Rosli Bin Salleh Source :
Journal of Network and Computer Applications.
|
47. |
A survey of secure protocols in Mobile IPv6
2014
Author(s) : Rosli Bin Salleh Source :
Journal of Network and Computer Applications
|
48. |
Analysis and Design of Low-Cost Bit-Serial Architectures for Motion Estimation in H.264/AVC
2013
Author(s) : Rosli Bin Salleh Source :
Journal of Signal Processing and Systems
|
49. |
Performance Analysis of AODV, AOMDV, DSR, DSDV Routing Protocols in Vehicular Ad Hoc Network
2013
Author(s) : Rosli Bin Salleh Source :
Research Journal of Recent Sciences
|
50. |
Security overview of Wireless Sensor Network
2013
Author(s) : Rosli Bin Salleh Source :
Life Science Journal (Life Sci J)
|
51. |
A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection
2013
Author(s) : Nor Badrul Anuar Bin Juma'at, Rosli Bin Salleh Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
|
52. |
Secure connection in Mobile IPv6
2013
Author(s) : Rosli Bin Salleh Source :
Life Science Journal (Life Sci J)
|
53. |
Make a Secure Connection Using Elliptic Curve Digital
Signature
2012
Author(s) : Rosli Bin Salleh |
54. |
A Survey of Algorithms and Architectures for
H.264 Sub-
Pixel Motion Estimation
2012
Author(s) : Rosli Bin Salleh |
55. |
Fast Handoff for 802.11 Wireless Network
2011
Author(s) : Rosli Bin Salleh Source :
Communications and Network Journal
|
56. |
Reducing Layer 2 Handoff Latency in WLANs using
Advanced Context Distribution
2011
Author(s) : Rosli Bin Salleh Source :
International Journal of Scientific and Engineering Research (IJSER)
|
57. |
Fast Algorithm Analysis And Bit-serial Architecture
Design For Sub-pixel Motion Estimation In H.264
2010
Author(s) : Rosli Bin Salleh Source :
Journal of Circuits, Systems, and Computers (JCSC)
|
58. |
A Bit-Serial Multiplier Architecture for Finite Fields
Over Galois Fields
2010
Author(s) : Rosli Bin Salleh Source :
JOURNAL OF COMPUTER SCIENCE
|
59. |
FAST ALGORITHM ANALYSIS AND BIT-SERIAL ARCHITECTURE DESIGN FOR SUB-PIXEL MOTION ESTIMATION IN H.264
2010
Author(s) : Rosli Bin Salleh Source :
Journal of Circuits Systems and Computers
|
60. |
Shoulder Surfing Attack in Graphical Password
Authentication
2009
Author(s) : Rosli Bin Salleh, Omar Bin Zakaria |
61. |
Off-line Handwritten Jawi Character Recognition
Using
Histogram Normalization and Sliding Window
Approach For
Hardware Implementation
2009
Author(s) : Zaidi Bin Razak, Noorzaily Bin Mohamed Noor, Mashkuri Yaacob, Khansa Bt Zulkifli, Rosli Bin Salleh Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
|
62. |
Enhancing Handoff Process using IAPP with Caching
Techniques
2009
Author(s) : Rosli Bin Salleh |
63. |
Wireless Spectrum Combination Protocol for 4G Networks
2009
Author(s) : Omar Bin Zakaria, Rosli Bin Salleh |
64. |
Off-line Jawi Handwriting Recognition using
Hamming Classification
2009
Author(s) : Zaidi Bin Razak, Noorzaily Bin Mohamed Noor, Emran Bin Mohd Tamil, Mashkuri Hj Yaacob, Mohd Yakub @ Zulkifli Bin Mohd Yusoff, Mohd Yamani Idna Bin Idris, Nurulhuda Binti Abd. Ghani, Rosli Bin Salleh Source :
Information Technology Journal
|
65. |
Mobile Multimedia Control Model for Fire Disaster of
City Building
2009
Author(s) : Omar Bin Zakaria, Rosli Bin Salleh |
66. |
OFF-LINE HANDWRITTEN JAWI CHARACTER SEGMENTATION USING HISTOGRAM NORMALIZATION AND SLIDING WINDOW APPROACH FOR HARDWARE IMPLEMENTATION
2009
Author(s) : Rosli Bin Salleh, Zaidi Bin Razak Source :
Malaysian Journal of Computer Science
|
67. |
A wide-range survey on Recall-Based Graphical User
Authentications algorithms based on ISO and Attack Patterns
2009
Author(s) : Rosli Bin Salleh, Omar Bin Zakaria Source :
International Journal of Computer Science and Information Security (IJCSIS)
|
68. |
Mobile Multimedia Control Model for Fire Disaster
of City Building
2009
Author(s) : Omar Bin Zakaria, Rosli Bin Salleh |
69. |
Imitating K-Means to Enhance Data Selection
2009
Author(s) : Rosli Bin Salleh |
70. |
Off-line Handwriting Text Line Segmentation : A
Review
2008
Author(s) : Rosli Bin Salleh |
71. |
Off-line Handwritten Jawi Character Recognition Using Histogram Normalization and Sliding Window Approach For Hardware Implementation
2008
Author(s) : Rosli Bin Salleh |
72. |
Off-line Handwriting Text Line Segmentation : A Review
2008
Author(s) : Zaidi Bin Razak, Mohd Yamani Idna Bin Idris, Noorzaily Bin Mohamed Noor, Rosli Bin Salleh Source :
IJCSNS International Journal of Computer Science and Network Security
|
73. |
Efficient Algorithm in Projective Coordinates for EEC Over GF(2n)
2007
Author(s) : Rosli Bin Salleh |
74. |
A Real-Time Line Segmentation Algorithm for An Offline Overlapped Handwritten Jawi Character Recognition Chip
2007
Author(s) : Rosli Bin Salleh |
75. |
Handoff Techniques for 4G Wireless Mobile Internet
2007
Author(s) : Rosli Bin Salleh |
76. |
Rosli Salleh, Zaidi Razak, Darwin Caldwell and Rui Loureiro, SalFSAR: A Dual Purpose Device for Laparoscopic Training and Tele-surgery , Malaysian Journal of Computer Science, Vol. 18 No. 1, June 2005, pp. 78-92.
2005
Author(s) : Rosli Bin Salleh |
BOOK
NO | DETAILS OF BOOK |
---|---|
1. |
Chapter 11, Virtual Private Networking, Selected topic In Installation of Client-Server Application.
2008
Author(s) : Rosli Bin Salleh |
2. |
Buku Teks MPAV Kegunaan 2008, Sistem Sokongan Rangkaian Tingkatan 4 dan 5
2008
Author(s) : Rosli Bin Salleh |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
Mobile Botnet Attacks: A Thematic Taxonomy
2014
Author(s) : Rosli Bin Salleh |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
Avoiding Forwarding Loop Across Multiple Domains Without Controller Synchronization in SDN
2020
Author(s) : Rosli Bin Salleh |
2. |
An Evaluation Of Error Level Analysis In Image Forensics
2015
|
3. |
Bots and Botnets: An Overview of Characteristics,
Detection and Challenges
2012
Author(s) : Rosli Bin Salleh |
4. |
MoBots: A New Generation of Botnets on Mobile Devices
and Networks
2012
Author(s) : Rosli Bin Salleh |
5. |
Protection of Binding Update Message in Mobile IPv6
2012
Author(s) : Rosli Bin Salleh |
6. |
Overview of Handover Latency and Resource Consumption
in Hierarchical Mobile IPv6 Protocol and GPS Approaches
2012
Author(s) : Rosli Bin Salleh |
7. |
A Survey on Cloud Computing Security
2012
Author(s) : Rosli Bin Salleh |
8. |
Overview of Mobile IPv6 Security
2012
Author(s) : Rosli Bin Salleh |
9. |
MoBots: A New Generation of Botnets on Mobile
Devices and Networks
Networks
2012
Author(s) : Nor Badrul Anuar Bin Juma'at, Rosli Bin Salleh |
10. |
Wireless Network Security Using Elliptic Curve
Cryptography
2011
Author(s) : Rosli Bin Salleh |
11. |
A Novel Approach For Efficient Resource
Consumption In GPS-Based Mobile IPv6 Wireless LAN
2011
Author(s) : Rosli Bin Salleh |
12. |
Overview of Security Issues in Wireless Sensor
Networks
2011
Author(s) : Rosli Bin Salleh |
13. |
Overview of Latest Approaches in Heterogeneous and
Mobile IPv6 Homogeneous Wireless Networks Based on
Location-Assisted Information
2011
Author(s) : Rosli Bin Salleh |
14. |
Multi-Network Data Path for 5G Mobile Multimedia
2009
Author(s) : Omar Bin Zakaria, Rosli Bin Salleh |
15. |
Application of Elliptic Curve Cryptography: An
Overview, E-Tech 2009 Conference
2009
Author(s) : Rosli Bin Salleh |
16. |
Throughput Optimization of Unplannen Wireless Mesh
Networks Deployment Using Partitioning Hierarchical
Cluster (PHC)
2009
Author(s) : Rosli Bin Salleh, Omar Bin Zakaria |
17. |
The Future of Mobile Wireless Communication Networks
2009
Author(s) : Omar Bin Zakaria, Rosli Bin Salleh |
18. |
Recall-Based Graphical User Authentication Based On
Attacks Patterns
2009
Author(s) : Rosli Bin Salleh, Omar Bin Zakaria |
19. |
Elliptic Curve Cryptography: The Next Generation
Encryption Technology for Secure Data Communication
2009
Author(s) : Rosli Bin Salleh |
20. |
A Complete Comparison on Pure and Cued Recall-Based
Graphical User Authentication Algorithm
2009
Author(s) : Rosli Bin Salleh |
21. |
Secure Smart Card Transactions using Elliptic Curve
Cryptography and Biometric
2009
Author(s) : Rosli Bin Salleh |
22. |
An Overview of Elliptic Curve Cryptography in
constrained Applications
2009
Author(s) : Rosli Bin Salleh |
23. |
Radio Frequency Convergence Protocol for 4G Networks
2008
Author(s) : Rosli Bin Salleh |
24. |
An Improved Elliptic Curve Public Key cryptography
Algorithm
2008
Author(s) : Rosli Bin Salleh |
25. |
An FPGA-Based Co-Processor For Elliptic Curve Cryptography
2008
Author(s) : Rosli Bin Salleh |
26. |
A Cost-Efficient Bit-Serial Architecture for Sub-Pixel
Motion Estimation of H.264/AVC
2008
Author(s) : Rosli Bin Salleh |
27. |
An Algorithm and Its Architecture For Half-pixel
Variable Block Size Motion Estimation
2007
Author(s) : Rosli Bin Salleh |
28. |
Bandwidth Optimization Control Protocol for 4G Wireless
Mobile Internet
2007
Author(s) : Rosli Bin Salleh |
29. |
Proposed Bluetooth Middleware Profile For On-Location
Universal Format Announcement
2004
Author(s) : Rosli Bin Salleh |
30. |
Study of The Formulas in Projective Coordinates for
Elliptic Curve Over GF(2n) in Cryptography
2004
Author(s) : Rosli Bin Salleh |
31. |
Force Feedback Laparoscopic Handle and Grasping/Cutting
Simulator
2002
Author(s) : Rosli Bin Salleh |
32. |
Haptic Feedback for VR based Minimally Invasive
Surgical (MIS) Training
2000
Author(s) : Rosli Bin Salleh |
33. |
Haptic Feedback for VR based Minimally Invasive
Surgical (MIS) Training and Telesurgery
1999
Author(s) : Rosli Bin Salleh |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Development Of Efficient Algorithm To Improve The Crescent Moon Visibility Based On Al-rukyah Method In Malaysia And Related Android/web Based Application
Researcher(s) : Dr. Mohd Khalit Bin Othman, Dr. Shaiful Anuar Bin Abu Bakar |
|
end |
Intrusion Detection And Prevention System Using Software Defined Networks (sdn) In Hetereogeneous Iot Network Using Manufacturer Usage Description
Researcher(s) : Dr. Muhammad Reza Bin Z'aba |
|
end |
A Fundamental Research On Botnet Phenomenon : Detection , Response, And Mitigation
|
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Smart Management Of Elctrical Appliances And Energy Saving Using Internet Of Things
|
|
end |
An Intelligent Tool For Mobile Malware Detection And Responses
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab, Associate Prof. Dr. Rosli Bin Salleh, Dr Madihah Mohd Saudi |
|
end |
Mobile Sinks Selection And Navigation For Efficient Data Collection In Wireless Sensor Networks
|
|
end |
Mobile Botnet
|
|
end |