GRANT(PI & MEMBERS)

89

PUBLICATIONS

111

INDEXED PUBLICATION

62

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

NATIONAL GRANTS
9
UNIVERSITY FUND
12
TOTAL

Publications

INDEXED PUBLICATION
62
NON-INDEXED PUBLICATION
15
OTHERS PUBLICATION
34
TOTAL

Supervisions

MASTER
17
PHD
32
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme)
MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract
2020
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme)
RUG OF UTM Matching Grant
2020
UTMIcon 4.0: DIANA: SECURITY AND SOCIAL ASSISTANT
RUG OF UTM UTM RA ICONIC GRANT
2020
UTMIcon 4.4: Development of a Platform for DIANA as a Protector and Educator Towards Safer Society in the Digital World
RUG OF UTM UTM RA ICONIC GRANT
2020
EYEBAITUNA: HOME-BASED NEXT GENERATION FIREWALL
RUG OF UTM Prototype Development Fund
2020
DEVELOPMENT OF HARDWARE SENSOR FOR NETWORK MONITORING AND DETECTION OF INTERNET-OF-THINGS MALWARE THREATS
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2019
UTM-TDR 5.1 (T2): An Ontology-Driven Architecture for Strategic Threat Intelligence
RUG OF UTM UTM Transdiciplinary Research Grant
2018
MRUN 5.2 : GAMIFICATION PLATFORM USER DATA AND CONTENT SECURITY USING BLOCKCHAIN TECHNOLOGY FOR UNIVERSITY 4.0
MINISTRY OF EDUCATION MALAYSIA RESEARCH UNIVERSITY NETWORK
2018
UTM-TDR 5.4 (T1) Unstructured Data Analytics for Threat Intelligence
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.2 (T2): Designing Named-Entity-Recognition Approach for Conflict Case Study
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.5 (T2): Intelligent ChatBot for South China Sea Conflict
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.3 (T1) Graph-Based Knowledge Representation for Threat Intelligence
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.0: STRATEGIC THREAT INTELLIGENCE FOR SOUTH CHINA SEA CONFLICT
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM - MRUN NETWORKING
MINISTRY OF EDUCATION Business Entity
2018
EYENOON SWITCH: INTERNET FILTERING AND MONITORING SYSTEM
RUG OF UTM Prototype Development Fund
2018
Fraudulent Websites Detection System
RUG OF UTM High Impact Research Grant
2018
TEXT STEMMER WITH NORMALIZATION TECHNIQUES FOR NOISY TEXTS IN MALAY LANGUAGE
RUG OF UTM Tier 1
2018
INTELLIGENT WEB CONTENT FILTERING ALGORITHM AND THE USAGE TREND ANALYSIS DASHBOARD FOR STREAMING DATA
RUG OF UTM Professional Development Research University
2018
Strategy Cyber Threat Intelligence
CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency
2017
Exploiting Ad-Banner for the Detection of Malvertising
RUG OF UTM Tier 1
2017
INTELLIGENT WEB CONTENT FILTERING ALGORITHM AND THE USAGE TREND ANALYSIS DASHBOARD FOR STREAMING DATA
RUG OF UTM Professional Development Research University
2017
PEMUPUKAN MINAT REMAJA TERHADAP PEMBANGUNAN APPS BERASASKAN PEMBELAJARAN
RUG OF UTM Business Entity
2016
Development of flash flood detection using distributed radio sensor network for urban areas
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2016
AN ENHANCED 2D CHAOTIC PSEUDO-RANDOM NUMBER GENERATOR FOR CRYPTOGRAPHY
RUG OF UTM Tier 2
2016
PANGKALAN DATA PROFIL BAKAT BELIA JOHOR
RUG OF UTM Institut Inovasi Strategik Johor
2016
PENGLIBATAN BELIA DI DALAM PEMBANGUNAN APPS BERKAITAN STEM
RUG OF UTM Institut Inovasi Strategik Johor
2016
Automated Prediction system for Detecting Business Scams and Frauds Websites
CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency
2016
THE DEVELOPMENT OF SWITCHED-BASED WEB CONTENT FILTERING SYSTEM AND USAGE TREND ANALYSIS DASHBOARD
RUG OF UTM Professional Development Research University
2016
Digital Lifestyle - Praxispartnership between Academic & Industry in Malaysia & Germany
DEUTSCHER AKADEMISCHER AUSTAUSCHDIENST (GERMAN ACADEMIC EXCHANGE SERVICE) Networking Grant
2016
A New Hybrid Metaheuristic Algorithm for Business Intelligence in Higher Education Sector
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
Trustworthiness Assessment Algorithm based on Temporal and Spatial Properties of Mobility Data in Ephemeral Network
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
The Development of Switch-Based Web Content Filtering System and Usage Trend Analysis Dashboard
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones.
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Hemodialysis Data Loss Mitigation and Patient Tracking During Flood Disaster
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Lightweight Encryption Technique and Ant-Based Routing Algorithm for Secure and Sustainable Smart Home
MINISTRY OF EDUCATION Networking Grant
2015
Multi-platform Framework and Middleware for Data Aggregation
RUG OF UTM Flagship
2014
Interactive Data Visualization
RUG OF UTM Flagship
2014
UNDERSTANDING BI STAKEHOLDER REQUIREMENTS
RUG OF UTM Flagship
2014
ENTERPRISE DATA MANAGEMENT FRAMEWORK FOR BUSINESS INTELLIGENT SYSTEMS
RUG OF UTM Flagship
2014
A Business Intelligence Tool Framework for Strategic Prediction in a Graduate Studies
RUG OF UTM Flagship
2014
STRATEGIC PREDICTION OF RESEARCH AND PUBLICATION PERFORMANCE IN MONITORING KAI TARGETS
RUG OF UTM Flagship
2014
A STEALTHY TECHNIQUE FOR CAPTURING MALWARE'S USER MODE API CALL SEQUENCE
RUG OF UTM Potential Academic Staff
2014
COPYRIGHT PROTECTION OF DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
COMPREHENSIVE PRIVACY-PRESERVING DATA MINING MODEL IN DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
SOCIAL IMPACT OF DIGITAL CAMPUS SECURITY INFRASTRUCTURE
RUG OF UTM Flagship-Research Group
2014
Integrated backup and Recovery System
RUG OF UTM Flagship-Research Group
2014
SECURE INFORMATION DISSEMINATION AND NOTIFICATION SYSTEM FOR DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
Hybrid Virtual Learning Platform For English Education
RUG OF UTM Flagship-COE
2014
AUTOMATED INTELLIGENT-BASED ALERT CORRELATION SYSTEM USING HYBRID METHOD
RUG OF UTM Potential Academic Staff
2014
ENHANCED MALAY WORD STEMMING ALGORITHMS AND COMMON WORD REMOVAL FOR SLANG WORDS IN MALAY ILLICIT WEB CONTENTS
RUG OF UTM Tier 1
2014
ONLINE ANOMALY DETECTION OF THE PRESENCE OF GANODERMA BONINENSE IN PALM OIL PLANTATION USING WIRELESS SENSOR
RUG OF UTM Tier 1
2014
ENHANCED DYNAMIC SKIN COLOUR DETECTION METHOD FOR STILL IMAGE BASED ON ONLINE SAMPLING APPROACH
RUG OF UTM Encouragement Grant
2014
DESIGN AND IMPLEMENTATION ENCRYPTED PATIENT DATA BY ELLIPTIC CURVE CRYPTOGRAPHY
RUG OF UTM Encouragement Grant
2014
HEALTH AWARE COMMUTING.
RUG OF UTM Flagship
2014
Adaptive Anamoly Detection Model For Wireless Sensor
POST DOCTORAL FELLOWSHIP Professional Development Research University
2013
The Development of A Real Time Illicit Image and Video Filtering System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2013
Enhancement of Elliptic Curve Cryptography and Implementation on Android Mobile Platform
MINISTRY OF EDUCATION Exploratory Research Grant Scheme
2013
A Lightweight Anomaly Detection for Wireless Sensor Networks
RUG OF UTM Tier 2
2012
Development of Parental Control System and Cyberparenting Education Awareness Portal
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2011
IMPROVING THE PERFORMANCE OF STRUCTURAL-BASED REAL-TIME ALERT CORRELATION USING MULTIPLE CLUSTERING SYSTEMS
RUG OF UTM Tier 2
2011
Development of Web Content Filtering System Based On Image Understanding Algorithm
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2010
Mobile Ad Hoc Network Hop Routing Algorithm
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2007
Friend-Assisted Secure Autonomous Mobile Ad Hoc Networks
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2007
The Integration of Textual and Image Analysis for Intelligent Web Content Filtering Technique
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2007
An Hybrid Techniques For Software Protection
UNIVERSITI TEKNOLOGI MALAYSIA Fund Without Provision
2007
A Study of Data Selection Mapping in Mobile Decision Making Using Multi-Criteria DSS Technique (Semi Structured Decision)
Short Term
2000
The Development of Cryptographic Infrastructure Using Artificial Immune System
Sciencefund
2000
The Design and Development of Artificial Immune System Architecture for Intrusion Detection System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1999
A Authentification Technique on Electronic Performance Support System (EPSS) Security in a Web-Based Environmennt
MINISTRY OF EDUCATION Short Term
1998
The Development of a Real-Time 3D Multimedia Game Engine
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1998
Design and Development of an Intelligent Security Layer for Web-Based Applications
Sciencefund
1998
The Development of Attack Response Mechanism for Intrusion Detection System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1998
Optimization of Computer Labs Usage in Schools : A Case Study of Smart -School
MINISTRY OF EDUCATION Short Term
1996
Parallel Compression System for Digital Non-Text Information (PCS)
MINISTRY OF EDUCATION Short Term
1996
Non-Text Information Compression Using Neural Network
Short Term
1996
Cryptography Techniques for Securing Non-Text Documents
Short Term
1996
An Evolutionary Intelligent Compression Strategy (ICS) for Non-Text Documents
Short Term
1996
Kad Pelbagai Perkhidmatan Smartcard
Short Term
1989
The construction of year one computer-aided software system course.
Short Term
1985

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Advanced Persistent Threat Detection: A Survey
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Web Of Science CO-AUTHOR
2021
Hate Speech And Offensive Language Detection: A New Feature Set With Filter-Embedded Combining Feature Selection
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Scopus UTM FIRST AUTHOR
2021
Hac: Model For Privacy-Preserving Outsourced Data Over Cloud
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Scopus CO-AUTHOR
2021
A Proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Web Of Science UTM FIRST AUTHOR
2021
Ransomware Anti-Analysis And Evasion Techniques: A Survey And Research Directions
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Web Of Science UTM FIRST AUTHOR
2021
Quasi-Identifier Recognition Algorithm For Privacy Preservation Of Cloud Data Based On Risk Reidentification
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
Publication In Web Of Science CO-AUTHOR
2021
Redundancy Coefficient Gradual Up-Weighting-Based Mutual Information Feature Selection Technique For Crypto-Ransomware Early Detection
FUTURE GENERATION COMPUTER SYSTEMS
Publication In Web Of Science CO-AUTHOR
2021
A Multi-Color Based Features From Facial Images For Automatic Ethnicity Identification Model
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2020
A Taxonomy And Survey Of Data Partitioning Algorithms For Big Data Distributed Systems
MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING
Book Chapter UTM FIRST AUTHOR
2020
Enhanced Text Stemmer With Noisy Text Normalization For Malay Texts
SMART TRENDS IN COMPUTING & COMMUNICATIONS
Publication In Scopus UTM FIRST AUTHOR
2020
A Pseudo Feedback-Based Annotated Tf-Idf Technique For Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation And Features Extraction
IEEE ACCESS
Publication In Web Of Science CO-AUTHOR
2020
Hybrid Solution For Privacy Preserving Data Mining On The Cloud Computing
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING: EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS
Publication In Scopus UTM FIRST AUTHOR
2020
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme For Vehicular Ad Hoc Network: A Context-Aware Approach
IEEE ACCESS
Publication In Web Of Science CO-AUTHOR
2020
Design Consideration Of Malay Text Stemmer Using Structured Approach
SMART INNOVATION, SYSTEMS & TECHNOLOGIES 2019
Publication In Scopus UTM FIRST AUTHOR
2020
Malware Behavior Profiling From Unstructured Data
11TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING & PATTERN RECOGNITION (SOCPAR 2019)
Publication In Scopus CO-AUTHOR
2020
Crypto-Ransomware Early Detection Model Using Novel Incremental Bagging With Enhanced Semi-Random Subspace Selection
FUTURE GENERATION COMPUTER SYSTEMS
Publication In Web Of Science UTM FIRST AUTHOR
2019
An Optimized Skin Texture Model Using Gray-Level Co-Occurrence Matrix
NEURAL COMPUTING AND APPLICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2019
Hybrid And Multifaceted Context-Aware Misbehavior Detection Model For Vehicular Ad Hoc Network
IEEE ACCESS
Publication In Web Of Science UTM FIRST AUTHOR
2019
Context-Aware Data-Centric Misbehaviour Detection Scheme For Vehicular Ad Hoc Networks Using Sequential Analysis Of The Temporal And Spatial Correlation Of The Consistency Between The Cooperative Awareness Messages
JOURNAL OF VEHICULAR COMMUNICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2019
Cyber-Attack Features For Detecting Cyber Threat Incidence From Online News
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE, CRC 2018
Publication In Scopus CO-AUTHOR
2019
Towards Stemming Error Reduction For Malay Texts
5TH ICCST COMPUTATIONAL SCIENCE AND TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2019
A Conceptual Scheme For Ransomware Background Knowledge Construction
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE, CRC 2018
Publication In Scopus CO-AUTHOR
2019
An Improved Dct Block Based Technique For Copy-Move Forgery Detection In Medical Images
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2018
Solving Time Complexity Issue In Copy-Move Forgery Detection Thru Pre-Processing Techniques
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2018
Ransomware Threat Success Factors, Taxonomy, And Countermeasures: A Survey And Research Directions
COMPUTERS & SECURITY
Publication In Web Of Science UTM FIRST AUTHOR
2018
A Distributed Anomaly Detection Model For Wireless Sensor Networks Based On The One-Class Principal Component Classifier
SENSOR NETWORKS
Publication In Web Of Science UTM FIRST AUTHOR
2018
Zero-Day Aware Decision Fusion-Based Model For Crypto-Ransomware Early Detection
INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING (IJIE)
Publication In Scopus UTM FIRST AUTHOR
2018
A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework
2ND INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY (IRICT 2017)
Conference Paper UTM FIRST AUTHOR
2017
Classification Of Fraud Website Using Entropy Technique
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings UTM FIRST AUTHOR
2017
Copy-Move Forgery Detection: A Survey On Time Complexity Issues And Solutions.
JOURNAL OF THEORETICAL & APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2017
Classification Of Malware Family Using Decision Tree Algorithm
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings UTM FIRST AUTHOR
2017
Gazelle: An Enhanced Random Network Coding Based Framework For Efficient P2p Live Video Streaming Over Hybrid Wmns
WIRELESS PERSONAL COMMUNICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2017
Ezzykan : Aplikasi Pengiklanan Sepusat Untuk Warga Utm
PROSIDING KOMPUTERAN UTM : INOVASI DI DALAM TEKNOLOGI DAN APLIKASI KOMPUTERAN
Proceedings UTM FIRST AUTHOR
2017
Flood Disaster Management Approachfor Tracking Hemodialysis Patient In Kelantan
PERSIDANGAN KAJIAN BENCANA BANJIR
Conference Paper CO-AUTHOR
2016
Towards Integrating Statistical Color Features For Human Skin Detection
WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, INTERNATIONAL JOURNAL OF COMPUTER, ELECTRICAL, AUTOMATION, CONTROL AND INFORMATION ENGINEERING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2016
An Enhanced Multiinterface Multichannel Algorithm For High Quality Live Video Streaming Over Hybrid Wmns
TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES
Publication In Web Of Science UTM FIRST AUTHOR
2016
A Review Of The Opinion Target Extraction Using Sequence Labeling Algorithms Based On Features Combinations
JOURNAL OF INTERNET COMPUTING AND SERVICES (JICS)
Publication In Web Of Science UTM FIRST AUTHOR
2016
Fraud Detection System: A Survey
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2016
Survey On Method Of Encryption In Cloud Computing
COMPUTER & NETWORKING PART II
Book Chapter UTM FIRST AUTHOR
2016
Word Stemming Challenges In Malay Text A Literature Review
2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICOICT 2016
Publication In Scopus UTM FIRST AUTHOR
2016
A New Tomographic Based Keypoint Descriptor Using Heuristic Genetic Algorithm
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2016
A Robust Keypoint Descriptor Based On Tomographic Image Reconstruction Using Heuristic Genetic Algorithm And Principal Component Analysis Techniques
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE
Publication In Scopus UTM FIRST AUTHOR
2016
A Survey Of Feature Extraction Techniques In Content-Based Illicit Image Detection
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2016
Enhanced Rules Application Order To Stem Affixation, Reduplication And Compounding Words In Malay Texts
KNOWLEDGE MANAGEMENT AND ACQUISITION FOR INTELLIGENT SYSTEMS
Publication In Scopus UTM FIRST AUTHOR
2016
Business Intelligence Readiness Factors For Higher Education Institution
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2016
Malay Word Stemmer To Stem Standard And Slang Word Patterns On Social Media
DATA MINING AND BIG DATA
Book Chapter UTM FIRST AUTHOR
2016
Business Intelligence Readiness Factors For Higher Education Institution
4TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEM
Conference Paper CO-AUTHOR
2015
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014
Publication In Scopus CO-AUTHOR
2015
A Hybrid Color Space For Skin Detection Using Genetic Algorithm Heuristic Search And Principal Component Analysis Technique
PLOS ONE
Publication In Web Of Science UTM FIRST AUTHOR
2015
Principal Component Analysis-Based Data Reduction Model For Wireless Sensor Networks
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING
Publication In Web Of Science CO-AUTHOR
2015
Survey On Method Of Encryption In Cloud Computing
SECURITY IN COMPUTING AND NETWORK
Book Chapter CO-AUTHOR
2015
Authentication In Mobile Cloud Computing
SECURITY IN COMPUTING & NETWORKING PART I
Book Chapter UTM FIRST AUTHOR
2015
Survey On Method Of Encryption In Cloud Computing
SECURITY IN COMPUTING & NETWORKING PART II
Book Chapter UTM FIRST AUTHOR
2015
In Memory Detection Of Windows Api Call Hooking Technique
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015
Publication In Scopus CO-AUTHOR
2015
Improved Dynamic Threshold Method For Skin Colour Detection Using Multi-Colour Space
AMERICAN JOURNAL OF APPLIED SCIENCES
Publication In Scopus UTM FIRST AUTHOR
2015
Enhancing Rough Set Theory Attributes Selection Of Kdd Cup 1999.
JOURNAL OF THEORETICAL & APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
A Business Intelligence Framework For Higher Education Institutions
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus CO-AUTHOR
2015
Business Intelligence System Adoption Theories In Smes: A Literature Review
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus CO-AUTHOR
2015
Implementation Issues Affecting The Business Intelligence Adoption In Public University
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus CO-AUTHOR
2015
A Multi-Dimensional Database Model For Research Performance Analysis
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus CO-AUTHOR
2015
Defining Generic Attributes For Ids Classification
JURNAL TEKNOLOGI (SCIENCES & ENGINEERING)
Publication In Scopus UTM FIRST AUTHOR
2015
Design Consideration For Improved Term Weighting Scheme For Pornographic Web Sites
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014 (ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING)
Publication In Scopus UTM FIRST AUTHOR
2015
Fast And Effective Bag-Of-Visual-Word Model To Pornographic Images Recognition Using The Freak Descriptor
JOURNAL OF SOFT COMPUTING AND DECISION SUPPORT SYSTEMS
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2015
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
THIRD WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES
Conference Paper CO-AUTHOR
2014
Colour Space Using Principal Component Analysis Technique For Skin Detection
2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND SOCIAL SCIENCES (ICCS-14) (RIZE, TURKEY)
Proceedings UTM FIRST AUTHOR
2014
A Colour Space For Skin Detection Using Principal Components Analysis Technique
JOURNAL OF APPLIED AND ENVIRONMENTAL BIOLOGICAL SCIENCES
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2014
Keystroke Dynamic Authentication In Mobile Cloud Computing
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS
Journal Article Non Citation-Indexed CO-AUTHOR
2014
Adaptive And Online Data Anomaly Detection For Wireless Sensor Systems
KNOWLEDGE-BASED SYSTEMS
Publication In Web Of Science UTM FIRST AUTHOR
2014
Enhancing The Detection Of Metamorphic Malware Using Call Graphs
COMPUTERS & SECURITY
Publication In Web Of Science UTM FIRST AUTHOR
2014
Authentication Method Through Keystrokes Measurement Of Mobile Users In Cloud Environment
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS
Publication In Scopus CO-AUTHOR
2014
Enhanced Rules Application Order Approach To Stem Reduplication Words In Malay Text
RECENT ADVANCES ON SOFT COMPUTING AND DATA MINING ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING
Publication In Scopus UTM FIRST AUTHOR
2014
Malware Behaviour Visualization
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING)
Publication In Scopus CO-AUTHOR
2014
Malware Behavior Image For Malware Variant Identification
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST)
Publication In Scopus CO-AUTHOR
2014
Efficient P2p Live Video Streaming Over Hybrid Wmns Using Random Network Coding
WIRELESS PERSONAL COMMUNICATIONS
Publication In Scopus UTM FIRST AUTHOR
2014
Improved Skin Detection Based On Dynamic Threshold Using Multi-Colour Space
PROCEEDINGS OF 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST)
Publication In Scopus UTM FIRST AUTHOR
2014
Islamic Web Content Filtering And Categorization On Deviant Teaching
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING
Publication In Scopus UTM FIRST AUTHOR
2014
An Adaptive And Efficient Dimension Reduction Model For Multivariate Wireless Sensor Networks Applications
APPLIED SOFT COMPUTING
Publication In Web Of Science CO-AUTHOR
2013
Advancements Of Data Anomaly Detection Research In Wireless Sensor Networks: A Survey And Open Issues
SENSORS
Publication In Web Of Science CO-AUTHOR
2013
Efficient Image Duplicated Region Detection Model Using Sequential Block Clustering
DIGITAL INVESTIGATION
Publication In Web Of Science UTM FIRST AUTHOR
2013
Matin: A Random Network Coding Based Framework For High Quality Peer-To-Peer Live Video Streaming
PLOS ONE
Publication In Web Of Science UTM FIRST AUTHOR
2013
Greenie: A Novel Hybrid Routing Protocol For Efficient Video Streaming Over Wireless Mesh Networks
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING
Publication In Web Of Science UTM FIRST AUTHOR
2013
Serious Security Weakness In Rsa Cryptosystem
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES
Journal Article Non Citation-Indexed CO-AUTHOR
2012
An Efficient Stream Cipher Algorithm For Data Encryption
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES
Journal Article Non Citation-Indexed CO-AUTHOR
2011
A Hybrid Intelligent Approach For Automated Alert Clustering And Filtering In Intrusion Alert Analysis
INT. JOURNAL OF COMPUTER THEORY AND ENGINEERING (IJCTE)
Journal Article Non Citation-Indexed CO-AUTHOR
2009
Ensemble Of One-Class Classifiers For Network Intrusion Detection System
Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
Conference Paper INDIVIDUAL AUTHOR
2008
Loss Detection Using Parameter'S Adjustment Based On Second Order Self-Similarity Statistical Model
International Symposium on Information Technology
Conference Paper INDIVIDUAL AUTHOR
2008
Loss Detection Approach Based On Esoss And Asoss Models
Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
Conference Paper INDIVIDUAL AUTHOR
2008
Towards Identifying Features Of Trust In Mobile Ad Hoc Network
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008
Conference Paper INDIVIDUAL AUTHOR
2008
Data Reduction And Ensemble Classifiers In Intrusion Detection
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008
Conference Paper INDIVIDUAL AUTHOR
2008
Data Reduction And Ensemble Classifiers In Intrusion Detection
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008
Conference Paper INDIVIDUAL AUTHOR
2008
Horizontal Loss Of Self-Similarity Analysis In Multiple-Level Sampling Structure
Advanced computer network & security
Book Chapter INDIVIDUAL AUTHOR
2008
Ensemble Of One-Class Classifiers For Improved Network Instrusion Detection System
Proceedings Of 4th Postgraduate Annual Research Seminar PARS 08
Conference Paper INDIVIDUAL AUTHOR
2008
Smooth Hilbert Space Filling Curve For Minimizing Traversal Complexity In Covering A Monitoring Area
Proceedings Of 4th Postgraduate Annual Research Seminar PARS 08
Conference Paper INDIVIDUAL AUTHOR
2008
Enhance Term Weighting Algoritm As Feature Selection Technique For Illicit Web Content Classification
Eighth International Conference on Intelligent System Design and Application
Conference Paper INDIVIDUAL AUTHOR
2008
Loss Detection Approach Based On Esoss And Asoss Models
Proceedings Of 4th Postgraduate Annual Research Seminar PARS 08
Conference Paper INDIVIDUAL AUTHOR
2008
Simulation Of Pornography Web Sites (Pws) Classification Using Principal Component Analysis With Neural Network
International Journal of Simulation System, Science and Technology
Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR
2008
Pornography Web Pages Classification With Princpal Component Analysis And Independent Component Analysis
Advanced computer network & security
Book Chapter INDIVIDUAL AUTHOR
2008
Enhance Term Weighting Algorithm As Feature Selection Technique For Illicit Web Content Classification
The Eight International Conference on Intelligent Systems Design and Applications (ISDA`08)
Conference Paper INDIVIDUAL AUTHOR
2008
Uncovering Anomaly Traffic Based On Loss Of Self-Similarity Behavior Using Second Order Statistical Model
International Journal of Computer Science and Network Security
Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR
2007
An Implementation Of Loss Detection Using Second Order Statistical Model
Jurnal Teknologi Maklumat
Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR
2007
Feature Selection Using Rough-Dpso In Anomaly Intrusion Detection
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS- ICCSA 2007, PT 1 PROCEEDING
Publication In Web Of Science CO-AUTHOR
2007
Classification Of Illicit Web Pages Using Neural Network
Jurnal Teknologi Maklumat
Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR
2007
Fast Optimization Method: The Window Size And Hurst Parameter Estimator On Self-Similar Network Traffic
Journal of Information and Optimization Sciences
Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR
2007

LOGIK PENGATURCARAAN KOMPUTER
Original Book UTM FIRST AUTHOR
2006
Qos Based Anomaly Detection Based On Self-Similar Network Traffic
4TH INTERNATIONAL WORKSHOP ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2006)
Conference Paper CO-AUTHOR
2006
Self-Boundary Analyzing Method In Self- Similar Network Traffic For Anomaly Detection
1ST INTERNATIONAL SYMPOSIUM ON BIO-INSPIRED COMPUTING (BIC'05)
Conference Paper CO-AUTHOR
2005
Normal And Anomalous Network Traffic Modeling: A Synthetic Data Generator Tool
BRUNEI INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (BICET 2005)
Conference Paper CO-AUTHOR
2005
Network Anomaly Detection On Self-Similar Network Traffic Using The Optimization And Sliding Window Methods
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (ICIS2005)
Conference Paper CO-AUTHOR
2005
Iterative Window Size Estimation On Self-Similarity Measurement For Network Traffic Anomaly Detection
INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATION SCIENCES
Journal Article Non Citation-Indexed CO-AUTHOR
2004
An Iterative Estimation Of Data Window Size For Anomaly Detection Using Self-Similar Feature In Network Traffic
1ST CONFERENCE ON TELEMATICS SYSTEM, SERVICES, AND APPLICATION 2004 (TSSA2004)
Conference Paper CO-AUTHOR
2004
File Access Permission Change Detection Using Immunological Negative Selection Approach
INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY 2002
Conference Paper CO-AUTHOR
2002

Legend : IP CATEGORY IP LEVEL

Intellectual Property Name Grant Register No. IP Level IP Category
METHOD FOR DETECTING BLURRED REGION IN HIGHLY TEXTURES IMAGE MY- 149940-A NATIONAL UTILITY INNOVATION
NKABOT 2018065829 Class 42 NATIONAL TRADEMARK
EYENOON(STYLISED) 08024410 (Trademark) NATIONAL TRADEMARK
ENHANCED MALAY WORD STEMMING METHOD NATIONAL PATENT
ENHANCED REDUPLICATION WORD STEMMING METHOD NATIONAL PATENT
ENHANCED AFFIXATION WORD STEMMING METHOD NATIONAL PATENT
STREAM CIPHER GENERATOR MY-167527-A NATIONAL PATENT
A METHOD FOR DESIGNING NONLINEAR BOOLEAN FUNCTIONS OF A CRYPTOGRAPHIC SYSTEM MY-180906-A NATIONAL PATENT
A SYSTEM FOR ELECTRONIC CARD COMPOSITION MY-174981-A NATIONAL PATENT
ART MOBILE PERSONALIZED VIDEO NAVIGATION SYSTEM NATIONAL PATENT
MULTIPLE VIDEO STREAMING COMPOSITION AND SYNCHRONIZATION METHOD NATIONAL PATENT
IMPROVED TERM-WEIGHTING SCHEME FOR ILLICIT WEB PAGE CLASSIFICATION USING NEURAL NETWORK NATIONAL PATENT
SZPROTECT : AN HYBIRD TECHNIQUE FOR SOFTWARE PROTECTION NATIONAL PATENT
HYBRID MODEL FOR PRIVACY-PRESERVING DATA MINING ON THE CLOUD COMPUTING LY2020007306 NATIONAL COPYRIGHT
BUSINESS INTELLIGENCE FRAMEWORK FOR HIGHER EDUCATION INCORPORATED WITH FEATURE SELECTION BASED ON ANT COLONY OPTIMIZATION ACO LY2016003911 NATIONAL COPYRIGHT
MULTIFACETED COLLABORATIVE MALICIOUS WEBSITES CLASSIFIER SCHEME USING HETEROGENEOUS ENSEMBLE LEARNING-BASED CLASSIFIERS NATIONAL COPYRIGHT
IOT THREAT SENSOR NATIONAL COPYRIGHT
A SECURE SEARCHABLE ENCRYPTION ALGORITHM BASED ON IND-CCA2 SECURITY NATIONAL COPYRIGHT
INDEX BASED SYMMETRIC SEARCABLE ENCRYPTION IN CLOUD STORAGE NATIONAL COPYRIGHT
AN ENHANCED BLOOM FILTER STRUCTURE WITH LOW FALSE POSITIVE RATE NATIONAL COPYRIGHT
DPCCAD-A DISTRIBUTED ANOMALY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORK NATIONAL COPYRIGHT
R_PCADR- ROBUST DATA DIMENSIONALITY REDUCTION ALGORITHM BASED ON INCREMENTAL PRINCIPAL COMPONENT ANALYSIS FOR HIERARCHICAL WIRELESS SENSOR NETWORKS NATIONAL COPYRIGHT
APCCAD- ADAPTIVE ANOMALY DETECTION ALGORITHM FOR WIRELESS SEOSNOR NETWORKS BASED ON PRINCIPAL COMPONENT CLASSIFIER NATIONAL COPYRIGHT
PCCAD- EFFICIENT ONLINE ANOMALY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS BASED ON PRINCIPAL COMPONENT CLASSIFIER NATIONAL COPYRIGHT
EYENOON : A WEB CONTENT FILTERING SYSTEM NATIONAL COPYRIGHT
SM-NILAM: SISTEM MAKLUMAT NILAM UNTUK SISTEM MAKLUMAT MURID BERSEPADU NATIONAL COPYRIGHT
SISTEM E-PERPUSTAKAAN UNTUK SISTEM MAKLUMAT MURID BERSEPADU NATIONAL COPYRIGHT
SISPEM : SISTEM PENGANUGERAHAN MURID UNTUK SISTEM MAKLUMAT MURID BERSEPADU NATIONAL COPYRIGHT
E-PICCSMS: ONLINE PUG-IN CUSTOMIZATION COMPLAINT AND SUGGESTION MANAGEMENT SYSTEM NATIONAL COPYRIGHT
SM-KOQ : SISTEM MAKLUMAT KOKURIKULUM UNTUK SISTEM MAKLUMAT MURID BERSEPADU NATIONAL COPYRIGHT
MOBILE BLUETOOTH REMOTE CONTROL NATIONAL COPYRIGHT

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
ANJUM IQBAL
DANGER THEORY METAPHOR IN ARTIFICIAL IMMUNE SYSTEM FOR SYSTEM CALL DATA
PHD GRADUATED SUPERVISOR 2006
SUBARIAH BINTI IBRAHIM
ENHANCEMENT OF EXTENDED FEISTEL NETWORK FOR SCALABE BLOCK CIPHER
PHD GRADUATED SUPERVISOR 2007
LEE ZHI SAM
ENHANCED FEATURE SELECTION METHOD FOR ILLICIT WEB CONTENT FILTERING
PHD GRADUATED SUPERVISOR 2010
ANAZIDA BINTI ZAINAL
AN ADAPTIVE INTRUSION DETECTION MODEL FOR DYNAMIC NETWORK TRAFFIC PATTERNS USING MACHINE LEARNING TECHNIQUES
PHD GRADUATED SUPERVISOR 2011
MOHD FO'AD BIN ROHANI
ENHANCED LOSS OF SELF-SIMILARITY DEFINITION USING MULTI-LEVEL SAMPLING APPROACH FOR NETWORK-BASED ANOMALY DETECTION
PHD GRADUATED SUPERVISOR 2012
MAHEYZAH BINTI MD. SIRAT @ MD. SIRAJ
HYBRID OF STRUCTURAL-CAUSAL AND STATISTICAL MODEL FOR INTRUSION ALERT CORRELATION
PHD GRADUATED SUPERVISOR 2012
MURAD ABDO RASSAM QASEM
AN ANOMALY DETECTION MODEL USING CANDID COVARIANCE-FREE INCREMENTAL PRINCIPAL COMPONENT ANALYSIS FOR WIRELESS SENSOR NETWORKS
PHD GRADUATED SUPERVISOR 2013
RIAZ AHMAD QAMAR
ENHANCED WINNOW KEY RECONCILIATION FOR BENNETT-BRASSARD 84 QUANTUM KEY DISTRIBUTION PROTOCOL
PHD GRADUATED SUPERVISOR 2013
MAZNAH BINTI KAMAT
CURVATURE HILBERT MOBILITY FOR RENDEZVOUS-BASED DATA GATHERING IN WIRELESS SENSOR NETWORKS
PHD GRADUATED CO-SUPERVISOR 2013
SYED ZAINUDEEN BIN MOHD SHAID
A VISUALLY-VERIFIABLE MALWARE CLASSIFICATION FRAMEWORK USING MALWARE BEHAVIOR IMAGE
PHD GRADUATED SUPERVISOR 2013
AMMAR AHMED ELTAEB ELHADI ELAMIN
ENHANCED APPLICATION PROGRAMMING INTERFACE CALL GRAPH ARCHITECTURE FOR MALWARE DETECTION
PHD GRADUATED SUPERVISOR 2013
MOHAMMAD AKBARPOUR SEKEH
ENHANCED COPY-PASTE IMAGE FORGERY DETECTION BASED ON ARCHIMEDEAN SPIRAL AND COARSE-TO-FINE APPROACH
PHD GRADUATED SUPERVISOR 2013
BEHRANG BAREKATAIN
A SCHEME FOR EFFICIENT PEER-TO-PEER LIVE VIDEO STREAMING OVER WIRELESS MESH NETWORKS
PHD GRADUATED SUPERVISOR 2014
MAHDI MAKTABDAR OGHAZ
ENHANCED SKIN DETECTION METHOD BASED ON NEW COLOUR SPACE AND TEXTURE FEATURES
PHD GRADUATED SUPERVISOR 2016
MOHAMED AHMED MOHAMED ALI
ENHANCED MALWARE DETECTION MODEL BASED ON INNATE SELF-NON-SELF AND DANGER THEORY
PHD GRADUATED SUPERVISOR 2016
SEYEDHADI YAGHOUBYAN
ILLICIT IMAGE DETECTION BASED ON ENHANCED BAG OF VISUAL WORD MODEL
PHD GRADUATED SUPERVISOR 2017
HAMID HANTOOSH JEBUR AL SUDANI
ENHANCED ROUGH SET FEATURE SELECTION USING INFORMATION GAIN AND A NEW REDUCT ALGORITHM
PHD GRADUATED SUPERVISOR 2017
MOHD. ZAMRI BIN OSMAN
ENHANCED ETHNICITY IDENTIFICATION MODEL BASED ON HYBRID OPTIMAL SKIN COLOUR AND TEXTURE FEATURES
PHD GRADUATED SUPERVISOR 2017
AISHA ABDALLAH ZAIN ALABDEEN AHMED
ADAPTIVE ANOMALY BASED FRAUD DETECTION MODEL FOR HANDLING CONCEPT DRIFT IN SHORT-TERM PROFILE
PHD GRADUATED SUPERVISOR 2018
MOHAMAD NIZAM BIN KASSIM
ENHANCED TEXT STEMMER FOR STANDARD AND NON-STANDARD WORD PATTERNS IN MALAY TEXTS
PHD GRADUATED SUPERVISOR 2019
BANDER ALI SALEH AL-RIMY
AN ENSEMBLE-BASED ANOMALY-BEHAVIOURAL CRYPTO-RANSOMWARE PRE-ENCRYPTION DETECTION MODEL
PHD GRADUATED SUPERVISOR 2019
SITI FADZLUN BINTI MD SALLEH
ENHANCED COPY-MOVE IMAGE FORGERY DETECTION MODEL BASED ON HYBRID FEATURE EXTRACTION WITH PARALLEL PROCESSING SCHEME
PHD GRADUATED CO-SUPERVISOR 2023
SAIF HAMEED ABBOOD AL-WAELI
INTERPRETABLE CLASSIFICATION FRAMEWORK FOR DIABETIC RETINOPATHY
PHD GRADUATED CO-SUPERVISOR 2023
PATHMENANTHAN A/L RAMAKRISHNA

MASTER ON GOING SUPERVISOR
WOO LAI LENG

MASTER GRADUATED SUPERVISOR 2004
KANAGARAJ A/L KRISHNA

MASTER FAIL AND DISMISSAL SUPERVISOR
MOHD NIZAM BIN OMAR

MASTER ON GOING SUPERVISOR
GOH KIA ENG
SELF-ORGANIZING MAP AND MULTILAYER PERCEPTRON FOR MALAY SPEECH RECOGNITION
MASTER ON GOING SUPERVISOR
USAMA THARWAT FARAG ELHAGARI

MASTER GRADUATED SUPERVISOR 2007
MAJID BAKHTIARI

MASTER GRADUATED SUPERVISOR 2008
AZRI BIN ABDUL MAJID

MASTER ON GOING SUPERVISOR
BADRISHAM BIN AHMAD
PENGKOMPUTRAN BERINSPIRASIKAN BIOLOGI DALAM KRIPTANALISIS (BIOLOGICAL INSPIRED COMPUTING IN CRYPTANALYSIS)
MASTER GRADUATED SUPERVISOR 2009
NORMALIA BINTI SAMIAN
EFFICIENT SECURITY MECHANISMS FOR DISTANCE VECTOR ROUTING PROTOCOL
MASTER GRADUATED SUPERVISOR 2010
AOS ANAS MULAHUWAISH

MASTER GRADUATED SUPERVISOR 2010
MAHNOUSH BABAEIZADEH

MASTER GRADUATED SUPERVISOR 2013
MAJID NATEGHIZAD

MASTER GRADUATED SUPERVISOR 2013
BWAMBALE RASHID RAMADHAN
HYBRID FUZZY DECISION MODEL: A CASE STUDY OF WEB DEVELOPMENT PLATFORMS SELECTION AND EVALUATION
MASTER GRADUATED SUPERVISOR 2013
MOHAMAD NIZAM BIN KASSIM
ENHANCED TEXT STEMMER WITH STRUCTURED ORDER RULES FOR STANDARD AND NON-STANDARD WORD PATTERNS
MASTER GRADUATED SUPERVISOR 2014
ABDULRAHEEM HASSANAT OYIZA

MASTER GRADUATED SUPERVISOR 2018