GRANT(PI & MEMBERS)
81
PUBLICATIONS
137
INDEXED PUBLICATION
101
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
NATIONAL GRANTS
6
UNIVERSITY FUND
12
TOTAL
Publications
INDEXED PUBLICATION
101
NON-INDEXED PUBLICATION
12
OTHERS PUBLICATION
23
TOTAL
Supervisions
MASTER
26
PHD
45
TOTAL
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
Fined Tuned Language Models (LLM) for Financial Crime News Summarization using Retrieval Augmented Generation RUG OF UTM Potential Academic Staff |
2024 |
F4+ 4.5.2: Psychosocial challenges and supports for B40 orphaned and adopted adolescents transitioning to adulthood in Malaysia RUG OF UTM Geran Penyelidikan Hi-Tech(F4) |
2024 |
Advanced Framework for Fraud Detection in Financial Transactions through the Integration of Ensemble Learning-Enhanced Temporal Analysis and Unsupervised Machine Learning-Based Behavioral Profiling RUG OF UTM UTM Encouragement Research |
2024 |
F4+ 3.3: Integrating XAI for Automated Diagnosis and Generative AI for Smart Prescription for Cardiovascular Diseases RUG OF UTM Geran Penyelidikan Hi-Tech(F4) |
2024 |
F4+ 3.0: Human Digital Twin for Al-Driven Treatments of Circulatory System Diseases RUG OF UTM Geran Penyelidikan Hi-Tech(F4) |
2024 |
PENYELIDIKAN KANDUNGAN KURIKULUM, PEMETAAN KOMPETENSI DAN PENILAIAN KOMPETENSI BAGI KAJIAN SEMULA PROGRAM CERTIFIED FINANCIAL INVESTGATOR PROGRAM (CFIP) Pusat Pencegahan Jenayah Kewangan Nasional (NFCC) Government Agency Grant |
2024 |
NFCC 1.0 : Development of Three Modules of Learning Materials and Configuring the Learning Management System for the Certified Financial Investigator Program (CFIP) Pusat Pencegahan Jenayah Kewangan Nasional (NFCC) Government Agency Grant |
2024 |
NFCC 1.1 :Development of Learning Module Guidebook, Learning Module Slides and Question Bank (3 Modules) Pusat Pencegahan Jenayah Kewangan Nasional (NFCC) Government Agency Grant |
2024 |
Tanjung Langsat Port Security System Phase 2 TLP TERMINAL SDN BHD Contract Research DTD |
2023 |
UTM-TRG/2 1.2: Robust Security Control and Monitoring for Internet of Security and Surveillance Things (IoSST) PEJABAT TIMBALAN NAIB CANSELOR (PENYELIDIKAN & INOVASI) Translational Research@Campus |
2023 |
F4 3.3: Edge Artificial Intelligence for Suspicious Human Activity Recognition RUG OF UTM Geran Penyelidikan Hi-Tech(F4) |
2022 |
Novel Generative and Joint Learning Classification Model Based on Deep Neural Network Approach in Service Chatbot MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2022 |
METAMODEL-BASED FRAMEWORK IN GOVERNING ONLINE SOCIAL NETWORKS FORENSIC INVESTIGATION CRITICAL PROCESSES MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2022 |
A New Irregular Non-Gaussian Adaptive Dempster-Shafer-Based Kalman Filter Algorithm for Fake News Detection MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2021 |
A NARRATIVE ENGAGEMENT FRAMEWORK ON MALAYSIAN HIGHER EDUCATION IN THE DIGITAL SPACE MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2021 |
An Improved Knight's Tour - Jaya Algorithm for Robust Image Steganography. MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2021 |
KKP_SATELIT_5: Research Excellence Consortium in IoT Security MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan |
2021 |
KKP_2_Training : Malaysia Big Data Research Excellence Consortium (BiDaREC) MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan |
2021 |
KKP_2_Networking : Malaysia Big Data Research Excellence Consortium (BiDaREC) MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan |
2021 |
KKP_2_Project : Malaysia Big Data Research Excellence Consortium (BiDaREC) MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan |
2021 |
KKP_2_Program : Malaysia Big Data Research Excellence Consortium (BiDaREC) MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan |
2021 |
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme) MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract |
2020 |
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme) RUG OF UTM Matching Grant |
2020 |
A New Framework for DataOps Implementation in Organizations for Improving Key Performance Indications RUG OF UTM Industry-International Incentive Grant |
2020 |
USING DATA-DRIVEN DECISION MAKING (DDDM) TO IMPROVE ANNUAL PROGRAMME ASSESSMENT REPORT (APAR) FOR UTM RUG OF UTM UTM Encouragement Research |
2020 |
AN ENHANCED GREEDY-BASED CAT SWARM OPTIMIZATION FOR DYNAMIC TASK SCHEDULING IN CLOUD COMPUTING SYSTEMS RUG OF UTM UTM Encouragement Research |
2020 |
A NEW AGILITY HYBRID MODEL FOR SECURED IOT-BASED HEALTHCARE PLATFORM. RUG OF UTM UTM Encouragement Research |
2020 |
UTMIcon 4.0: DIANA: SECURITY AND SOCIAL ASSISTANT RUG OF UTM UTM RA ICONIC GRANT |
2020 |
UTMIcon 3.3 : DEVELOPMENT OF A ROBUST COMMUNICATION SYSTEM FOR MULTIROTOR UNMANNED AERIAL SYSTEM (mUAS) RUG OF UTM UTM RA ICONIC GRANT |
2020 |
UTMIcon 4.4: Development of a Platform for DIANA as a Protector and Educator Towards Safer Society in the Digital World RUG OF UTM UTM RA ICONIC GRANT |
2020 |
UTMIcon 4.3: Development of Intervention Content and Well-Being Psychometric Tests for Measuring the Severity of Security and Social Threat RUG OF UTM UTM RA ICONIC GRANT |
2020 |
UTMIcon 4.2 - Development of an Intelligence Brain (Engine) to Perform Security and Social Threat Profiling and Assessments RUG OF UTM UTM RA ICONIC GRANT |
2020 |
COVID19 PRESCRIPTIVE ACTION AND PREDICTION TOOL RUG OF UTM UTM R&D Fund |
2020 |
LEADERSHIP PROFILING AND TALENT PREDICTIVE ANALYTICS FOR AKADEMIK KEPIMPINAN PENDIDIKAN TINGGI (AKEPT) AKADEMI KEPIMPINAN PENDIDIKAN TINGGI (AKEPT) Non Goverment Agency |
2020 |
SYNERGISTIC APPROACH TO ENHANCE MONITORING AND RECOGNITION PERFORMANCE OF DEVELOPING SHEWHART CONTROL CHART PATTERNS RUG OF UTM UTM Fundamental Research |
2020 |
BIG DATA TALENT ANALYTICS FOR PREDICTIVE BEHAVIORAL LEADERSHIP RUG OF UTM UTM High Impact Research |
2020 |
DEVELOPMENT OF HARDWARE SENSOR FOR NETWORK MONITORING AND DETECTION OF INTERNET-OF-THINGS MALWARE THREATS MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2019 |
UTM-TDR 5.0: STRATEGIC THREAT INTELLIGENCE FOR SOUTH CHINA SEA CONFLICT RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.2 (T2): Designing Named-Entity-Recognition Approach for Conflict Case Study RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.5 (T2): Intelligent ChatBot for South China Sea Conflict RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.3 (T1) Graph-Based Knowledge Representation for Threat Intelligence RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.4 (T1) Unstructured Data Analytics for Threat Intelligence RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
EYENOON SWITCH: INTERNET FILTERING AND MONITORING SYSTEM RUG OF UTM Prototype Development Fund |
2018 |
Fraudulent Websites Detection System RUG OF UTM High Impact Research Grant |
2018 |
TABOT - INTELLIGENT RECOMMENDATION SYSTEM CHATBOT USING META-LEARNING ENSEMBLE OF SOCIAL CONTEXT REGULARIZATION AND EMOTION SPACE SENTIMENT ANAYSIS HYBRID MODEL RUG OF UTM Tier 1 |
2018 |
ISLAMIC LEADERSHIP PRINCIPLES AND ITS APPLICABILITY IN TALENT MANAGEMENT USING FUZZY GRAPH APPROACH: GOVERNMENT LINKED COMPANIES IN JOHOR RUG OF UTM Tier 1 |
2018 |
TEXT STEMMER WITH NORMALIZATION TECHNIQUES FOR NOISY TEXTS IN MALAY LANGUAGE RUG OF UTM Tier 1 |
2018 |
INTELLIGENT WEB CONTENT FILTERING ALGORITHM AND THE USAGE TREND ANALYSIS DASHBOARD FOR STREAMING DATA RUG OF UTM Professional Development Research University |
2018 |
Strategy Cyber Threat Intelligence CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency |
2017 |
Joint Device Discovery Modeling for 5G Device to Device Multi Cell Communication MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2017 |
Exploiting Ad-Banner for the Detection of Malvertising RUG OF UTM Tier 1 |
2017 |
INTELLIGENT ROUTING ALGORITHM FOR DEVICE TO DEVICE COMMUNICATION IN 5G RUG OF UTM Tier 1 |
2017 |
INTELLIGENT WEB CONTENT FILTERING ALGORITHM AND THE USAGE TREND ANALYSIS DASHBOARD FOR STREAMING DATA RUG OF UTM Professional Development Research University |
2017 |
AN ENHANCED 2D CHAOTIC PSEUDO-RANDOM NUMBER GENERATOR FOR CRYPTOGRAPHY RUG OF UTM Tier 2 |
2016 |
NEW FEATURE EXTRACTION APPROACH FOR HATE-CRIME ASPECT-BASED SENTIMENT ANALYSIS USING ORDINAL AND FREQUENCY-BASED INTEGRATION METHODS MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2016 |
PROFILING OF FOREIGN WORKERS IN PENGERANG RUG OF UTM Institut Inovasi Strategik Johor |
2016 |
Automated Prediction system for Detecting Business Scams and Frauds Websites CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency |
2016 |
Trustworthiness Assessment Algorithm based on Temporal and Spatial Properties of Mobility Data in Ephemeral Network MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2015 |
The Development of Switch-Based Web Content Filtering System and Usage Trend Analysis Dashboard MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones. MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Interactive Data Visualization RUG OF UTM Flagship |
2014 |
PEMBANGUNAN PERISIAN TAFSIR AL-QURAN BERTEMAKAN FLORA DAN FAUNA RUG OF UTM Professional Development Research University |
2014 |
COPYRIGHT PROTECTION OF DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
ONLINE ANOMALY DETECTION OF THE PRESENCE OF GANODERMA BONINENSE IN PALM OIL PLANTATION USING WIRELESS SENSOR RUG OF UTM Tier 1 |
2014 |
HEALTH AWARE COMMUTING. RUG OF UTM Flagship |
2014 |
ENHANCED MALAY WORD STEMMING ALGORITHMS AND COMMON WORD REMOVAL FOR SLANG WORDS IN MALAY ILLICIT WEB CONTENTS RUG OF UTM Tier 1 |
2014 |
Enhancement of Elliptic Curve Cryptography and Implementation on Android Mobile Platform MINISTRY OF EDUCATION Exploratory Research Grant Scheme |
2013 |
The Development of A Real Time Illicit Image and Video Filtering System MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2013 |
A Lightweight Anomaly Detection for Wireless Sensor Networks RUG OF UTM Tier 2 |
2012 |
Improved pattern recognition algorithm for imbalanced and incomplete manufacturing process data streams RUG OF UTM Tier 2 |
2012 |
Identification of Attacks/Misuse Associated with Email through Email Header Forensic RUG OF UTM Tier 2 |
2012 |
FUZZY BASED DETECTION OF SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK RUG OF UTM Tier 2 |
2011 |
Efficient Data Forwarding for Data Collection from Sensor Field RUG OF UTM Tier 2 |
2011 |
Ubiquitous Database in Mobile Healthcare MINISTRY OF EDUCATION Short Term |
1998 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
Joint Intent Detection And Slot Filling With Syntactic And Semantic Features Using Multichannel Cnn-Bilstm
PEERJ COMPUTER SCIENCE Publication In Web Of Science CO-AUTHOR |
2024 |
Annual Programme Assessment
Report Online System
NEW ACADEMIA LEARNING INNOVATION 2023 CO-AUTHOR |
2023 |
Annual Programme Assessment Report (Apar) Online System
NEW ACADEMIA LEARNING INNOVATION NALI 2023 PROCEEDING Proceedings CO-AUTHOR |
2023 |
Dynamic Extraction Of Initial Behavior For Evasive Malware
Detection
MATHEMATICS Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
Review Of Smart Home Privacy-Protecting Strategies From A Wireless Eavesdropping Attack
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES Publication In Scopus UTM FIRST AUTHOR |
2023 |
A Systematic Review Of Multi Perspectives On Human Cybersecurity Behavior
TECHNOLOGY IN SOCIETY Publication In Web Of Science CO-AUTHOR |
2023 |
An Effective Attack Scenario Construction Model Based
On Identification Of Attack Steps And Stages
INNTERNATIONAL JOURNAL OF INFORMATION SECURITY Publication In Web Of Science CO-AUTHOR |
2023 |
A Kullback-Liebler Divergence-Based Representation Algorithm For Malware Detection
PEERJ COMPUTER SCIENCE Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
A Semisupervised Concept Drift Adaptation Via Prototype-Based Manifold Regularization Approach With Knowledge Transfer
MATHEMATICS Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
Prototype Regularized Manifold Regularization Technique For Semi-Supervised Online Extreme Learning Machine
SENSORS Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
Ransomware Detection Using The Dynamic Analysis And Machine Learning: A Survey And Research Directions
APPLIED SCIENCES-BASEL Publication In Web Of Science CO-AUTHOR |
2022 |
Dynamic Scheduling Of Heterogeneous Resources Across Mobile Edge-Cloud Continuum Using Fruit Fly-Based Simulated Annealing Optimization Scheme
NEURAL COMPUTING & APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
A Convolutional Neural Network Model For Credit Card Fraud Detection
2022 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ITS APPLICATIONS, ICODSA 2022 Publication In Scopus UTM FIRST AUTHOR |
2022 |
Malware Detection Issues, Challenges, And Future Directions: A Survey
APPLIED SCIENCES-BASEL Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
Adiba Big Data Adoption Framework: Accelerating Big Data Revolution 5.0
PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, TECHNOLOGY AND APPLICATIONS (DATA) Publication In Web Of Science CO-AUTHOR |
2022 |
Smart Home Privacy Protection Methods Against A Passive Wireless Snooping Side-Channel Attack
SENSORS Publication In Web Of Science CORRESPONDING AUTHOR |
2022 |
Cyber-Attack Prediction Based On Network Intrusion Detection Systems For Alert Correlation Techniques: A Survey
SENSORS Publication In Web Of Science CO-AUTHOR |
2022 |
Leach-Cr: Energy Saving Hierarchical Network Protocol Based On Low-Energy Adaptive Clustering Hierarchy For Wireless Sensor Networks
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Advanced Persistent Threat Detection: A Survey
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
News Event Prediction Using Causality Approach On South China Sea Conflict
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Analysis Of Metaheuristics Featureselection Algorithm For Classification
ADVANCES IN INTELLIGENT SYSTEMS & COMPUTING Publication In Scopus CO-AUTHOR |
2021 |
Fraudulent E-Commerce Website Detection Model Using Html,
Text And Image Features
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus CORRESPONDING AUTHOR |
2021 |
Hate Speech And Offensive Language Detection: A New Feature Set With Filter-Embedded Combining Feature Selection
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Scopus CO-AUTHOR |
2021 |
Application Of Knowledge-Oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Scopus UTM FIRST AUTHOR |
2021 |
Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis And Support Vector Machine
SENSORS Publication In Web Of Science CO-AUTHOR |
2021 |
Detecting Telecommunication Fraud With Visual Analytics:
A Review
SUSTAINABLE AND INTEGRATED ENGINEERING INTERNATIONAL CONFERENCE 2019 (SIE 2019) Conference Paper CO-AUTHOR |
2020 |
JOHOR CORPORATION ANALYTICS PROJECT DOCUMENTATION Clasified/Technical Report CO-AUTHOR |
2020 |
COVID-19 EPIDEMIC IN MALAYSIA: IMPACT OF LOCK-DOWN ON INFECTION DYNAMICS Clasified/Technical Report CO-AUTHOR |
2020 |
Sentiment Analysis Of Students Opinion On
Programming Assessment: Evaluation Of Naive
Bayes Over Support Vector Machines
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2020 |
Cloud Customers Service Selection Scheme Based On Improved Cnventional Cat Swarm Optimization
NEURAL COMPUTING AND APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2020 |
A Distributed Intrusion Detection Scheme For Cloud Computing
INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES (IJDST) Publication In Web Of Science UTM FIRST AUTHOR |
2020 |
Enhanced Text Stemmer With Noisy Text Normalization For Malay Texts
SMART TRENDS IN COMPUTING & COMMUNICATIONS Publication In Scopus CO-AUTHOR |
2020 |
Malware Behavior Profiling From Unstructured Data
11TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING & PATTERN RECOGNITION (SOCPAR 2019) Publication In Scopus CORRESPONDING AUTHOR |
2020 |
A Hybrid Chaotic Particle Swarm Optimization
With Differential Evolution For Feature Selection
IEEE SYMPOSIUM ON INDUSTRIAL ELECTRONICS & APPLICATIONS (ISIEA) Publication In Scopus CO-AUTHOR |
2020 |
A New Algorithm-Based Rough Set For Selecting Clustering Attribute In Categorical Data
2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS) Publication In Scopus CO-AUTHOR |
2020 |
Design Consideration Of Malay Text Stemmer Using Structured Approach
SMART INNOVATION, SYSTEMS & TECHNOLOGIES 2019 Publication In Scopus CO-AUTHOR |
2020 |
Security Threats And Challenges To Iot And Its Applications: A Review
2020 5TH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC 2020 Publication In Scopus UTM FIRST AUTHOR |
2020 |
Feature Selection Using Multivariate Adaptive Regression Splines In Telecommunication Fraud
Detection
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING Publication In Scopus CO-AUTHOR |
2020 |
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme For Vehicular Ad Hoc Network: A Context-Aware Approach
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2020 |
Distributed Cesvm-Dr Anomaly Detection For
Wireless Sensor Network
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2019 |
Context-Aware Data-Centric Misbehaviour Detection Scheme For
Vehicular Ad Hoc Networks Using Sequential Analysis Of The Temporal
And Spatial Correlation Of The Consistency Between The Cooperative
Awareness Messages
JOURNAL OF VEHICULAR COMMUNICATIONS Publication In Web Of Science CO-AUTHOR |
2019 |
An Optimized Skin Texture Model Using Gray-Level Co-Occurrence Matrix
NEURAL COMPUTING AND APPLICATIONS Publication In Web Of Science CO-AUTHOR |
2019 |
Btem : Belief Based Trust Evaluation Mechanism For Wireless Sensor
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMPUTER SYSTEMS Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
An Adaptive Intrusion Detection Scheme For Cloud Computing
INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH (IJSIR) Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
Hybrid And Multifaceted Context-Aware Misbehavior Detection Model For Vehicular Ad Hoc Network
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2019 |
Feature Extraction And Selection Method Of Cyber-Attack And Threat Profiling In Cybersecurity Audit
2019 INTERNATIONAL CONFERENCE ON CYBERSECURITY (ICOCSEC) Publication In Scopus UTM FIRST AUTHOR |
2019 |
Quality Of Service Task Scheduling Algorithm For Time-Cost Trade Off Scheduling Problem In Cloud Computing Environment
INTERNATIONAL JOURNAL INTELLIGENT SYSTEMS TECHNOLOGIES AND APPLICATIONS Publication In Scopus CO-AUTHOR |
2019 |
Systematic Literature Review On Designing Trust-Based Security For Wsn
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2019 |
Towards Stemming Error Reduction For Malay Texts
5TH ICCST COMPUTATIONAL SCIENCE AND TECHNOLOGY Publication In Scopus CO-AUTHOR |
2019 |
A Conceptual Scheme For Ransomware Background Knowledge Construction
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE, CRC 2018 Publication In Scopus UTM FIRST AUTHOR |
2019 |
Cyber-Attack Features For Detecting Cyber Threat Incidence From Online News
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE, CRC 2018 Publication In Scopus UTM FIRST AUTHOR |
2019 |
Review Of Cybersecurity Audit Management And Execution Approaches
2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS) Publication In Scopus CO-AUTHOR |
2019 |
Exploiting Dom Mutation For The Detection Of Ad-Injecting Browser Extension
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus UTM FIRST AUTHOR |
2019 |
Intrusion Detection Techniques In Cloud Computing: A Review
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2018 |
Driving-Situation Aware Adaptive Broadcasting Rate Scheme For Vehicular Ad Hoc Network
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS Publication In Web Of Science UTM FIRST AUTHOR |
2018 |
Optimal Control Overhead Based Multi-Metric Routing For Manet
JOURNAL OF WIRELESS NETWORKS Publication In Web Of Science CO-AUTHOR |
2018 |
Orthogonal Taguchi-Based Cat Algorithm For Solving Task Scheduling Problem In Cloud Computing
NEURAL COMPUTING AND APPLICATIONS Publication In Web Of Science CO-AUTHOR |
2018 |
Lightweight Anomaly Detection For Wireless Sensor Networks Based On Ccipca And One-Class Svm
ADVANCED SCIENCE LETTERS Publication In Web Of Science UTM FIRST AUTHOR |
2018 |
Multi-Objective Task Scheduling Optimization In Cloud Computing- An Appraisal
ADVANCED SCIENCE LETTERS Publication In Web Of Science CO-AUTHOR |
2018 |
A Model For Adaptive And Distributed Intrusion
Detection For Cloud Computing
PROCEEDING OF 2018 7TH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE, ICT-ISPC 2018 Publication In Scopus UTM FIRST AUTHOR |
2018 |
A Distributed Anomaly Detection Model For Wireless Sensor Networks Based On The One-Class Principal Component Classifier
SENSOR NETWORKS Publication In Web Of Science CO-AUTHOR |
2018 |
A Survey On Development Stages In Alert Correlation
ADVANCES IN DATA MINING AND BUSINESS INTELLIGENCE Book Chapter CO-AUTHOR |
2018 |
Unsupervised Anomaly Detection For Unlabeled Wireless Sensor Networks Data
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS Publication In Scopus UTM FIRST AUTHOR |
2018 |
Cfaas: Bilaterally Agreed Evidence Collection
JOURNAL OF CLOUD COMPUTING ADVANCES, SYSTEMS AND APPLICATIONS Publication In Scopus CO-AUTHOR |
2018 |
Hybrid Cat Swarm Optimization And Simulated Annealing For Dynamic Task Scheduling On Cloud Computing Environment
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2018 |
Quality Of Service (Qos) Task Scheduling Algorithm With Taguchi Orthogonal Approach For Cloud Computing Environment
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY Publication In Web Of Science CO-AUTHOR |
2018 |
Unified Approach For Operating System Comparisons
With Windows Os Case Study
2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS) Proceedings CO-AUTHOR |
2017 |
Threat Actors Profiling Towards Targeted Critical Infrastructures By Adapting The Grounded-Theory Approach Framework
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings UTM FIRST AUTHOR |
2017 |
Data Analytics And Classification Of Fraud Website
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings UTM FIRST AUTHOR |
2017 |
Cyber Attack Profiling Towards Critical Infrastructure Using Modified System Fault Risk Framework
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings UTM FIRST AUTHOR |
2017 |
DYNAMIC ADJUSTMENT ALGORITHM WITH QOS ATTRIBUTES FOR NON-PREEMPTIVE TASK ALLOCATION IN CLOUD COMPUTING ENVIRONMENT Clasified/Technical Report CO-AUTHOR |
2017 |
FACULTY OF COMPUTING ANNUAL REPORT 2016 Clasified/Technical Report UTM FIRST AUTHOR |
2017 |
Solving Task Scheduling Problem In Cloud Computing Environment Using Orthogonal Taguchi-Cat Algorithm
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING Publication In Scopus CO-AUTHOR |
2017 |
Quality Of Service (Qos) Task Scheduling Algorithm With Taguchi Orthogonal Approach For Cloud Computing Environment
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2017 |
Scalability-Aware Scheduling Optimization Algorithm For Multi-Objective Cloud Task Scheduling Problem
IEEE Journal Article Non Citation-Indexed CO-AUTHOR |
2017 |
Improved Vehicle Positioning Algorithm Using Enhanced
Innovation-Based Adaptive Kalman Filter
PERVASIVE AND MOBILE COMPUTING Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Two Stage Integration Of Gps, Kinematic Information, And Cooperative Awareness Messages Using Cascaded Kalman Filters
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY Book Chapter UTM FIRST AUTHOR |
2017 |
A Feature Selection Technique For Cloud Ids Using Ant Colony Optimization And Decision Tree
ADVANCED SCIENCE LETTER Publication In Scopus UTM FIRST AUTHOR |
2017 |
Cloud Scalable Multi-Objective Task Scheduling Algorithm For Cloud Computing Using Cat Swarm Optimization And Simulated Annealing
IEEE Journal Article Non Citation-Indexed CO-AUTHOR |
2017 |
Multi-Objective Task Scheduling Optimization In Cloud Computing: An Appraisal
INTERNATIONAL CONFERENCE IN SCIENCE, ENGINEERING AND SOCIAL SCIENCES 2016 (ICSESS2016) Conference Paper CO-AUTHOR |
2016 |
Task Scheduling Based Makespan Minimization In Cloud Computing Using Cat Swarm Optimization
INTERNATIONAL CONFERENCE IN SCIENCE, ENGINEERING, MANAGEMENT AND SOCIAL SCIENCES 2016 (ICSEMSS2016) Conference Paper CO-AUTHOR |
2016 |
Solving Task Scheduling Problem In Cloud Computing Environment Using Orthogonal Taguchi-Cat Algorithm
INTERNATION CONFERENCE ON ELECTRICAL, ELECTRONIC, COMMUNICATION AND CONTROL ENGINEERING 2016 Conference Paper CO-AUTHOR |
2016 |
Feature Selection Using Information Gain For Improved Structural Based Alert Correlation
PLOS ONE Publication In Web Of Science CO-AUTHOR |
2016 |
A Review Of The Opinion Target Extraction Using Sequence Labeling Algorithms Based On Features Combinations
JOURNAL OF INTERNET COMPUTING AND SERVICES (JICS) Publication In Web Of Science CO-AUTHOR |
2016 |
Fraud Detection System: A Survey
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS Publication In Web Of Science CO-AUTHOR |
2016 |
Malay Word Stemmer To Stem Standard And Slang Word Patterns On Social Media
DATA MINING AND BIG DATA Book Chapter CO-AUTHOR |
2016 |
A Review On Challenging Issues In Arabic Sentiment Analysis
JOURNAL OF COMPUTER SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2016 |
Word Stemming Challenges In Malay Text A Literature Review
2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICOICT 2016 Publication In Scopus CO-AUTHOR |
2016 |
A Robust Keypoint Descriptor Based On Tomographic Image Reconstruction Using Heuristic Genetic Algorithm And Principal Component Analysis Techniques
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE Publication In Scopus CO-AUTHOR |
2016 |
A New Tomographic Based Keypoint Descriptor Using Heuristic Genetic Algorithm
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2016 |
A Survey Of Feature Extraction Techniques In Content-Based Illicit Image Detection
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2016 |
Enhanced Rules Application Order To Stem Affixation, Reduplication And Compounding Words In Malay Texts
KNOWLEDGE MANAGEMENT AND ACQUISITION FOR INTELLIGENT SYSTEMS Publication In Scopus CO-AUTHOR |
2016 |
Wireless Sensor Network Performance Analysis And Effect Of Blackhole And Sinkhole Attacks
JURNAL TEKNOLOGI Publication In Scopus CO-AUTHOR |
2016 |
Mobility Information Estimation Algorithm Using Kalman-Filter For Vehicular Ad Hoc Networks
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY Publication In Scopus UTM FIRST AUTHOR |
2016 |
Malicious Node Detection Through Trust Aware Routing In Wireless Sensor Networks
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2015 |
Principal Component Analysis-Based Data Reduction Model For Wireless Sensor Networks
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING Publication In Web Of Science UTM FIRST AUTHOR |
2015 |
Selection Of Soil Features For Detection Of Ganoderma
Using Rough Set Theory
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014 Publication In Scopus UTM FIRST AUTHOR |
2015 |
Hidden Features Extraction Using Independent Component Analysis For Improved Alert Clustering
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT) Publication In Scopus CO-AUTHOR |
2015 |
Systematic Review On Existing Load Balancing Techniques In Cloud Computing
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS Journal Article Non Citation-Indexed CO-AUTHOR |
2015 |
A Survey Of Wireless Sensor Network Security And Routing Techniques
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY Publication In Scopus CO-AUTHOR |
2015 |
Fast And Effective Bag-Of-Visual-Word Model To Pornographic Images Recognition Using The Freak Descriptor
JOURNAL OF SOFT COMPUTING AND DECISION SUPPORT SYSTEMS Journal Article Non Citation-Indexed CO-AUTHOR |
2015 |
Deploying Cloud Computing Technology In E-Learning For Malaysian Polytechnic
JOURNAL OF NETWORK AND INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2015 |
Security In Wireless Sensor Network: Approaches And Issues
TELKOMNIKA INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING Journal Article Non Citation-Indexed CO-AUTHOR |
2015 |
Design Consideration For Improved Term Weighting Scheme For Pornographic Web Sites
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014 (ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING) Publication In Scopus CO-AUTHOR |
2015 |
Lightweight Symmetric Encryption Algorithm In Big Data
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS Publication In Scopus CO-AUTHOR |
2015 |
Defining Generic Attributes For Ids Classification
JURNAL TEKNOLOGI (SCIENCES & ENGINEERING) Publication In Scopus CO-AUTHOR |
2015 |
Cloud Computing: A General Userã¢ÂÂS Perception And Security Awareness In Malaysian Polytechnic
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING VOLUME Publication In Scopus CO-AUTHOR |
2015 |
A General UserâS Perception And Security Awareness In Malaysian Polytechnic
PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING VOLUME Publication In Scopus CO-AUTHOR |
2015 |
Data Verification And Misbehavior Detection In Vehicular Ad-Hoc Networks
JURNAL TEKNOLOGI Publication In Scopus UTM FIRST AUTHOR |
2015 |
A Hybrid Color Space For Skin Detection Using Genetic Algorithm Heuristic Search And Principal Component Analysis Technique
PLOS ONE Publication In Web Of Science CO-AUTHOR |
2015 |
Enhancing Rough Set Theory Attributes Selection Of Kdd Cup 1999.
JOURNAL OF THEORETICAL & APPLIED INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2015 |
Data Integrity And Privacy Model In Cloud Computing
INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CO-AUTHOR |
2014 |
A Taxonomy On Intrusion Alert Aggregation Techniques
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CO-AUTHOR |
2014 |
Mobility Pattern Based Misbehavior Detection To Avoid Collision In Vehicular Adhoc Networks
LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS) Publication In Scopus CO-AUTHOR |
2014 |
Secure Search Over Encrypted Data In Cloud Computing
PROCEEDINGS - 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES, ACSAT 2013 Publication In Scopus CO-AUTHOR |
2014 |
Spam Detection Using Hybrid Artificial Neural Network And
Genetic Algorithm
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 13TH 2013 Publication In Scopus UTM FIRST AUTHOR |
2014 |
Security Issues And Attacks In Wireless Sensor Network
WORLD APPLIED SCIENCES JOURNAL Publication In Scopus CO-AUTHOR |
2014 |
Printed Document Integrity Verification Using Barcode
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING) Publication In Scopus CO-AUTHOR |
2014 |
Enhanced Rules Application Order Approach To Stem Reduplication Words In Malay Text
RECENT ADVANCES ON SOFT COMPUTING AND DATA MINING ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus CO-AUTHOR |
2014 |
Islamic Web Content Filtering And Categorization On Deviant Teaching
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus CO-AUTHOR |
2014 |
Adaptive And Online Data Anomaly Detection For Wireless Sensor Systems
KNOWLEDGE-BASED SYSTEMS Publication In Web Of Science CO-AUTHOR |
2014 |
A Colour Space For Skin Detection Using Principal Components Analysis Technique
JOURNAL OF APPLIED AND ENVIRONMENTAL BIOLOGICAL SCIENCES Journal Article Non Citation-Indexed CO-AUTHOR |
2014 |
Colour Space Using Principal Component Analysis Technique For Skin Detection
2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND SOCIAL SCIENCES (ICCS-14) (RIZE, TURKEY) Proceedings CO-AUTHOR |
2014 |
Malicious Data Detection In Vehicular Ad-Hoc Networks
1ST INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES Proceedings UTM FIRST AUTHOR |
2014 |
Mobility Pattern Based Misbehavior Detection In Vehicular Adhoc Networks To Enhance Safety
2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO, ICCVE 2014 - PROCEEDINGS Publication In Scopus UTM FIRST AUTHOR |
2014 |
E-Tafseer: Plants And Animals From Al-Quran
2ND INTERNATIONAL CONFERENCE ON ISLAMIC APPLICATIONS IN COMPUTER SCIENCE AND TECHNOLOGIES (IMAN 2014) Conference Paper CO-AUTHOR |
2014 |
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
THIRD WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES Conference Paper UTM FIRST AUTHOR |
2014 |
A Digital Forensic Investigation Model For Insider Misuse
PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY (CCSEIT-2013) Publication In Scopus CO-AUTHOR |
2013 |
Advancements Of Data Anomaly Detection Research In Wireless Sensor Networks: A Survey And Open Issues
SENSORS Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
An Adaptive And Efficient Dimension Reduction Model For Multivariate Wireless Sensor Networks Applications
APPLIED SOFT COMPUTING Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
Feature Extraction Process: A Phishing Detection Approach
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 13TH 2013 Publication In Scopus UTM FIRST AUTHOR |
2013 |
Compact Classification Of Optimized Boolean Reasoning With Particle Swarm Optimization
INTELLIGENT DATA ANALYSIS Publication In Web Of Science CO-AUTHOR |
2012 |
Data Reduction And Ensemble Classifiers In Intrusion Detection
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Ensemble Of One-Class Classifiers For Network Intrusion Detection System
Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Class Specific Features For Attacks In Network Intrusion Detection System
Jurnal Teknologi Maklumat Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2008 |
Using Significant Features For Classification Of Attacks In Intrusion Detection
Advanced computer network & security Book Chapter INDIVIDUAL AUTHOR |
2008 |
Feature Selection Using Rough-Dpso In Anomaly Intrusion Detection
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS- ICCSA 2007, PT 1 PROCEEDING Publication In Web Of Science CORRESPONDING AUTHOR |
2007 |
Legend : IP CATEGORY IP LEVEL
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
MURAD ABDO RASSAM QASEM AN ANOMALY DETECTION MODEL USING CANDID COVARIANCE-FREE INCREMENTAL PRINCIPAL COMPONENT ANALYSIS FOR WIRELESS SENSOR NETWORKS PHD GRADUATED CO-SUPERVISOR 2013 |
SEYEDHADI YAGHOUBYAN ILLICIT IMAGE DETECTION BASED ON ENHANCED BAG OF VISUAL WORD MODEL PHD GRADUATED CO-SUPERVISOR 2017 |
FUAD ABDULGALEEL ABDOH GHALEB CONTEXT-AWARE MISBEHAVIOUR DETECTION MODEL FOR VEHICLE AD HOC NETWORK USING STATISTICAL TECHNIQUES PHD GRADUATED SUPERVISOR 2017 |
DANLAMI GABI DYNAMIC AND SCALABLE TASK SCHEDULING SCHEMES FOR CLOUD COMPUTING USING ORTHOGONAL TAGUCHI-BASED CAT SWARM OPTIMISATION PHD GRADUATED CO-SUPERVISOR 2017 |
AHLAM HASHIM MOHSIN CONGESTION-AWARE AND PREDICTIVE GEO-CASTING ROUTING SCHEMES FOR MOBILE AD HOC NETWORK PHD GRADUATED CO-SUPERVISOR 2017 |
AISHA ABDALLAH ZAIN ALABDEEN AHMED ADAPTIVE ANOMALY BASED FRAUD DETECTION MODEL FOR HANDLING CONCEPT DRIFT IN SHORT-TERM PROFILE PHD GRADUATED CO-SUPERVISOR 2018 |
TAGWA AHMED MOHAMED ALHAJ AN EFFECTIVE ATTACK SCENARIO CONSTRUCTION MODEL BASED ON TWO-TIER FEATURE SELECTION AND COARSE GRAIN CLEANING PHD GRADUATED CO-SUPERVISOR 2018 |
NURUDEEN IBRAHIM MAHMUD AN ADAPTIVE AND DISTRIBUTED INTRUSION DETECTION SCHEME FOR CLOUD COMPUTING PHD GRADUATED SUPERVISOR 2019 |
MOHAMAD NIZAM BIN KASSIM ENHANCED TEXT STEMMER FOR STANDARD AND NON-STANDARD WORD PATTERNS IN MALAY TEXTS PHD GRADUATED CO-SUPERVISOR 2019 |
MUSTAFA SABAH TAHA EL-TAMEEMI AN IMPROVED IMAGE STEGANOGRAPHY SCHEME BASED ON DISTINCTION GRADE VALUE AND SECRET MESSAGE ENCRYPTION PHD GRADUATED CO-SUPERVISOR 2020 |
AJIBADE SAMUEL MOFOLUWA HYBRID CHAOTIC MAP PARTICLE SWARM OPTIMIZATION AND DIFFERENTIAL EVOLUTION FOR FEATURE SELECTION AND CLASSIFICATION PHD GRADUATED CO-SUPERVISOR 2021 |
MUHALIM BIN MOHAMED AMIN ENHANCED FRAUD DETECTION MODEL BASED ON ENSEMBLE CLASSIFICATION AND CONCEPT DRIFT PHD GRADUATED SUPERVISOR 2021 |
RAJA WASEEM ANWAR TRUST-BASED ENERGY EFFICIENT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS PHD GRADUATED SUPERVISOR 2021 |
NURFAZRINA BINTI MOHD ZAMRY DISTRIBUTED ANOMALY DETECTION SCHEME BASED ON LIGHTWEIGHT DATA AGGREGATION IN WIRELESS SENSOR NETWORK PHD GRADUATED SUPERVISOR 2021 |
MUHAMMAD ZAFRAN BIN MUHAMMAD ZALY SHAH PROTOTYPE-BASED MANIFOLD REGULARIZATION APPROACH WITH CONCEPT DRIFT ADAPTATION IN DATA STREAM CLASSIFICATION PHD GRADUATED SUPERVISOR 2022 |
KHAIRUN NISYAK BINTI ZAKARIA THREAT DRIVEN CYBERSECURITY AUDIT MODEL USING METAMODELLING APPROACH PHD GRADUATED SUPERVISOR 2022 |
SITI SALMAH BINTI MD KASSIM USER TRUST EVALUATION SCHEME BASED ON SERVICE LEVEL AGREEMENT IN CLOUD BASED E-LEARNING PHD GRADUATED SUPERVISOR 2023 |
MOHAMMAD ALI NASSIRI ABRISHAMCHI DECENTERALIZED ENERGY EFFICIENT ZERO-DELAY PRIVACY PROTECTION METHOD AGAINST FINGERPRINT AND TIMING-BASED SNOOPING ATTACK PHD GRADUATED SUPERVISOR 2023 |
FAITOURI AWADH FAITOURI ABDULLAH STACKING AND ENSEMBLE EVASIVE MALWARE DETECTION MODEL BASED ON IMPROVED FEATURE EXTRACTION AND REPRESENTATION TECHNIQUES PHD GRADUATED SUPERVISOR 2023 |
HASHIM HUSSEIN TAHA AN INTRUSION ALERT CORRELATION MODEL BASED ON DATA ANALYSIS AND GRAPH CONVOLUTIONAL NETWORK (GCN) APPROACH   PHD ON GOING CO-SUPERVISOR |
ANIS F ABDALLA ELGARDUH ENHANCING MALWARE DETECTION: A HYBRID IMAGE GENERATION MODEL WITH SPP-NET ADAPTATION AND FEW-SHOT LEARNING PHD ON GOING SUPERVISOR |
FAWAZ MOHAMMAD HAYEL OTHMAN PHD ON GOING SUPERVISOR |
UMARA UROOJ ADAPTIVE EARLY DETECTION SYSTEM FOR CRYPTO-RANSOMWARE ATTACKS PHD ON GOING CO-SUPERVISOR |
ALMANIA MOAAD ABDULAZIZ M A FUZZY ADAPTIVE DYNAMIC EVOLVING SPIKING NEURAL NETWORK BASED INTRUSION DETECTION MODEL FOR EDGE COMPUTING   PHD ON GOING SUPERVISOR |
ZUBAIDI MAYTHAM SAHAR SAEED DEEP LEARNING-BASED ADAPTIVE ECONOMIC DENIAL OF SUSTAINABILITY ATTACK DETECTION MODEL FOR PUBLIC CLOUD ENVIRONMENT Â Â PHD ON GOING SUPERVISOR |
MOHAMMED FAEZ ABDULLAH ALJABERI PHD ON GOING SUPERVISOR |
NOOR AZEERA BINTI ABDUL AZIZ FUSION OF ENHANCED TEXT-BASED AND WORD EMBEDDING FEATURES FOR HATE SPEECH AND OFFENSIVE LANGUAGE MULTI-CHANNEL DEEP LEARNING CLASSIFICATION PHD GRADUATED SUPERVISOR 2024 |
ABU SAQ ABDULLAH HUSSAIN H A CONTEXT-AWARE ADAPTIVE INTRUSION DETECTION MODEL FORÂ THE INTERNET OF THINGS USING DEEP BELIEF NETWORK PHD ON GOING CO-SUPERVISOR |
ANAS ROUBI ABDELSATTAR ROUBI NASR ENHANCING WEB APPLICATION FIREWALLS WITH IMAGE-BASED THREAT DETECTION PHD ON GOING SUPERVISOR |
ABDULAH AHMAD ALSOLAIMAN ADAPTIVE CONTEXT-AWARE MISBEHAVIOUR DETECTION SYSTEM FOR VEHICUALR AD-HOC NETWORKS PHD ON GOING SUPERVISOR |
RAWAN ADEL FAWZI AL-SHARIDA AN INTEGRATED MODEL FOR EVALUATING USERS’ CYBERSECURITY BEHAVIORS IN THE METAVERSE: EVIDENCE FROM SEM-ANN APPROACH   PHD ON GOING CO-SUPERVISOR |
AL LAWATI HADI MOHAMED REDHA MOHSIN AN INTEGRATED ADAPTIVE WINDOWING AND STOCHASTIC GRADIENT DESCENT FOR DYNAMIC FRAUD DETECTION IN PAYMENT SYSTEMS    PHD ON GOING SUPERVISOR |
MARINA BINTI MD ARSHAD PROFILING OF MONEY LAUNDRING CRIMES USING GRAPH ANALYTICS PHD ON GOING SUPERVISOR |
ADAM KHALID ENHANCED MACHINE LEARNING FRAMEWORK FOR APT DETECTION PHD ON GOING SUPERVISOR |
EMILY TSWAFIA KORMENE PHD ON GOING SUPERVISOR |
MUHAMMAD AKMAL DODGSON BIN TARIQ CYBER FRAUD CONCEPT MODEL   PHD ON GOING SUPERVISOR |
NORDALIELA BINTI MOHD RUSLI GRAPH CONVOLUTIONAL NETWORKS FOR MONEY LAUNDERING SUSPICIOUS TRANSACTIONS DETECTION WITH RE-WEIGHTED NETWORK PHD ON GOING SUPERVISOR |
MUHAMMAD YUSUF IDRIS PHD ON GOING CO-SUPERVISOR |
WANG ZHEN CONVOLUTIONAL SPIKING NEURAL NETWORK BASED EFFICIENT INTRUSION DETECTION MODEL FOR INTERNET OF THINGS PHD ON GOING SUPERVISOR |
IMRAN MOHD KHAN DETECTION OF DDOS ATTACKS ON SOFTWARE DEFINED NETWORK’S CONTROLLER USING ENSEMBLE MACHINE LEARNING TECHNIQUES   PHD ON GOING SUPERVISOR |
SARA MAROUF MASTER GRADUATED SUPERVISOR 2013 |
LEE CHUN HOW MASTER GRADUATED SUPERVISOR 2013 |
MOHAMMED FAEZ ABDULLAH ALJABERI MASTER GRADUATED SUPERVISOR 2013 |
MIRANDA DABIRANZOHOURI MASTER GRADUATED CO-SUPERVISOR 2013 |
FUAD ABDULGALEEL ABDOH GHALEB CONTEXT-AWARE MISBEHAVIOUR DETECTION SCHEME FOR VEHICULAR AD HOC NETWORK MASTER GRADUATED CO-SUPERVISOR 2013 |
MOHAMUD SHEIKH-ALI HUSSEIN MASTER GRADUATED SUPERVISOR 2014 |
MOHAMAD NIZAM BIN KASSIM ENHANCED TEXT STEMMER WITH STRUCTURED ORDER RULES FOR STANDARD AND NON-STANDARD WORD PATTERNS MASTER GRADUATED CO-SUPERVISOR 2014 |
MOHAMMED ABDULLAH OMAR AL ZUBAIDI MASTER GRADUATED SUPERVISOR 2014 |
DENI YULIANTI ENHANCEMENTS OF ADAPTIVE FUZZY SPRAY AND WAIT PROTOCOL FOR POCKET SWITCHED NETWORK MASTER GRADUATED SUPERVISOR 2015 |
'UZMA BINTI MOHAMAD TAHIR KNOWLEDGE GRAPH MASTER GRADUATED SUPERVISOR 2016 |
ABDULHAMID ALIYU ARDO MASTER GRADUATED SUPERVISOR 2016 |
ALI HAMDI FERGANI ALI HYBRID MODEL FOR SENTIMENT ANALYSIS OF MULTI-FACETED ARABIC REVIEWS MASTER GRADUATED SUPERVISOR 2017 |
OKWARA JERRY CHIZOBA MASTER GRADUATED SUPERVISOR 2019 |
NUR SHAMILLA BINTI SELAMAT ASPECT-BASED SENTIMENT ANALYSIS OF TOURISTS' REVISIT INTENTION FROM TOURISTS' ONLINE REVIEWS ON THEME PARKS MASTER GRADUATED CO-SUPERVISOR 2020 |
NURULMANJA ATIQAH BINTI MALIKI USER SECURITY AND SOCIAL VULNERABILITIES BEHAVIOURAL PROFILE USING HISTORICAL BROWSING WEBSITE MASTER GRADUATED SUPERVISOR 2021 |
MUHAMMAD LIMAN GAMBO MASTER GRADUATED SUPERVISOR 2022 |
MUHAMMAD AKMAL DODGSON BIN TARIQ CYBER FRAUD CONCEPT MODEL   MASTER GRADUATED SUPERVISOR 2022 |
NURFADILAH BINTI ARIFFIN RANSOMWARE BEHAVIOUR ENTITY CLASSIFICATION FROM ONLINE FORUM MASTER GRADUATED SUPERVISOR 2022 |
FIFY FARISHA BINTI ASMAWALI MASTER GRADUATED SUPERVISOR 2022 |
ERIC KHOO JIUN HOOI ENTITY EMBEDDINGS AND RANK-BASED BOOTSTRAP COST SENSITIVE STACKING METHOD FOR CUSTOMS TAX EVASION DETECTION MASTER GRADUATED SUPERVISOR 2023 |
HUSNIYAH BINTI AB RAHMAN MASTER ON GOING SUPERVISOR |
WAN MUHAMMAD ARIF AMRIN BIN WAN ROSLEE INTERNET OF THINGS (IOT) SECURITY READINESS ASSESSTMENT FOR MALAYSIAN SMALL TO MEDIUM ENTERPRISES (SMES) MASTER ON GOING SUPERVISOR |
UMMU SULAIM BINTI MOHD EMRAN MASTER ON GOING SUPERVISOR |
MUHAMMAD FARIS EZANY BIN ZIKRI MASTER ON GOING SUPERVISOR |