ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Data plane failure and its recovery techniques in SDN: A systematic literature review
2023
Author(s) : Rosli Bin Salleh Source : JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES DOI : 10.1016/j.jksuci.2023.02.001 |
2. |
Ensuring reliable network operations and maintenance: The role of PMRF for switch maintenance and upgrades in SDN
2023
Author(s) : Rosli Bin Salleh Source : JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES DOI : 10.1016/j.jksuci.2023.101809 |
3. |
Data plane failure and its recovery techniques in SDN: A systematic literature review
2023
Author(s) : Rosli Bin Salleh Source : Journal of King Saud University - Computer and Information Sciences DOI : 10.1016/j.jksuci.2023.02.001 |
4. |
Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization
2022
Source : MOBILE INFORMATION SYSTEMS DOI : 10.1155/2022/9109300 |
5. |
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism
2022
Source : Wireless Networks DOI : 10.1007/s11276-021-02885-8 |
6. |
Hybrid Metaheuristics for QoS-Aware Service Composition: A Systematic Mapping Study
2022
Source : IEEE ACCESS DOI : 10.1109/ACCESS.2021.3133505 |
7. |
R-IDPS: Real Time SDN-Based IDPS System for IoT Security
2022
Author(s) : Rosli Bin Salleh Source : CMC-COMPUTERS MATERIALS & CONTINUA DOI : 10.32604/cmc.2022.028285 |
8. |
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review
2022
Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-022-12010-2 |
9. |
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism
2022
Source : WIRELESS NETWORKS DOI : 10.1007/s11276-021-02885-8 |
10. |
Hybrid Metaheuristics Using Rough Sets for QoS-Aware Service Composition
2022
Source : IEEE ACCESS DOI : 10.1109/ACCESS.2022.3213705 |
11. |
A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network
2021
Source : WIRELESS NETWORKS DOI : 10.1007/s11276-021-02608-z |
12. |
A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network
2021
Source : Wireless Networks |
13. |
Stakeholders' Viewpoints toward Blockchain Integration within IoT-Based Smart Cities
2021
Author(s) : Rosli Bin Salleh,Saaidal Razalli Bin Azzuhri Source : JOURNAL OF SENSORS DOI : 10.1155/2021/4680021 |
14. |
Stakeholders’ Viewpoints toward Blockchain Integration within IoT-Based Smart Cities
2021
Source : JOURNAL OF SENSORS DOI : 10.1155/2021/4680021 |
15. |
Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey
2021
Author(s) : Rosli Bin Salleh Source : IEEE ACCESS DOI : 10.1109/ACCESS.2021.3065123 |
16. |
Enabling Reachability Across Multiple Domains Without Controller Synchronization in SDN
2021
Author(s) : Rosli Bin Salleh Source : CMC-COMPUTERS MATERIALS & CONTINUA DOI : 10.32604/cmc.2021.017394 |
17. |
SDN based Intrusion Detection System and Prevention Systems Using Manufacturer Usage Description: A Survey
2020
Author(s) : Rosli Bin Salleh Source : International Journal of Advanced Computer Science and Applications (IJACSA) |
18. |
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network
2020
Author(s) : Rosli Bin Salleh,Ismail Bin Ahmedy Source : IEEE ACCESS DOI : 10.1109/ACCESS.2020.2965206 |
19. |
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network
2020
Source : IEEE Access |
20. |
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network
2020
Source : IEEE ACCESS |
21. |
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
2019
Author(s) : Rosli Bin Salleh,Rafidah Binti Md Noor Source : PLOS ONE |
22. |
Enhanced Weight-based Clustering Algorithm to provide Reliable Delivery for VANET Safety Applications
2019
Author(s) : Rosli Bin Salleh,Rafidah Binti Md Noor Source : PLOS-ONE |
23. |
Less Give More: Evaluate and zoning Android applications
2019
Author(s) : Rosli Bin Salleh,Nor Badrul Anuar Bin Juma'at Source : MEASUREMENT |
24. |
Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey
2019
Author(s) : Rosli Bin Salleh,Rafidah Binti Md Noor Source : TELECOMMUNICATION SYSTEMS |
25. |
Time Division Multiple Access Scheduling Strategies for Emerging Vehicular Ad hoc Network Medium Access Control Protocols: A Survey
2019
Author(s) : Rosli Bin Salleh,Rafidah Binti Md Noor Source : Telecommunication Systems |
26. |
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
2019
Author(s) : Rosli Bin Salleh,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ahsiah Binti Ismail Source : FORENSIC SCIENCE INTERNATIONAL |
27. |
Bio-inspired for Features Optimization and Malware Detection
2018
Source : ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING |
28. |
Evaluation of Network Traffic Analysis Using Fuzzy C-Means Clustering Algorithm in Mobile Malware Detection
2018
Source : Advanced Science Letters DOI : 10.1166/asl.2018.10660 |
29. |
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet
2018
Author(s) : Rosli Bin Salleh Source : IET Network |
30. |
Bio-inspired for Features Optimization and Malware Detection
2018
Author(s) : Rosli Bin Salleh,Fazidah Binti Othman Source : Arabian Journal for Science and Engineering DOI : 10.1007/s13369-017-2951-y |
31. |
Bio-inspired for Features Optimization and Malware Detection
2018
Source : Arabian Journal for Science and Engineering |
32. |
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
2018
Source : IEEE Access DOI : 10.1109/access.2017.2789281 |
33. |
A multi-objective software defined network traffic measurement
2017
Author(s) : Nurul Ashikin Binti Abdullah Source : Measurement DOI : 10.1016/j.measurement.2016.10.0 |
34. |
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
2017
Source : Computers Security |
35. |
SIFT-Symmetry: A Robust Detection Method for Copy-Move Forgery with Reflection Attack
2017
Author(s) : Rosli Bin Salleh,Fazidah Binti Othman,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : Journal of Visual Communication and Image Representation DOI : 10.1016/j.jvcir.2017.04.004 |
36. |
The Evolution of Android Malware and Android Analysis Techniques
2017
Source : ACM Computing Surveys DOI : 10.1145/3017427 |
37. |
SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack
2017
Author(s) : Rosli Bin Salleh,Fazidah Binti Othman,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION |
38. |
The rise of "malware": Bibliometric analysis of malware study
2016
Source : Journal of Network and Computer Applications DOI : 10.1016/j.jnca.2016.08.022 |
39. |
Copy-move forgery detection: Survey, challenges and future directions
2016
Source : Journal of Network and Computer Applications DOI : 10.1016/j.jnca.2016.09.008 |
40. |
On the Analysis and Detection of Mobile Botnet Applications
2016
Source : Journal of Universal Computer Science |
41. |
The rise of "malware": Bibliometric analysis of malware study
2016
Author(s) : Rosli Bin Salleh,Nor Badrul Anuar Bin Juma'at Source : JOURNAL OF NETWORK AND COMPUTER APPLICATIONS DOI : 10.1016/j.jnca.2016.08.022 |
42. |
SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications
2016
Author(s) : Rosli Bin Salleh Source : PLoS ONE DOI : 10.1371/journal.pone.0150077 |
43. |
Mobile Botnet Attacks an Emerging Threat: Classification, Review and Open Issues
2015
Author(s) : Rosli Bin Salleh,Rafidah Binti Md Noor Source : Ksii Transactions on Internet and Information Systems |
44. |
Botnet detection techniques: review, future trends and issues
2014
Author(s) : Rosli Bin Salleh,Nor Badrul Anuar Bin Juma'at Source : Journal of Zhejiang University |
45. |
Electronics and Telecommunications Research Institute (ETRI)
2014
Author(s) : Rosli Bin Salleh Source : Etri Journal |
46. |
A survey of secure protocols in Mobile IPv6
2014
Author(s) : Rosli Bin Salleh Source : Journal of Network and Computer Applications |
47. |
A Survey of Secure Protocols in Mobile IPv6
2014
Author(s) : Rosli Bin Salleh Source : Journal of Network and Computer Applications. |
48. |
Secure connection in Mobile IPv6
2013
Author(s) : Rosli Bin Salleh Source : Life Science Journal (Life Sci J) |
49. |
A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection
2013
Author(s) : Rosli Bin Salleh,Nor Badrul Anuar Bin Juma'at Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
50. |
Security overview of Wireless Sensor Network
2013
Author(s) : Rosli Bin Salleh Source : Life Science Journal (Life Sci J) |
51. |
Analysis and Design of Low-Cost Bit-Serial Architectures for Motion Estimation in H.264/AVC
2013
Author(s) : Rosli Bin Salleh Source : Journal of Signal Processing and Systems |
52. |
Performance Analysis of AODV, AOMDV, DSR, DSDV Routing Protocols in Vehicular Ad Hoc Network
2013
Author(s) : Rosli Bin Salleh Source : Research Journal of Recent Sciences |
53. |
Make a Secure Connection Using Elliptic Curve Digital
Signature
2012
Author(s) : Rosli Bin Salleh |
54. |
A Survey of Algorithms and Architectures for
H.264 Sub-
Pixel Motion Estimation
2012
Author(s) : Rosli Bin Salleh |
55. |
Reducing Layer 2 Handoff Latency in WLANs using
Advanced Context Distribution
2011
Author(s) : Rosli Bin Salleh Source : International Journal of Scientific and Engineering Research (IJSER) |
56. |
Fast Handoff for 802.11 Wireless Network
2011
Author(s) : Rosli Bin Salleh Source : Communications and Network Journal |
57. |
FAST ALGORITHM ANALYSIS AND BIT-SERIAL ARCHITECTURE DESIGN FOR SUB-PIXEL MOTION ESTIMATION IN H.264
2010
Author(s) : Rosli Bin Salleh Source : Journal of Circuits Systems and Computers |
58. |
Fast Algorithm Analysis And Bit-serial Architecture
Design For Sub-pixel Motion Estimation In H.264
2010
Author(s) : Rosli Bin Salleh Source : Journal of Circuits, Systems, and Computers (JCSC) |
59. |
A Bit-Serial Multiplier Architecture for Finite Fields
Over Galois Fields
2010
Author(s) : Rosli Bin Salleh Source : JOURNAL OF COMPUTER SCIENCE |
60. |
Off-line Jawi Handwriting Recognition using
Hamming Classification
2009
Author(s) : Rosli Bin Salleh,Noorzaily Bin Mohamed Noor,Mohd Yakub @ Zulkifli Bin Mohd Yusoff,Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Emran Bin Mohd Tamil,Mashkuri Hj Yaacob,Nurulhuda Binti Abd. Ghani Source : Information Technology Journal |
61. |
Imitating K-Means to Enhance Data Selection
2009
Author(s) : Rosli Bin Salleh |
62. |
Mobile Multimedia Control Model for Fire Disaster
of City Building
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh |
63. |
Off-line Handwritten Jawi Character Recognition
Using
Histogram Normalization and Sliding Window
Approach For
Hardware Implementation
2009
Author(s) : Rosli Bin Salleh,Noorzaily Bin Mohamed Noor,Zaidi Bin Razak,Mashkuri Yaacob,Khansa Bt Zulkifli Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
64. |
Enhancing Handoff Process using IAPP with Caching
Techniques
2009
Author(s) : Rosli Bin Salleh |
65. |
A wide-range survey on Recall-Based Graphical User
Authentications algorithms based on ISO and Attack Patterns
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh Source : International Journal of Computer Science and Information Security (IJCSIS) |
66. |
Shoulder Surfing Attack in Graphical Password
Authentication
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh |
67. |
Wireless Spectrum Combination Protocol for 4G Networks
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh |
68. |
Mobile Multimedia Control Model for Fire Disaster of
City Building
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh |
69. |
OFF-LINE HANDWRITTEN JAWI CHARACTER SEGMENTATION USING HISTOGRAM NORMALIZATION AND SLIDING WINDOW APPROACH FOR HARDWARE IMPLEMENTATION
2009
Author(s) : Rosli Bin Salleh,Zaidi Bin Razak Source : Malaysian Journal of Computer Science |
70. |
Off-line Handwritten Jawi Character Recognition Using Histogram Normalization and Sliding Window Approach For Hardware Implementation
2008
Author(s) : Rosli Bin Salleh |
71. |
Off-line Handwriting Text Line Segmentation : A Review
2008
Source : IJCSNS International Journal of Computer Science and Network Security |
72. |
Off-line Handwriting Text Line Segmentation : A
Review
2008
Author(s) : Rosli Bin Salleh |
73. |
A Real-Time Line Segmentation Algorithm for An Offline Overlapped Handwritten Jawi Character Recognition Chip
2007
Author(s) : Rosli Bin Salleh |
74. |
Handoff Techniques for 4G Wireless Mobile Internet
2007
Author(s) : Rosli Bin Salleh |
75. |
Efficient Algorithm in Projective Coordinates for EEC Over GF(2n)
2007
Author(s) : Rosli Bin Salleh |
76. |
Rosli Salleh, Zaidi Razak, Darwin Caldwell and Rui Loureiro, SalFSAR: A Dual Purpose Device for Laparoscopic Training and Tele-surgery , Malaysian Journal of Computer Science, Vol. 18 No. 1, June 2005, pp. 78-92.
2005
Author(s) : Rosli Bin Salleh |
BOOK
NO | DETAILS OF BOOK |
---|---|
1. |
Buku Teks MPAV Kegunaan 2008, Sistem Sokongan Rangkaian Tingkatan 4 dan 5
2008
Author(s) : Rosli Bin Salleh |
2. |
Chapter 11, Virtual Private Networking, Selected topic In Installation of Client-Server Application.
2008
Author(s) : Rosli Bin Salleh |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
Mobile Botnet Attacks: A Thematic Taxonomy
2014
Author(s) : Rosli Bin Salleh |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
Avoiding Forwarding Loop Across Multiple Domains Without Controller Synchronization in SDN
2020
Author(s) : Rosli Bin Salleh |
2. |
An Evaluation Of Error Level Analysis In Image Forensics
2015
|
3. |
Protection of Binding Update Message in Mobile IPv6
2012
Author(s) : Rosli Bin Salleh |
4. |
Bots and Botnets: An Overview of Characteristics,
Detection and Challenges
2012
Author(s) : Rosli Bin Salleh |
5. |
A Survey on Cloud Computing Security
2012
Author(s) : Rosli Bin Salleh |
6. |
MoBots: A New Generation of Botnets on Mobile Devices
and Networks
2012
Author(s) : Rosli Bin Salleh |
7. |
Overview of Handover Latency and Resource Consumption
in Hierarchical Mobile IPv6 Protocol and GPS Approaches
2012
Author(s) : Rosli Bin Salleh |
8. |
MoBots: A New Generation of Botnets on Mobile
Devices and Networks
Networks
2012
Author(s) : Rosli Bin Salleh,Nor Badrul Anuar Bin Juma'at |
9. |
Overview of Mobile IPv6 Security
2012
Author(s) : Rosli Bin Salleh |
10. |
Overview of Security Issues in Wireless Sensor
Networks
2011
Author(s) : Rosli Bin Salleh |
11. |
A Novel Approach For Efficient Resource
Consumption In GPS-Based Mobile IPv6 Wireless LAN
2011
Author(s) : Rosli Bin Salleh |
12. |
Overview of Latest Approaches in Heterogeneous and
Mobile IPv6 Homogeneous Wireless Networks Based on
Location-Assisted Information
2011
Author(s) : Rosli Bin Salleh |
13. |
Wireless Network Security Using Elliptic Curve
Cryptography
2011
Author(s) : Rosli Bin Salleh |
14. |
A Complete Comparison on Pure and Cued Recall-Based
Graphical User Authentication Algorithm
2009
Author(s) : Rosli Bin Salleh |
15. |
Secure Smart Card Transactions using Elliptic Curve
Cryptography and Biometric
2009
Author(s) : Rosli Bin Salleh |
16. |
Elliptic Curve Cryptography: The Next Generation
Encryption Technology for Secure Data Communication
2009
Author(s) : Rosli Bin Salleh |
17. |
An Overview of Elliptic Curve Cryptography in
constrained Applications
2009
Author(s) : Rosli Bin Salleh |
18. |
Application of Elliptic Curve Cryptography: An
Overview, E-Tech 2009 Conference
2009
Author(s) : Rosli Bin Salleh |
19. |
Throughput Optimization of Unplannen Wireless Mesh
Networks Deployment Using Partitioning Hierarchical
Cluster (PHC)
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh |
20. |
The Future of Mobile Wireless Communication Networks
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh |
21. |
Multi-Network Data Path for 5G Mobile Multimedia
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh |
22. |
Recall-Based Graphical User Authentication Based On
Attacks Patterns
2009
Author(s) : Omar Bin Zakaria,Rosli Bin Salleh |
23. |
An Improved Elliptic Curve Public Key cryptography
Algorithm
2008
Author(s) : Rosli Bin Salleh |
24. |
An FPGA-Based Co-Processor For Elliptic Curve Cryptography
2008
Author(s) : Rosli Bin Salleh |
25. |
A Cost-Efficient Bit-Serial Architecture for Sub-Pixel
Motion Estimation of H.264/AVC
2008
Author(s) : Rosli Bin Salleh |
26. |
Radio Frequency Convergence Protocol for 4G Networks
2008
Author(s) : Rosli Bin Salleh |
27. |
An Algorithm and Its Architecture For Half-pixel
Variable Block Size Motion Estimation
2007
Author(s) : Rosli Bin Salleh |
28. |
Bandwidth Optimization Control Protocol for 4G Wireless
Mobile Internet
2007
Author(s) : Rosli Bin Salleh |
29. |
Study of The Formulas in Projective Coordinates for
Elliptic Curve Over GF(2n) in Cryptography
2004
Author(s) : Rosli Bin Salleh |
30. |
Proposed Bluetooth Middleware Profile For On-Location
Universal Format Announcement
2004
Author(s) : Rosli Bin Salleh |
31. |
Force Feedback Laparoscopic Handle and Grasping/Cutting
Simulator
2002
Author(s) : Rosli Bin Salleh |
32. |
Haptic Feedback for VR based Minimally Invasive
Surgical (MIS) Training
2000
Author(s) : Rosli Bin Salleh |
33. |
Haptic Feedback for VR based Minimally Invasive
Surgical (MIS) Training and Telesurgery
1999
Author(s) : Rosli Bin Salleh |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Development Of Efficient Algorithm To Improve The Crescent Moon Visibility Based On Al-rukyah Method In Malaysia And Related Android/web Based Application
Researcher(s) : Dr. Mohd Khalit Bin Othman,Dr. Shaiful Anuar Bin Abu Bakar
(Others MOHE - Top 100 (IIRG)-FNW) |
|
on going |
Intrusion Detection And Prevention System Using Software Defined Networks (sdn) In Hetereogeneous Iot Network Using Manufacturer Usage Description
Researcher(s) : Dr. Muhammad Reza Bin Z'aba
(RU Geran - Fakulti Program) |
|
end |
A Fundamental Research On Botnet Phenomenon : Detection , Response, And Mitigation
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Smart Management Of Elctrical Appliances And Energy Saving Using Internet Of Things
Researcher(s) : Prof. Dr. Abdullah Bin Gani,Associate Prof. Dr. Rosli Bin Salleh,Prof. Dr. Mohd Yamani Idna Bin Idris
(UM Community Campus-Manage by UMCARES) |
|
end |
An Intelligent Tool For Mobile Malware Detection And Responses
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Associate Prof. Dr. Rosli Bin Salleh,Dr Madihah Mohd Saudi
(MOSTI-Science Fund) |
|
end |
Mobile Sinks Selection And Navigation For Efficient Data Collection In Wireless Sensor Networks
Researcher(s) : Prof. Dr. Mohd Yamani Idna Bin Idris,Prof. Ts. Dr. Rafidah Binti Md Noor,Associate Prof. Dr. Rosli Bin Salleh
(Geran Penyelidikan Universiti Malaya (UMRG) - AFR (Frontier Science)) |
|
end |
Mobile Botnet
(Geran Penyelidikan Universiti Malaya (UMRG) - ICT) |
|
end |