Personal information

Activities

Employment (1)

Dhofar University: Salalah, OM

Employment
Source: Self-asserted source
Abdulaziz Aborujilah

Works (15)

COVID-19 Tracking Applications Acceptance among General Populace: An Overview in Malaysia

Sustainability
2023-02 | Journal article | Author
Contributors: Mahmoud Al-shami; Rawad Abdulghafor; Abdulaziz Aborujilah; Abubakar Yagoub; Sherzod Turaev; Mohammed A. H. Ali
Source: check_circle
Multidisciplinary Digital Publishing Institute

A new cloud based supervisory control and data acquisition implementation to enhance the level of security using testbed

Journal of Computer Science
2014 | Journal article
EID:

2-s2.0-84894531051

Contributors: Shahzad, A.; Musa, S.; Aborujilah, A.; Irfan, M.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

A performance approach: SCADA system implementation within cloud computing environment

Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013
2014 | Conference paper
EID:

2-s2.0-84904193084

Contributors: Shahzad, A.A.; Musa, S.; Aborujilah, A.; Irfan, M.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

A review: Industrial Control System (ICS) and their secuity issues

American Journal of Applied Sciences
2014 | Journal article
EID:

2-s2.0-84903317624

Contributors: Shahzad, A.; Musa, S.; Aborujilah, A.; Irfan, M.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Detecting TCP SYN based flooding attacks by analyzing CPU and network resources performance

Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014
2014 | Conference paper
EID:

2-s2.0-84946691555

Contributors: Aborujilah, A.; Ismail, M.N.; Musa, S.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Flooding based DoS attack feature selection using remove correlated attributes algorithm

Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013
2014 | Conference paper
EID:

2-s2.0-84904213706

Contributors: Aborujilah, A.H.S.; Musa, S.; Shahzad, A.A.; Alsharafi, A.; Nazri, M.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Industrial Control Systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption

Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014
2014 | Conference paper
EID:

2-s2.0-84899744737

Contributors: Shahzad, A.; Musa, S.; Irfan, M.; Aborujilah, A.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Organizational factors in the adoption of cloud computing in E-Learning

Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014
2014 | Conference paper
EID:

2-s2.0-84946685582

Contributors: Mokhtar, S.A.; Ali, S.H.S.; Al-Sharafi, A.; Aborujilah, A.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Secure cryptography testbed implementation for SCADA protocols security

Proceedings - 2013 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013
2014 | Conference paper
EID:

2-s2.0-84904169621

Contributors: Shahzad, A.A.; Musa, S.; Aborujilah, A.; Irfan, M.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

The SCADA review: System components, architecture, protocols and future security trends

American Journal of Applied Sciences
2014 | Journal article
EID:

2-s2.0-84903579235

Contributors: Shahzad, A.; Musa, S.; Aborujilah, A.; Irfan, M.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

The security survey and anaylsis on supervisory control and data acquisition communication

Journal of Computer Science
2014 | Journal article
EID:

2-s2.0-84905264703

Contributors: Shahzad, A.; Musa, S.; Aborujilah, A.; Irfan, M.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Cloud computing in academic institutions

Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013
2013 | Conference paper
EID:

2-s2.0-84875870589

Contributors: Mokhtar, S.A.; Ali, S.H.S.; Al-Sharafi, A.; Aborujilah, A.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach

Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013
2013 | Conference paper
EID:

2-s2.0-84875838637

Contributors: Ismail, M.N.; Aborujilah, A.; Musa, S.; Shahzad, A.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security

Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013
2013 | Conference paper
EID:

2-s2.0-84875838095

Contributors: Musa, S.; Shahzad, A.; Aborujilah, A.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier

Simulation base implementation for placement of security services in real time environment

Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013
2013 | Conference paper
EID:

2-s2.0-84875849240

Contributors: Musa, S.; Shahzad, A.; Aborujilah, A.
Source: Self-asserted source
Abdulaziz Aborujilah via Scopus - Elsevier