• 446 Citations
  • 11 h-Index
20072019
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Rosilah Hassan is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 8 Similar Profiles
Mobile ad hoc networks Engineering & Materials Science
Routing protocols Engineering & Materials Science
Internet protocols Engineering & Materials Science
Network protocols Engineering & Materials Science
Internet Engineering & Materials Science
Routers Engineering & Materials Science
Quality of service Engineering & Materials Science
Throughput Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2007 2019

  • 446 Citations
  • 11 h-Index
  • 53 Article
  • 43 Conference contribution

Impacts evaluation of DoS attacks over IPv6 neighbor discovery protocol

Ahmed, A. S., Hassan, R., Othman, N. E., Ahmad, N. I. & Kenish, Y., 1 Jan 2019, In : Journal of Computer Science. 15, 5, p. 702-727 26 p.

Research output: Contribution to journalArticle

Open Access
Internet protocols
Network protocols
Windows operating system
Denial-of-service attack
Computer operating systems

Introduction to the special issue on opportunistic network and its security challenges

Hassan, R., Ahmad, K. A. B. & Ahmad, K., 1 Jan 2019, In : Scalable Computing. 20, 1, p. iii-v

Research output: Contribution to journalArticle

The improvement of the protection for 6LoWPAN in IoT through non-causal hash function scheme

Hassan, R., Nori, S. S., Othman, N. E. & Inn, A., 18 Jan 2019, ECTI-CON 2018 - 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology. Institute of Electrical and Electronics Engineers Inc., p. 600-603 4 p. 8619909. (ECTI-CON 2018 - 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Hash functions
Hash Function
Fragment
Network protocols

A fuzzy-based buffer split algorithm for buffer attack detection in internet of things

Abdulnabi, M. M., Hassan, R., Othman, N. E. & Ya`Acob, A., 15 Sep 2018, In : Journal of Theoretical and Applied Information Technology. 96, 17, p. 5625-5634 10 p.

Research output: Contribution to journalArticle

Internet of Things
Buffer
Attack
Remote control
Remote Control
wireless technology
Wireless Technology
Zigbee
Testbeds
communication (human)