GRANT(PI & MEMBERS)
89
PUBLICATIONS
111
INDEXED PUBLICATION
62
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
NATIONAL GRANTS
9
UNIVERSITY FUND
12
TOTAL
Publications
INDEXED PUBLICATION
62
NON-INDEXED PUBLICATION
15
OTHERS PUBLICATION
34
TOTAL
Supervisions
MASTER
17
PHD
32
TOTAL
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme) MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract |
2020 |
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme) RUG OF UTM Matching Grant |
2020 |
UTMIcon 4.0: DIANA: SECURITY AND SOCIAL ASSISTANT RUG OF UTM UTM RA ICONIC GRANT |
2020 |
UTMIcon 4.4: Development of a Platform for DIANA as a Protector and Educator Towards Safer Society in the Digital World RUG OF UTM UTM RA ICONIC GRANT |
2020 |
EYEBAITUNA: HOME-BASED NEXT GENERATION FIREWALL RUG OF UTM Prototype Development Fund |
2020 |
DEVELOPMENT OF HARDWARE SENSOR FOR NETWORK MONITORING AND DETECTION OF INTERNET-OF-THINGS MALWARE THREATS MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2019 |
UTM-TDR 5.1 (T2): An Ontology-Driven Architecture for Strategic Threat Intelligence RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
MRUN 5.2 : GAMIFICATION PLATFORM USER DATA AND CONTENT SECURITY USING BLOCKCHAIN TECHNOLOGY FOR UNIVERSITY 4.0 MINISTRY OF EDUCATION MALAYSIA RESEARCH UNIVERSITY NETWORK |
2018 |
UTM-TDR 5.4 (T1) Unstructured Data Analytics for Threat Intelligence RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.2 (T2): Designing Named-Entity-Recognition Approach for Conflict Case Study RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.5 (T2): Intelligent ChatBot for South China Sea Conflict RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.3 (T1) Graph-Based Knowledge Representation for Threat Intelligence RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.0: STRATEGIC THREAT INTELLIGENCE FOR SOUTH CHINA SEA CONFLICT RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM - MRUN NETWORKING MINISTRY OF EDUCATION Business Entity |
2018 |
EYENOON SWITCH: INTERNET FILTERING AND MONITORING SYSTEM RUG OF UTM Prototype Development Fund |
2018 |
Fraudulent Websites Detection System RUG OF UTM High Impact Research Grant |
2018 |
TEXT STEMMER WITH NORMALIZATION TECHNIQUES FOR NOISY TEXTS IN MALAY LANGUAGE RUG OF UTM Tier 1 |
2018 |
INTELLIGENT WEB CONTENT FILTERING ALGORITHM AND THE USAGE TREND ANALYSIS DASHBOARD FOR STREAMING DATA RUG OF UTM Professional Development Research University |
2018 |
Strategy Cyber Threat Intelligence CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency |
2017 |
Exploiting Ad-Banner for the Detection of Malvertising RUG OF UTM Tier 1 |
2017 |
INTELLIGENT WEB CONTENT FILTERING ALGORITHM AND THE USAGE TREND ANALYSIS DASHBOARD FOR STREAMING DATA RUG OF UTM Professional Development Research University |
2017 |
PEMUPUKAN MINAT REMAJA TERHADAP PEMBANGUNAN APPS BERASASKAN PEMBELAJARAN RUG OF UTM Business Entity |
2016 |
Development of flash flood detection using distributed radio sensor network for urban areas MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2016 |
AN ENHANCED 2D CHAOTIC PSEUDO-RANDOM NUMBER GENERATOR FOR CRYPTOGRAPHY RUG OF UTM Tier 2 |
2016 |
PANGKALAN DATA PROFIL BAKAT BELIA JOHOR RUG OF UTM Institut Inovasi Strategik Johor |
2016 |
PENGLIBATAN BELIA DI DALAM PEMBANGUNAN APPS BERKAITAN STEM RUG OF UTM Institut Inovasi Strategik Johor |
2016 |
Automated Prediction system for Detecting Business Scams and Frauds Websites CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency |
2016 |
THE DEVELOPMENT OF SWITCHED-BASED WEB CONTENT FILTERING SYSTEM AND USAGE TREND ANALYSIS DASHBOARD RUG OF UTM Professional Development Research University |
2016 |
Digital Lifestyle - Praxispartnership between Academic & Industry in Malaysia & Germany DEUTSCHER AKADEMISCHER AUSTAUSCHDIENST (GERMAN ACADEMIC EXCHANGE SERVICE) Networking Grant |
2016 |
A New Hybrid Metaheuristic Algorithm for Business Intelligence in Higher Education Sector MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2015 |
Trustworthiness Assessment Algorithm based on Temporal and Spatial Properties of Mobility Data in Ephemeral Network MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2015 |
The Development of Switch-Based Web Content Filtering System and Usage Trend Analysis Dashboard MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones. MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Hemodialysis Data Loss Mitigation and Patient Tracking During Flood Disaster MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Lightweight Encryption Technique and Ant-Based Routing Algorithm for Secure and Sustainable Smart Home MINISTRY OF EDUCATION Networking Grant |
2015 |
Multi-platform Framework and Middleware for Data Aggregation RUG OF UTM Flagship |
2014 |
Interactive Data Visualization RUG OF UTM Flagship |
2014 |
UNDERSTANDING BI STAKEHOLDER REQUIREMENTS RUG OF UTM Flagship |
2014 |
ENTERPRISE DATA MANAGEMENT FRAMEWORK FOR BUSINESS INTELLIGENT SYSTEMS RUG OF UTM Flagship |
2014 |
A Business Intelligence Tool Framework for Strategic Prediction in a Graduate Studies RUG OF UTM Flagship |
2014 |
STRATEGIC PREDICTION OF RESEARCH AND PUBLICATION PERFORMANCE IN MONITORING KAI TARGETS RUG OF UTM Flagship |
2014 |
A STEALTHY TECHNIQUE FOR CAPTURING MALWARE'S USER MODE API CALL SEQUENCE RUG OF UTM Potential Academic Staff |
2014 |
COPYRIGHT PROTECTION OF DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
COMPREHENSIVE PRIVACY-PRESERVING DATA MINING MODEL IN DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
SOCIAL IMPACT OF DIGITAL CAMPUS SECURITY INFRASTRUCTURE RUG OF UTM Flagship-Research Group |
2014 |
Integrated backup and Recovery System RUG OF UTM Flagship-Research Group |
2014 |
SECURE INFORMATION DISSEMINATION AND NOTIFICATION SYSTEM FOR DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
Hybrid Virtual Learning Platform For English Education RUG OF UTM Flagship-COE |
2014 |
AUTOMATED INTELLIGENT-BASED ALERT CORRELATION SYSTEM USING HYBRID METHOD RUG OF UTM Potential Academic Staff |
2014 |
ENHANCED MALAY WORD STEMMING ALGORITHMS AND COMMON WORD REMOVAL FOR SLANG WORDS IN MALAY ILLICIT WEB CONTENTS RUG OF UTM Tier 1 |
2014 |
ONLINE ANOMALY DETECTION OF THE PRESENCE OF GANODERMA BONINENSE IN PALM OIL PLANTATION USING WIRELESS SENSOR RUG OF UTM Tier 1 |
2014 |
ENHANCED DYNAMIC SKIN COLOUR DETECTION METHOD FOR STILL IMAGE BASED ON ONLINE SAMPLING APPROACH RUG OF UTM Encouragement Grant |
2014 |
DESIGN AND IMPLEMENTATION ENCRYPTED PATIENT DATA BY ELLIPTIC CURVE CRYPTOGRAPHY RUG OF UTM Encouragement Grant |
2014 |
HEALTH AWARE COMMUTING. RUG OF UTM Flagship |
2014 |
Adaptive Anamoly Detection Model For Wireless Sensor POST DOCTORAL FELLOWSHIP Professional Development Research University |
2013 |
The Development of A Real Time Illicit Image and Video Filtering System MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2013 |
Enhancement of Elliptic Curve Cryptography and Implementation on Android Mobile Platform MINISTRY OF EDUCATION Exploratory Research Grant Scheme |
2013 |
A Lightweight Anomaly Detection for Wireless Sensor Networks RUG OF UTM Tier 2 |
2012 |
Development of Parental Control System and Cyberparenting Education Awareness Portal MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2011 |
IMPROVING THE PERFORMANCE OF STRUCTURAL-BASED REAL-TIME ALERT CORRELATION USING MULTIPLE CLUSTERING SYSTEMS RUG OF UTM Tier 2 |
2011 |
Development of Web Content Filtering System Based On Image Understanding Algorithm MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2010 |
Mobile Ad Hoc Network Hop Routing Algorithm MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2007 |
Friend-Assisted Secure Autonomous Mobile Ad Hoc Networks MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2007 |
The Integration of Textual and Image Analysis for Intelligent Web Content Filtering Technique MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2007 |
An Hybrid Techniques For Software Protection UNIVERSITI TEKNOLOGI MALAYSIA Fund Without Provision |
2007 |
A Study of Data Selection Mapping in Mobile Decision Making Using Multi-Criteria DSS Technique (Semi Structured Decision) Short Term |
2000 |
The Development of Cryptographic Infrastructure Using Artificial Immune System Sciencefund |
2000 |
The Design and Development of Artificial Immune System Architecture for Intrusion Detection System MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
1999 |
A Authentification Technique on Electronic Performance Support System (EPSS) Security in a Web-Based Environmennt MINISTRY OF EDUCATION Short Term |
1998 |
The Development of a Real-Time 3D Multimedia Game Engine MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
1998 |
Design and Development of an Intelligent Security Layer for Web-Based Applications Sciencefund |
1998 |
The Development of Attack Response Mechanism for Intrusion Detection System MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
1998 |
Optimization of Computer Labs Usage in Schools : A Case Study of Smart -School MINISTRY OF EDUCATION Short Term |
1996 |
Parallel Compression System for Digital Non-Text Information (PCS) MINISTRY OF EDUCATION Short Term |
1996 |
Non-Text Information Compression Using Neural Network Short Term |
1996 |
Cryptography Techniques for Securing Non-Text Documents Short Term |
1996 |
An Evolutionary Intelligent Compression Strategy (ICS) for Non-Text Documents Short Term |
1996 |
Kad Pelbagai Perkhidmatan Smartcard Short Term |
1989 |
The construction of year one computer-aided software system course. Short Term |
1985 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
Advanced Persistent Threat Detection: A Survey
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Web Of Science CO-AUTHOR |
2021 |
Hate Speech And Offensive Language Detection: A New Feature Set With Filter-Embedded Combining Feature Selection
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Scopus UTM FIRST AUTHOR |
2021 |
Hac: Model For Privacy-Preserving Outsourced Data Over Cloud
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Scopus CO-AUTHOR |
2021 |
A Proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Ransomware Anti-Analysis And Evasion Techniques: A Survey And Research Directions
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Quasi-Identifier Recognition Algorithm For Privacy Preservation Of Cloud Data Based On Risk Reidentification
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Publication In Web Of Science CO-AUTHOR |
2021 |
Redundancy Coefficient Gradual Up-Weighting-Based Mutual Information Feature Selection Technique For Crypto-Ransomware Early Detection
FUTURE GENERATION COMPUTER SYSTEMS Publication In Web Of Science CO-AUTHOR |
2021 |
A Multi-Color Based Features From Facial Images For Automatic
Ethnicity Identification Model
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2020 |
A Taxonomy And Survey Of Data Partitioning Algorithms For Big Data Distributed Systems
MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING Book Chapter UTM FIRST AUTHOR |
2020 |
Enhanced Text Stemmer With Noisy Text Normalization For Malay Texts
SMART TRENDS IN COMPUTING & COMMUNICATIONS Publication In Scopus UTM FIRST AUTHOR |
2020 |
A Pseudo Feedback-Based Annotated Tf-Idf Technique For Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation And Features Extraction
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2020 |
Hybrid Solution For Privacy Preserving Data Mining On The Cloud Computing
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING: EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS Publication In Scopus UTM FIRST AUTHOR |
2020 |
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme For Vehicular Ad Hoc Network: A Context-Aware Approach
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2020 |
Design Consideration Of Malay Text Stemmer Using Structured Approach
SMART INNOVATION, SYSTEMS & TECHNOLOGIES 2019 Publication In Scopus UTM FIRST AUTHOR |
2020 |
Malware Behavior Profiling From Unstructured Data
11TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING & PATTERN RECOGNITION (SOCPAR 2019) Publication In Scopus CO-AUTHOR |
2020 |
Crypto-Ransomware Early Detection Model Using Novel Incremental Bagging With Enhanced Semi-Random Subspace Selection
FUTURE GENERATION COMPUTER SYSTEMS Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
An Optimized Skin Texture Model Using Gray-Level Co-Occurrence Matrix
NEURAL COMPUTING AND APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
Hybrid And Multifaceted Context-Aware Misbehavior Detection Model For Vehicular Ad Hoc Network
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
Context-Aware Data-Centric Misbehaviour Detection Scheme For
Vehicular Ad Hoc Networks Using Sequential Analysis Of The Temporal
And Spatial Correlation Of The Consistency Between The Cooperative
Awareness Messages
JOURNAL OF VEHICULAR COMMUNICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
Cyber-Attack Features For Detecting Cyber Threat Incidence From Online News
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE, CRC 2018 Publication In Scopus CO-AUTHOR |
2019 |
Towards Stemming Error Reduction For Malay Texts
5TH ICCST COMPUTATIONAL SCIENCE AND TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2019 |
A Conceptual Scheme For Ransomware Background Knowledge Construction
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE, CRC 2018 Publication In Scopus CO-AUTHOR |
2019 |
An Improved Dct Block Based Technique For Copy-Move Forgery Detection In Medical Images
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2018 |
Solving Time Complexity Issue In Copy-Move Forgery Detection Thru Pre-Processing Techniques
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2018 |
Ransomware Threat Success Factors, Taxonomy, And Countermeasures: A Survey And Research Directions
COMPUTERS & SECURITY Publication In Web Of Science UTM FIRST AUTHOR |
2018 |
A Distributed Anomaly Detection Model For Wireless Sensor Networks Based On The One-Class Principal Component Classifier
SENSOR NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2018 |
Zero-Day Aware Decision Fusion-Based Model For Crypto-Ransomware Early Detection
INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING (IJIE) Publication In Scopus UTM FIRST AUTHOR |
2018 |
A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework
2ND INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY (IRICT 2017) Conference Paper UTM FIRST AUTHOR |
2017 |
Classification Of Fraud Website Using Entropy Technique
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings UTM FIRST AUTHOR |
2017 |
Copy-Move Forgery Detection: A Survey On Time Complexity Issues And Solutions.
JOURNAL OF THEORETICAL & APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2017 |
Classification Of Malware Family Using Decision Tree Algorithm
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings UTM FIRST AUTHOR |
2017 |
Gazelle: An Enhanced Random Network Coding Based Framework For Efficient P2p Live Video Streaming Over Hybrid Wmns
WIRELESS PERSONAL COMMUNICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Ezzykan : Aplikasi Pengiklanan Sepusat Untuk Warga Utm
PROSIDING KOMPUTERAN UTM : INOVASI DI DALAM TEKNOLOGI DAN APLIKASI KOMPUTERAN Proceedings UTM FIRST AUTHOR |
2017 |
Flood Disaster Management Approachfor Tracking Hemodialysis Patient In Kelantan
PERSIDANGAN KAJIAN BENCANA BANJIR Conference Paper CO-AUTHOR |
2016 |
Towards Integrating Statistical Color Features For Human Skin Detection
WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, INTERNATIONAL JOURNAL OF COMPUTER, ELECTRICAL, AUTOMATION, CONTROL AND INFORMATION ENGINEERING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2016 |
An Enhanced Multiinterface Multichannel Algorithm For High Quality Live Video
Streaming Over Hybrid Wmns
TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
A Review Of The Opinion Target Extraction Using Sequence Labeling Algorithms Based On Features Combinations
JOURNAL OF INTERNET COMPUTING AND SERVICES (JICS) Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
Fraud Detection System: A Survey
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
Survey On Method Of Encryption In Cloud Computing
COMPUTER & NETWORKING PART II Book Chapter UTM FIRST AUTHOR |
2016 |
Word Stemming Challenges In Malay Text A Literature Review
2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICOICT 2016 Publication In Scopus UTM FIRST AUTHOR |
2016 |
A New Tomographic Based Keypoint Descriptor Using Heuristic Genetic Algorithm
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2016 |
A Robust Keypoint Descriptor Based On Tomographic Image Reconstruction Using Heuristic Genetic Algorithm And Principal Component Analysis Techniques
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE Publication In Scopus UTM FIRST AUTHOR |
2016 |
A Survey Of Feature Extraction Techniques In Content-Based Illicit Image Detection
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2016 |
Enhanced Rules Application Order To Stem Affixation, Reduplication And Compounding Words In Malay Texts
KNOWLEDGE MANAGEMENT AND ACQUISITION FOR INTELLIGENT SYSTEMS Publication In Scopus UTM FIRST AUTHOR |
2016 |
Business Intelligence Readiness Factors For Higher Education Institution
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2016 |
Malay Word Stemmer To Stem Standard And Slang Word Patterns On Social Media
DATA MINING AND BIG DATA Book Chapter UTM FIRST AUTHOR |
2016 |
Business Intelligence Readiness Factors For Higher Education Institution
4TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEM Conference Paper CO-AUTHOR |
2015 |
Selection Of Soil Features For Detection Of Ganoderma
Using Rough Set Theory
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014 Publication In Scopus CO-AUTHOR |
2015 |
A Hybrid Color Space For Skin Detection Using Genetic Algorithm Heuristic Search And Principal Component Analysis Technique
PLOS ONE Publication In Web Of Science UTM FIRST AUTHOR |
2015 |
Principal Component Analysis-Based Data Reduction Model For Wireless Sensor Networks
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING Publication In Web Of Science CO-AUTHOR |
2015 |
Survey On Method Of Encryption In Cloud Computing
SECURITY IN COMPUTING AND NETWORK Book Chapter CO-AUTHOR |
2015 |
Authentication In Mobile Cloud Computing
SECURITY IN COMPUTING & NETWORKING PART I Book Chapter UTM FIRST AUTHOR |
2015 |
Survey On Method Of Encryption In Cloud Computing
SECURITY IN COMPUTING & NETWORKING PART II Book Chapter UTM FIRST AUTHOR |
2015 |
In Memory Detection Of Windows Api Call Hooking Technique
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015 Publication In Scopus CO-AUTHOR |
2015 |
Improved Dynamic Threshold Method For Skin Colour Detection Using Multi-Colour Space
AMERICAN JOURNAL OF APPLIED SCIENCES Publication In Scopus UTM FIRST AUTHOR |
2015 |
Enhancing Rough Set Theory Attributes Selection Of Kdd Cup 1999.
JOURNAL OF THEORETICAL & APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
A Business Intelligence Framework For Higher Education Institutions
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2015 |
Business Intelligence System Adoption Theories In Smes: A Literature Review
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2015 |
Implementation Issues Affecting The Business Intelligence Adoption In Public University
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2015 |
A Multi-Dimensional Database Model For Research Performance Analysis
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2015 |
Defining Generic Attributes For Ids Classification
JURNAL TEKNOLOGI (SCIENCES & ENGINEERING) Publication In Scopus UTM FIRST AUTHOR |
2015 |
Design Consideration For Improved Term Weighting Scheme For Pornographic Web Sites
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014 (ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING) Publication In Scopus UTM FIRST AUTHOR |
2015 |
Fast And Effective Bag-Of-Visual-Word Model To Pornographic Images Recognition Using The Freak Descriptor
JOURNAL OF SOFT COMPUTING AND DECISION SUPPORT SYSTEMS Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2015 |
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
THIRD WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES Conference Paper CO-AUTHOR |
2014 |
Colour Space Using Principal Component Analysis Technique For Skin Detection
2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND SOCIAL SCIENCES (ICCS-14) (RIZE, TURKEY) Proceedings UTM FIRST AUTHOR |
2014 |
A Colour Space For Skin Detection Using Principal Components Analysis Technique
JOURNAL OF APPLIED AND ENVIRONMENTAL BIOLOGICAL SCIENCES Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2014 |
Keystroke Dynamic Authentication In Mobile Cloud
Computing
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS Journal Article Non Citation-Indexed CO-AUTHOR |
2014 |
Adaptive And Online Data Anomaly Detection For Wireless Sensor Systems
KNOWLEDGE-BASED SYSTEMS Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Enhancing The Detection Of Metamorphic Malware Using Call Graphs
COMPUTERS & SECURITY Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Authentication Method Through Keystrokes Measurement Of Mobile Users In Cloud Environment
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS Publication In Scopus CO-AUTHOR |
2014 |
Enhanced Rules Application Order Approach To Stem Reduplication Words In Malay Text
RECENT ADVANCES ON SOFT COMPUTING AND DATA MINING ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus UTM FIRST AUTHOR |
2014 |
Malware Behaviour Visualization
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING) Publication In Scopus CO-AUTHOR |
2014 |
Malware Behavior Image For
Malware Variant Identification
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST) Publication In Scopus CO-AUTHOR |
2014 |
Efficient P2p Live Video Streaming Over Hybrid Wmns Using Random Network Coding
WIRELESS PERSONAL COMMUNICATIONS Publication In Scopus UTM FIRST AUTHOR |
2014 |
Improved Skin Detection Based On Dynamic Threshold Using Multi-Colour Space
PROCEEDINGS OF 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST) Publication In Scopus UTM FIRST AUTHOR |
2014 |
Islamic Web Content Filtering And Categorization On Deviant Teaching
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus UTM FIRST AUTHOR |
2014 |
An Adaptive And Efficient Dimension Reduction Model For Multivariate Wireless Sensor Networks Applications
APPLIED SOFT COMPUTING Publication In Web Of Science CO-AUTHOR |
2013 |
Advancements Of Data Anomaly Detection Research In Wireless Sensor Networks: A Survey And Open Issues
SENSORS Publication In Web Of Science CO-AUTHOR |
2013 |
Efficient Image Duplicated Region Detection Model Using Sequential Block Clustering
DIGITAL INVESTIGATION Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
Matin: A Random Network Coding Based Framework For High Quality Peer-To-Peer Live Video Streaming
PLOS ONE Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
Greenie: A Novel Hybrid Routing Protocol For Efficient Video Streaming Over Wireless Mesh Networks
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
Serious Security Weakness In Rsa Cryptosystem
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES Journal Article Non Citation-Indexed CO-AUTHOR |
2012 |
An Efficient Stream Cipher Algorithm For Data Encryption
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES Journal Article Non Citation-Indexed CO-AUTHOR |
2011 |
A Hybrid Intelligent Approach For Automated Alert Clustering And Filtering In Intrusion Alert Analysis
INT. JOURNAL OF COMPUTER THEORY AND ENGINEERING (IJCTE) Journal Article Non Citation-Indexed CO-AUTHOR |
2009 |
Ensemble Of One-Class Classifiers For Network Intrusion Detection System
Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Loss Detection Using Parameter'S Adjustment Based On Second Order Self-Similarity Statistical Model
International Symposium on Information Technology Conference Paper INDIVIDUAL AUTHOR |
2008 |
Loss Detection Approach Based On Esoss And Asoss Models
Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Towards Identifying Features Of Trust In Mobile Ad Hoc Network
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Data Reduction And Ensemble Classifiers In Intrusion Detection
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Data Reduction And Ensemble Classifiers In Intrusion Detection
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Horizontal Loss Of Self-Similarity Analysis In Multiple-Level Sampling Structure
Advanced computer network & security Book Chapter INDIVIDUAL AUTHOR |
2008 |
Ensemble Of One-Class Classifiers For Improved Network Instrusion Detection System
Proceedings Of 4th Postgraduate Annual Research Seminar PARS 08 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Smooth Hilbert Space Filling Curve For Minimizing Traversal Complexity In Covering A Monitoring Area
Proceedings Of 4th Postgraduate Annual Research Seminar PARS 08 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Enhance Term Weighting Algoritm As Feature Selection Technique For Illicit Web Content Classification
Eighth International Conference on Intelligent System Design and Application Conference Paper INDIVIDUAL AUTHOR |
2008 |
Loss Detection Approach Based On Esoss And Asoss Models
Proceedings Of 4th Postgraduate Annual Research Seminar PARS 08 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Simulation Of Pornography Web Sites (Pws) Classification Using Principal Component Analysis With Neural Network
International Journal of Simulation System, Science and Technology Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2008 |
Pornography Web Pages Classification With Princpal Component Analysis And Independent Component Analysis
Advanced computer network & security Book Chapter INDIVIDUAL AUTHOR |
2008 |
Enhance Term Weighting Algorithm As Feature Selection Technique For Illicit Web Content Classification
The Eight International Conference on Intelligent Systems Design and Applications (ISDA`08) Conference Paper INDIVIDUAL AUTHOR |
2008 |
Uncovering Anomaly Traffic Based On Loss Of Self-Similarity Behavior Using Second Order Statistical Model
International Journal of Computer Science and Network Security Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2007 |
An Implementation Of Loss Detection Using Second Order Statistical Model
Jurnal Teknologi Maklumat Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2007 |
Feature Selection Using Rough-Dpso In Anomaly Intrusion Detection
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS- ICCSA 2007, PT 1 PROCEEDING Publication In Web Of Science CO-AUTHOR |
2007 |
Classification Of Illicit Web Pages Using Neural Network
Jurnal Teknologi Maklumat Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2007 |
Fast Optimization Method: The Window Size And Hurst Parameter Estimator On Self-Similar Network Traffic
Journal of Information and Optimization Sciences Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2007 |
LOGIK PENGATURCARAAN KOMPUTER Original Book UTM FIRST AUTHOR |
2006 |
Qos Based Anomaly Detection Based On Self-Similar Network Traffic
4TH INTERNATIONAL WORKSHOP ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2006) Conference Paper CO-AUTHOR |
2006 |
Self-Boundary Analyzing Method In Self- Similar Network Traffic For Anomaly Detection
1ST INTERNATIONAL SYMPOSIUM ON BIO-INSPIRED COMPUTING (BIC'05) Conference Paper CO-AUTHOR |
2005 |
Normal And Anomalous Network Traffic Modeling: A Synthetic Data Generator Tool
BRUNEI INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (BICET 2005) Conference Paper CO-AUTHOR |
2005 |
Network Anomaly Detection On Self-Similar Network Traffic Using The Optimization And Sliding Window Methods
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (ICIS2005) Conference Paper CO-AUTHOR |
2005 |
Iterative Window Size Estimation On Self-Similarity Measurement For Network Traffic Anomaly Detection
INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATION SCIENCES Journal Article Non Citation-Indexed CO-AUTHOR |
2004 |
An Iterative Estimation Of Data Window Size For Anomaly Detection Using Self-Similar Feature In Network Traffic
1ST CONFERENCE ON TELEMATICS SYSTEM, SERVICES, AND APPLICATION 2004 (TSSA2004) Conference Paper CO-AUTHOR |
2004 |
File Access Permission Change Detection Using Immunological Negative Selection Approach
INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY 2002 Conference Paper CO-AUTHOR |
2002 |
Legend : IP CATEGORY IP LEVEL
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
ANJUM IQBAL DANGER THEORY METAPHOR IN ARTIFICIAL IMMUNE SYSTEM FOR SYSTEM CALL DATA PHD GRADUATED SUPERVISOR 2006 |
SUBARIAH BINTI IBRAHIM ENHANCEMENT OF EXTENDED FEISTEL NETWORK FOR SCALABE BLOCK CIPHER PHD GRADUATED SUPERVISOR 2007 |
LEE ZHI SAM ENHANCED FEATURE SELECTION METHOD FOR ILLICIT WEB CONTENT FILTERING PHD GRADUATED SUPERVISOR 2010 |
ANAZIDA BINTI ZAINAL AN ADAPTIVE INTRUSION DETECTION MODEL FOR DYNAMIC NETWORK TRAFFIC PATTERNS USING MACHINE LEARNING TECHNIQUES PHD GRADUATED SUPERVISOR 2011 |
MOHD FO'AD BIN ROHANI ENHANCED LOSS OF SELF-SIMILARITY DEFINITION USING MULTI-LEVEL SAMPLING APPROACH FOR NETWORK-BASED ANOMALY DETECTION PHD GRADUATED SUPERVISOR 2012 |
MAHEYZAH BINTI MD. SIRAT @ MD. SIRAJ HYBRID OF STRUCTURAL-CAUSAL AND STATISTICAL MODEL FOR INTRUSION ALERT CORRELATION PHD GRADUATED SUPERVISOR 2012 |
MURAD ABDO RASSAM QASEM AN ANOMALY DETECTION MODEL USING CANDID COVARIANCE-FREE INCREMENTAL PRINCIPAL COMPONENT ANALYSIS FOR WIRELESS SENSOR NETWORKS PHD GRADUATED SUPERVISOR 2013 |
RIAZ AHMAD QAMAR ENHANCED WINNOW KEY RECONCILIATION FOR BENNETT-BRASSARD 84 QUANTUM KEY DISTRIBUTION PROTOCOL PHD GRADUATED SUPERVISOR 2013 |
MAZNAH BINTI KAMAT CURVATURE HILBERT MOBILITY FOR RENDEZVOUS-BASED DATA GATHERING IN WIRELESS SENSOR NETWORKS PHD GRADUATED CO-SUPERVISOR 2013 |
SYED ZAINUDEEN BIN MOHD SHAID A VISUALLY-VERIFIABLE MALWARE CLASSIFICATION FRAMEWORK USING MALWARE BEHAVIOR IMAGE PHD GRADUATED SUPERVISOR 2013 |
AMMAR AHMED ELTAEB ELHADI ELAMIN ENHANCED APPLICATION PROGRAMMING INTERFACE CALL GRAPH ARCHITECTURE FOR MALWARE DETECTION PHD GRADUATED SUPERVISOR 2013 |
MOHAMMAD AKBARPOUR SEKEH ENHANCED COPY-PASTE IMAGE FORGERY DETECTION BASED ON ARCHIMEDEAN SPIRAL AND COARSE-TO-FINE APPROACH PHD GRADUATED SUPERVISOR 2013 |
BEHRANG BAREKATAIN A SCHEME FOR EFFICIENT PEER-TO-PEER LIVE VIDEO STREAMING OVER WIRELESS MESH NETWORKS PHD GRADUATED SUPERVISOR 2014 |
MAHDI MAKTABDAR OGHAZ ENHANCED SKIN DETECTION METHOD BASED ON NEW COLOUR SPACE AND TEXTURE FEATURES PHD GRADUATED SUPERVISOR 2016 |
MOHAMED AHMED MOHAMED ALI ENHANCED MALWARE DETECTION MODEL BASED ON INNATE SELF-NON-SELF AND DANGER THEORY PHD GRADUATED SUPERVISOR 2016 |
SEYEDHADI YAGHOUBYAN ILLICIT IMAGE DETECTION BASED ON ENHANCED BAG OF VISUAL WORD MODEL PHD GRADUATED SUPERVISOR 2017 |
HAMID HANTOOSH JEBUR AL SUDANI ENHANCED ROUGH SET FEATURE SELECTION USING INFORMATION GAIN AND A NEW REDUCT ALGORITHM PHD GRADUATED SUPERVISOR 2017 |
MOHD. ZAMRI BIN OSMAN ENHANCED ETHNICITY IDENTIFICATION MODEL BASED ON HYBRID OPTIMAL SKIN COLOUR AND TEXTURE FEATURES PHD GRADUATED SUPERVISOR 2017 |
AISHA ABDALLAH ZAIN ALABDEEN AHMED ADAPTIVE ANOMALY BASED FRAUD DETECTION MODEL FOR HANDLING CONCEPT DRIFT IN SHORT-TERM PROFILE PHD GRADUATED SUPERVISOR 2018 |
MOHAMAD NIZAM BIN KASSIM ENHANCED TEXT STEMMER FOR STANDARD AND NON-STANDARD WORD PATTERNS IN MALAY TEXTS PHD GRADUATED SUPERVISOR 2019 |
BANDER ALI SALEH AL-RIMY AN ENSEMBLE-BASED ANOMALY-BEHAVIOURAL CRYPTO-RANSOMWARE PRE-ENCRYPTION DETECTION MODEL PHD GRADUATED SUPERVISOR 2019 |
SITI FADZLUN BINTI MD SALLEH ENHANCED COPY-MOVE IMAGE FORGERY DETECTION MODEL BASED ON HYBRID FEATURE EXTRACTION WITH PARALLEL PROCESSING SCHEME PHD GRADUATED CO-SUPERVISOR 2023 |
SAIF HAMEED ABBOOD AL-WAELI INTERPRETABLE CLASSIFICATION FRAMEWORK FOR DIABETIC RETINOPATHY PHD GRADUATED CO-SUPERVISOR 2023 |
PATHMENANTHAN A/L RAMAKRISHNA MASTER ON GOING SUPERVISOR |
WOO LAI LENG MASTER GRADUATED SUPERVISOR 2004 |
KANAGARAJ A/L KRISHNA MASTER FAIL AND DISMISSAL SUPERVISOR |
MOHD NIZAM BIN OMAR MASTER ON GOING SUPERVISOR |
GOH KIA ENG SELF-ORGANIZING MAP AND MULTILAYER PERCEPTRON FOR MALAY SPEECH RECOGNITION MASTER ON GOING SUPERVISOR |
USAMA THARWAT FARAG ELHAGARI MASTER GRADUATED SUPERVISOR 2007 |
MAJID BAKHTIARI MASTER GRADUATED SUPERVISOR 2008 |
AZRI BIN ABDUL MAJID MASTER ON GOING SUPERVISOR |
BADRISHAM BIN AHMAD PENGKOMPUTRAN BERINSPIRASIKAN BIOLOGI DALAM KRIPTANALISIS (BIOLOGICAL INSPIRED COMPUTING IN CRYPTANALYSIS) MASTER GRADUATED SUPERVISOR 2009 |
NORMALIA BINTI SAMIAN EFFICIENT SECURITY MECHANISMS FOR DISTANCE VECTOR ROUTING PROTOCOL MASTER GRADUATED SUPERVISOR 2010 |
AOS ANAS MULAHUWAISH MASTER GRADUATED SUPERVISOR 2010 |
MAHNOUSH BABAEIZADEH MASTER GRADUATED SUPERVISOR 2013 |
MAJID NATEGHIZAD MASTER GRADUATED SUPERVISOR 2013 |
BWAMBALE RASHID RAMADHAN HYBRID FUZZY DECISION MODEL: A CASE STUDY OF WEB DEVELOPMENT PLATFORMS SELECTION AND EVALUATION MASTER GRADUATED SUPERVISOR 2013 |
MOHAMAD NIZAM BIN KASSIM ENHANCED TEXT STEMMER WITH STRUCTURED ORDER RULES FOR STANDARD AND NON-STANDARD WORD PATTERNS MASTER GRADUATED SUPERVISOR 2014 |
ABDULRAHEEM HASSANAT OYIZA MASTER GRADUATED SUPERVISOR 2018 |