Name
Affiliation
Papers
NUR IZURA UDZIR
Department of Computer Science, University of York, York YO10 5DD, UK
71
Collaborators
Citations 
PageRank 
86
164
28.44
Referers 
Referees 
References 
360
1353
767
Search Limit
1001000
Title
Citations
PageRank
Year
Efficient Region-Based Skyline Computation for a Group of Users00.342022
A Continuous Region-Based Skyline Computation for a Group of Mobile Users.00.342022
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data00.342022
A Detailed Description On Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework00.342019
Efficient Skyline Processing Algorithm over Dynamic and Incomplete Database.00.342018
Missing Values Estimation For Skylines In Incomplete Database00.342018
A Framework for Processing Skyline Queries for a Group of Mobile Users.00.342018
Processing skyline queries in incomplete distributed databases.20.392017
State of the Art in Biometric Key Binding and Key Generation Schemes.00.342017
A Secure And Privacy Preserving Iris Biometric Authentication Scheme With Matrix Transformation00.342016
Performance-Aware Trust-Based Access Control for Protecting Sensitive Attributes.00.342016
An Evaluation on KNN-SVM Algorithm for Detection and Prediction of DDoS Attack.20.392016
A Formal Calculus for International Relations Computation and Evaluation.00.342016
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.00.342016
A refined filter for UHAD to improve anomaly detection.10.352016
A Hybrid Scheme for Face Template Protection00.342016
A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation.00.342015
A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating.00.342015
Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation30.402015
An Overview of Media Streams Caching in Peer-to-Peer Systems.00.342014
Intelligent Cooperative Least Recently Used Web Caching Policy Based On J48 Classifier00.342014
Packet Header Anomaly Detection Using Statistical Analysis30.392014
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers00.342014
WINDOWS WEB PROXY CACHING SIMULATION: A TOOL FOR SIMULATING WEB PROXY CACHING UNDER WINDOWS OPERATING SYSTEMS10.362014
XACML Policy Inconsistency Analysis and Resolution.00.342014
INTRUSION DETECTION SYSTEM IN SECURE SHELL TRAFFIC IN CLOUD ENVIRONMENT20.462014
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks50.452014
An Intra-domain Mobility Handling Scheme Across All-IP Wireless Networks00.342012
Generating Pareto-Optimal Offers in Bilateral Automated Negotiation with One-Side Uncertain Importance Weights.00.342012
Analytical studies and experimental examines for flooding-based search algorithms30.392012
A Compact Bit String Accessibility Map for Secure XML Query Processing.20.352012
Finest authorizing member of common criteria certification.20.702012
An alert fusion model inspired by artificial immune system10.352012
Towards secure model for SCADA systems.40.482012
STITCH-256: A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION.00.342012
Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks.150.612012
Energy-efficient intrusion detection in Wireless Sensor Network00.342012
Active warden as the main hindrance for steganography information retrieval.20.402012
An encoding scheme based on fractional number for querying and updating XML data100.502012
A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database.00.342012
Label Size Increment of Bit String Based Labeling Scheme in Dynamic XML Updating.20.362011
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment.00.342011
Evaluating user-centered privacy model (UPM) in pervasive computing systems00.342011
File Integrity Monitor Scheduling Based on File Security Level Classification.20.382011
Investigation of bypassing malware defences and malware detections.80.662011
Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating.30.372011
Adaptable Decentralized Service Oriented Architecture100.662011
A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems10.352011
A Framework for Checking and Ranking Integrity Constraints in a Distributed Database.00.342011
Performance Evaluation of Preference Evaluation Techniques.00.342011
  • 1
  • 2