GRANT(PI & MEMBERS)

81

PUBLICATIONS

137

INDEXED PUBLICATION

101

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

NATIONAL GRANTS
6
UNIVERSITY FUND
12
TOTAL

Publications

INDEXED PUBLICATION
101
NON-INDEXED PUBLICATION
12
OTHERS PUBLICATION
23
TOTAL

Supervisions

MASTER
26
PHD
45
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
Fined Tuned Language Models (LLM) for Financial Crime News Summarization using Retrieval Augmented Generation
RUG OF UTM Potential Academic Staff
2024
F4+ 4.5.2: Psychosocial challenges and supports for B40 orphaned and adopted adolescents transitioning to adulthood in Malaysia
RUG OF UTM Geran Penyelidikan Hi-Tech(F4)
2024
Advanced Framework for Fraud Detection in Financial Transactions through the Integration of Ensemble Learning-Enhanced Temporal Analysis and Unsupervised Machine Learning-Based Behavioral Profiling
RUG OF UTM UTM Encouragement Research
2024
F4+ 3.3: Integrating XAI for Automated Diagnosis and Generative AI for Smart Prescription for Cardiovascular Diseases
RUG OF UTM Geran Penyelidikan Hi-Tech(F4)
2024
F4+ 3.0: Human Digital Twin for Al-Driven Treatments of Circulatory System Diseases
RUG OF UTM Geran Penyelidikan Hi-Tech(F4)
2024
PENYELIDIKAN KANDUNGAN KURIKULUM, PEMETAAN KOMPETENSI DAN PENILAIAN KOMPETENSI BAGI KAJIAN SEMULA PROGRAM CERTIFIED FINANCIAL INVESTGATOR PROGRAM (CFIP)
Pusat Pencegahan Jenayah Kewangan Nasional (NFCC) Government Agency Grant
2024
NFCC 1.0 : Development of Three Modules of Learning Materials and Configuring the Learning Management System for the Certified Financial Investigator Program (CFIP)
Pusat Pencegahan Jenayah Kewangan Nasional (NFCC) Government Agency Grant
2024
NFCC 1.1 :Development of Learning Module Guidebook, Learning Module Slides and Question Bank (3 Modules)
Pusat Pencegahan Jenayah Kewangan Nasional (NFCC) Government Agency Grant
2024
Tanjung Langsat Port Security System Phase 2
TLP TERMINAL SDN BHD Contract Research DTD
2023
UTM-TRG/2 1.2: Robust Security Control and Monitoring for Internet of Security and Surveillance Things (IoSST)
PEJABAT TIMBALAN NAIB CANSELOR (PENYELIDIKAN & INOVASI) Translational Research@Campus
2023
F4 3.3: Edge Artificial Intelligence for Suspicious Human Activity Recognition
RUG OF UTM Geran Penyelidikan Hi-Tech(F4)
2022
Novel Generative and Joint Learning Classification Model Based on Deep Neural Network Approach in Service Chatbot
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2022
METAMODEL-BASED FRAMEWORK IN GOVERNING ONLINE SOCIAL NETWORKS FORENSIC INVESTIGATION CRITICAL PROCESSES
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2022
A New Irregular Non-Gaussian Adaptive Dempster-Shafer-Based Kalman Filter Algorithm for Fake News Detection
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2021
A NARRATIVE ENGAGEMENT FRAMEWORK ON MALAYSIAN HIGHER EDUCATION IN THE DIGITAL SPACE
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2021
An Improved Knight's Tour - Jaya Algorithm for Robust Image Steganography.
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2021
KKP_SATELIT_5: Research Excellence Consortium in IoT Security
MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan
2021
KKP_2_Training : Malaysia Big Data Research Excellence Consortium (BiDaREC)
MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan
2021
KKP_2_Networking : Malaysia Big Data Research Excellence Consortium (BiDaREC)
MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan
2021
KKP_2_Project : Malaysia Big Data Research Excellence Consortium (BiDaREC)
MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan
2021
KKP_2_Program : Malaysia Big Data Research Excellence Consortium (BiDaREC)
MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan
2021
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme)
MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract
2020
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme)
RUG OF UTM Matching Grant
2020
A New Framework for DataOps Implementation in Organizations for Improving Key Performance Indications
RUG OF UTM Industry-International Incentive Grant
2020
USING DATA-DRIVEN DECISION MAKING (DDDM) TO IMPROVE ANNUAL PROGRAMME ASSESSMENT REPORT (APAR) FOR UTM
RUG OF UTM UTM Encouragement Research
2020
AN ENHANCED GREEDY-BASED CAT SWARM OPTIMIZATION FOR DYNAMIC TASK SCHEDULING IN CLOUD COMPUTING SYSTEMS
RUG OF UTM UTM Encouragement Research
2020
A NEW AGILITY HYBRID MODEL FOR SECURED IOT-BASED HEALTHCARE PLATFORM.
RUG OF UTM UTM Encouragement Research
2020
UTMIcon 4.0: DIANA: SECURITY AND SOCIAL ASSISTANT
RUG OF UTM UTM RA ICONIC GRANT
2020
UTMIcon 3.3 : DEVELOPMENT OF A ROBUST COMMUNICATION SYSTEM FOR MULTIROTOR UNMANNED AERIAL SYSTEM (mUAS)
RUG OF UTM UTM RA ICONIC GRANT
2020
UTMIcon 4.4: Development of a Platform for DIANA as a Protector and Educator Towards Safer Society in the Digital World
RUG OF UTM UTM RA ICONIC GRANT
2020
UTMIcon 4.3: Development of Intervention Content and Well-Being Psychometric Tests for Measuring the Severity of Security and Social Threat
RUG OF UTM UTM RA ICONIC GRANT
2020
UTMIcon 4.2 - Development of an Intelligence Brain (Engine) to Perform Security and Social Threat Profiling and Assessments
RUG OF UTM UTM RA ICONIC GRANT
2020
COVID19 PRESCRIPTIVE ACTION AND PREDICTION TOOL
RUG OF UTM UTM R&D Fund
2020
LEADERSHIP PROFILING AND TALENT PREDICTIVE ANALYTICS FOR AKADEMIK KEPIMPINAN PENDIDIKAN TINGGI (AKEPT)
AKADEMI KEPIMPINAN PENDIDIKAN TINGGI (AKEPT) Non Goverment Agency
2020
SYNERGISTIC APPROACH TO ENHANCE MONITORING AND RECOGNITION PERFORMANCE OF DEVELOPING SHEWHART CONTROL CHART PATTERNS
RUG OF UTM UTM Fundamental Research
2020
BIG DATA TALENT ANALYTICS FOR PREDICTIVE BEHAVIORAL LEADERSHIP
RUG OF UTM UTM High Impact Research
2020
DEVELOPMENT OF HARDWARE SENSOR FOR NETWORK MONITORING AND DETECTION OF INTERNET-OF-THINGS MALWARE THREATS
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2019
UTM-TDR 5.0: STRATEGIC THREAT INTELLIGENCE FOR SOUTH CHINA SEA CONFLICT
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.2 (T2): Designing Named-Entity-Recognition Approach for Conflict Case Study
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.5 (T2): Intelligent ChatBot for South China Sea Conflict
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.3 (T1) Graph-Based Knowledge Representation for Threat Intelligence
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.4 (T1) Unstructured Data Analytics for Threat Intelligence
RUG OF UTM UTM Transdiciplinary Research Grant
2018
EYENOON SWITCH: INTERNET FILTERING AND MONITORING SYSTEM
RUG OF UTM Prototype Development Fund
2018
Fraudulent Websites Detection System
RUG OF UTM High Impact Research Grant
2018
TABOT - INTELLIGENT RECOMMENDATION SYSTEM CHATBOT USING META-LEARNING ENSEMBLE OF SOCIAL CONTEXT REGULARIZATION AND EMOTION SPACE SENTIMENT ANAYSIS HYBRID MODEL
RUG OF UTM Tier 1
2018
ISLAMIC LEADERSHIP PRINCIPLES AND ITS APPLICABILITY IN TALENT MANAGEMENT USING FUZZY GRAPH APPROACH: GOVERNMENT LINKED COMPANIES IN JOHOR
RUG OF UTM Tier 1
2018
TEXT STEMMER WITH NORMALIZATION TECHNIQUES FOR NOISY TEXTS IN MALAY LANGUAGE
RUG OF UTM Tier 1
2018
INTELLIGENT WEB CONTENT FILTERING ALGORITHM AND THE USAGE TREND ANALYSIS DASHBOARD FOR STREAMING DATA
RUG OF UTM Professional Development Research University
2018
Strategy Cyber Threat Intelligence
CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency
2017
Joint Device Discovery Modeling for 5G Device to Device Multi Cell Communication
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2017
Exploiting Ad-Banner for the Detection of Malvertising
RUG OF UTM Tier 1
2017
INTELLIGENT ROUTING ALGORITHM FOR DEVICE TO DEVICE COMMUNICATION IN 5G
RUG OF UTM Tier 1
2017
INTELLIGENT WEB CONTENT FILTERING ALGORITHM AND THE USAGE TREND ANALYSIS DASHBOARD FOR STREAMING DATA
RUG OF UTM Professional Development Research University
2017
AN ENHANCED 2D CHAOTIC PSEUDO-RANDOM NUMBER GENERATOR FOR CRYPTOGRAPHY
RUG OF UTM Tier 2
2016
NEW FEATURE EXTRACTION APPROACH FOR HATE-CRIME ASPECT-BASED SENTIMENT ANALYSIS USING ORDINAL AND FREQUENCY-BASED INTEGRATION METHODS
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2016
PROFILING OF FOREIGN WORKERS IN PENGERANG
RUG OF UTM Institut Inovasi Strategik Johor
2016
Automated Prediction system for Detecting Business Scams and Frauds Websites
CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency
2016
Trustworthiness Assessment Algorithm based on Temporal and Spatial Properties of Mobility Data in Ephemeral Network
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
The Development of Switch-Based Web Content Filtering System and Usage Trend Analysis Dashboard
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones.
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Interactive Data Visualization
RUG OF UTM Flagship
2014
PEMBANGUNAN PERISIAN TAFSIR AL-QURAN BERTEMAKAN FLORA DAN FAUNA
RUG OF UTM Professional Development Research University
2014
COPYRIGHT PROTECTION OF DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
ONLINE ANOMALY DETECTION OF THE PRESENCE OF GANODERMA BONINENSE IN PALM OIL PLANTATION USING WIRELESS SENSOR
RUG OF UTM Tier 1
2014
HEALTH AWARE COMMUTING.
RUG OF UTM Flagship
2014
ENHANCED MALAY WORD STEMMING ALGORITHMS AND COMMON WORD REMOVAL FOR SLANG WORDS IN MALAY ILLICIT WEB CONTENTS
RUG OF UTM Tier 1
2014
Enhancement of Elliptic Curve Cryptography and Implementation on Android Mobile Platform
MINISTRY OF EDUCATION Exploratory Research Grant Scheme
2013
The Development of A Real Time Illicit Image and Video Filtering System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2013
A Lightweight Anomaly Detection for Wireless Sensor Networks
RUG OF UTM Tier 2
2012
Improved pattern recognition algorithm for imbalanced and incomplete manufacturing process data streams
RUG OF UTM Tier 2
2012
Identification of Attacks/Misuse Associated with Email through Email Header Forensic
RUG OF UTM Tier 2
2012
FUZZY BASED DETECTION OF SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK
RUG OF UTM Tier 2
2011
Efficient Data Forwarding for Data Collection from Sensor Field
RUG OF UTM Tier 2
2011
Ubiquitous Database in Mobile Healthcare
MINISTRY OF EDUCATION Short Term
1998

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Joint Intent Detection And Slot Filling With Syntactic And Semantic Features Using Multichannel Cnn-Bilstm
PEERJ COMPUTER SCIENCE
Publication In Web Of Science CO-AUTHOR
2024
Annual Programme Assessment Report Online System
NEW ACADEMIA LEARNING INNOVATION 2023
CO-AUTHOR
2023
Annual Programme Assessment Report (Apar) Online System
NEW ACADEMIA LEARNING INNOVATION NALI 2023 PROCEEDING
Proceedings CO-AUTHOR
2023
Dynamic Extraction Of Initial Behavior For Evasive Malware Detection
MATHEMATICS
Publication In Web Of Science UTM FIRST AUTHOR
2023
Review Of Smart Home Privacy-Protecting Strategies From A Wireless Eavesdropping Attack
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES
Publication In Scopus UTM FIRST AUTHOR
2023
A Systematic Review Of Multi Perspectives On Human Cybersecurity Behavior
TECHNOLOGY IN SOCIETY
Publication In Web Of Science CO-AUTHOR
2023
An Effective Attack Scenario Construction Model Based On Identification Of Attack Steps And Stages
INNTERNATIONAL JOURNAL OF INFORMATION SECURITY
Publication In Web Of Science CO-AUTHOR
2023
A Kullback-Liebler Divergence-Based Representation Algorithm For Malware Detection
PEERJ COMPUTER SCIENCE
Publication In Web Of Science UTM FIRST AUTHOR
2023
A Semisupervised Concept Drift Adaptation Via Prototype-Based Manifold Regularization Approach With Knowledge Transfer
MATHEMATICS
Publication In Web Of Science UTM FIRST AUTHOR
2023
Prototype Regularized Manifold Regularization Technique For Semi-Supervised Online Extreme Learning Machine
SENSORS
Publication In Web Of Science UTM FIRST AUTHOR
2022
Ransomware Detection Using The Dynamic Analysis And Machine Learning: A Survey And Research Directions
APPLIED SCIENCES-BASEL
Publication In Web Of Science CO-AUTHOR
2022
Dynamic Scheduling Of Heterogeneous Resources Across Mobile Edge-Cloud Continuum Using Fruit Fly-Based Simulated Annealing Optimization Scheme
NEURAL COMPUTING & APPLICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2022
A Convolutional Neural Network Model For Credit Card Fraud Detection
2022 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ITS APPLICATIONS, ICODSA 2022
Publication In Scopus UTM FIRST AUTHOR
2022
Malware Detection Issues, Challenges, And Future Directions: A Survey
APPLIED SCIENCES-BASEL
Publication In Web Of Science UTM FIRST AUTHOR
2022
Adiba Big Data Adoption Framework: Accelerating Big Data Revolution 5.0
PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, TECHNOLOGY AND APPLICATIONS (DATA)
Publication In Web Of Science CO-AUTHOR
2022
Smart Home Privacy Protection Methods Against A Passive Wireless Snooping Side-Channel Attack
SENSORS
Publication In Web Of Science CORRESPONDING AUTHOR
2022
Cyber-Attack Prediction Based On Network Intrusion Detection Systems For Alert Correlation Techniques: A Survey
SENSORS
Publication In Web Of Science CO-AUTHOR
2022
Leach-Cr: Energy Saving Hierarchical Network Protocol Based On Low-Energy Adaptive Clustering Hierarchy For Wireless Sensor Networks
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Web Of Science UTM FIRST AUTHOR
2021
Advanced Persistent Threat Detection: A Survey
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Web Of Science UTM FIRST AUTHOR
2021
News Event Prediction Using Causality Approach On South China Sea Conflict
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Web Of Science UTM FIRST AUTHOR
2021
Analysis Of Metaheuristics Featureselection Algorithm For Classification
ADVANCES IN INTELLIGENT SYSTEMS & COMPUTING
Publication In Scopus CO-AUTHOR
2021
Fraudulent E-Commerce Website Detection Model Using Html, Text And Image Features
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING
Publication In Scopus CORRESPONDING AUTHOR
2021
Hate Speech And Offensive Language Detection: A New Feature Set With Filter-Embedded Combining Feature Selection
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Scopus CO-AUTHOR
2021
Application Of Knowledge-Oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Scopus UTM FIRST AUTHOR
2021
Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis And Support Vector Machine
SENSORS
Publication In Web Of Science CO-AUTHOR
2021
Detecting Telecommunication Fraud With Visual Analytics: A Review
SUSTAINABLE AND INTEGRATED ENGINEERING INTERNATIONAL CONFERENCE 2019 (SIE 2019)
Conference Paper CO-AUTHOR
2020

JOHOR CORPORATION ANALYTICS PROJECT DOCUMENTATION
Clasified/Technical Report CO-AUTHOR
2020

COVID-19 EPIDEMIC IN MALAYSIA: IMPACT OF LOCK-DOWN ON INFECTION DYNAMICS
Clasified/Technical Report CO-AUTHOR
2020
Sentiment Analysis Of Students Opinion On Programming Assessment: Evaluation Of Naive Bayes Over Support Vector Machines
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2020
Cloud Customers Service Selection Scheme Based On Improved Cnventional Cat Swarm Optimization
NEURAL COMPUTING AND APPLICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2020
A Distributed Intrusion Detection Scheme For Cloud Computing
INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES (IJDST)
Publication In Web Of Science UTM FIRST AUTHOR
2020
Enhanced Text Stemmer With Noisy Text Normalization For Malay Texts
SMART TRENDS IN COMPUTING & COMMUNICATIONS
Publication In Scopus CO-AUTHOR
2020
Malware Behavior Profiling From Unstructured Data
11TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING & PATTERN RECOGNITION (SOCPAR 2019)
Publication In Scopus CORRESPONDING AUTHOR
2020
A Hybrid Chaotic Particle Swarm Optimization With Differential Evolution For Feature Selection
IEEE SYMPOSIUM ON INDUSTRIAL ELECTRONICS & APPLICATIONS (ISIEA)
Publication In Scopus CO-AUTHOR
2020
A New Algorithm-Based Rough Set For Selecting Clustering Attribute In Categorical Data
2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS)
Publication In Scopus CO-AUTHOR
2020
Design Consideration Of Malay Text Stemmer Using Structured Approach
SMART INNOVATION, SYSTEMS & TECHNOLOGIES 2019
Publication In Scopus CO-AUTHOR
2020
Security Threats And Challenges To Iot And Its Applications: A Review
2020 5TH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC 2020
Publication In Scopus UTM FIRST AUTHOR
2020
Feature Selection Using Multivariate Adaptive Regression Splines In Telecommunication Fraud Detection
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING
Publication In Scopus CO-AUTHOR
2020
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme For Vehicular Ad Hoc Network: A Context-Aware Approach
IEEE ACCESS
Publication In Web Of Science CO-AUTHOR
2020
Distributed Cesvm-Dr Anomaly Detection For Wireless Sensor Network
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2019
Context-Aware Data-Centric Misbehaviour Detection Scheme For Vehicular Ad Hoc Networks Using Sequential Analysis Of The Temporal And Spatial Correlation Of The Consistency Between The Cooperative Awareness Messages
JOURNAL OF VEHICULAR COMMUNICATIONS
Publication In Web Of Science CO-AUTHOR
2019
An Optimized Skin Texture Model Using Gray-Level Co-Occurrence Matrix
NEURAL COMPUTING AND APPLICATIONS
Publication In Web Of Science CO-AUTHOR
2019
Btem : Belief Based Trust Evaluation Mechanism For Wireless Sensor
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMPUTER SYSTEMS
Publication In Web Of Science UTM FIRST AUTHOR
2019
An Adaptive Intrusion Detection Scheme For Cloud Computing
INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH (IJSIR)
Publication In Web Of Science UTM FIRST AUTHOR
2019
Hybrid And Multifaceted Context-Aware Misbehavior Detection Model For Vehicular Ad Hoc Network
IEEE ACCESS
Publication In Web Of Science CO-AUTHOR
2019
Feature Extraction And Selection Method Of Cyber-Attack And Threat Profiling In Cybersecurity Audit
2019 INTERNATIONAL CONFERENCE ON CYBERSECURITY (ICOCSEC)
Publication In Scopus UTM FIRST AUTHOR
2019
Quality Of Service Task Scheduling Algorithm For Time-Cost Trade Off Scheduling Problem In Cloud Computing Environment
INTERNATIONAL JOURNAL INTELLIGENT SYSTEMS TECHNOLOGIES AND APPLICATIONS
Publication In Scopus CO-AUTHOR
2019
Systematic Literature Review On Designing Trust-Based Security For Wsn
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2019
Towards Stemming Error Reduction For Malay Texts
5TH ICCST COMPUTATIONAL SCIENCE AND TECHNOLOGY
Publication In Scopus CO-AUTHOR
2019
A Conceptual Scheme For Ransomware Background Knowledge Construction
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE, CRC 2018
Publication In Scopus UTM FIRST AUTHOR
2019
Cyber-Attack Features For Detecting Cyber Threat Incidence From Online News
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE, CRC 2018
Publication In Scopus UTM FIRST AUTHOR
2019
Review Of Cybersecurity Audit Management And Execution Approaches
2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS)
Publication In Scopus CO-AUTHOR
2019
Exploiting Dom Mutation For The Detection Of Ad-Injecting Browser Extension
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING
Publication In Scopus UTM FIRST AUTHOR
2019
Intrusion Detection Techniques In Cloud Computing: A Review
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2018
Driving-Situation Aware Adaptive Broadcasting Rate Scheme For Vehicular Ad Hoc Network
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
Publication In Web Of Science UTM FIRST AUTHOR
2018
Optimal Control Overhead Based Multi-Metric Routing For Manet
JOURNAL OF WIRELESS NETWORKS
Publication In Web Of Science CO-AUTHOR
2018
Orthogonal Taguchi-Based Cat Algorithm For Solving Task Scheduling Problem In Cloud Computing
NEURAL COMPUTING AND APPLICATIONS
Publication In Web Of Science CO-AUTHOR
2018
Lightweight Anomaly Detection For Wireless Sensor Networks Based On Ccipca And One-Class Svm
ADVANCED SCIENCE LETTERS
Publication In Web Of Science UTM FIRST AUTHOR
2018
Multi-Objective Task Scheduling Optimization In Cloud Computing- An Appraisal
ADVANCED SCIENCE LETTERS
Publication In Web Of Science CO-AUTHOR
2018
A Model For Adaptive And Distributed Intrusion Detection For Cloud Computing
PROCEEDING OF 2018 7TH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE, ICT-ISPC 2018
Publication In Scopus UTM FIRST AUTHOR
2018
A Distributed Anomaly Detection Model For Wireless Sensor Networks Based On The One-Class Principal Component Classifier
SENSOR NETWORKS
Publication In Web Of Science CO-AUTHOR
2018
A Survey On Development Stages In Alert Correlation
ADVANCES IN DATA MINING AND BUSINESS INTELLIGENCE
Book Chapter CO-AUTHOR
2018
Unsupervised Anomaly Detection For Unlabeled Wireless Sensor Networks Data
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS
Publication In Scopus UTM FIRST AUTHOR
2018
Cfaas: Bilaterally Agreed Evidence Collection
JOURNAL OF CLOUD COMPUTING ADVANCES, SYSTEMS AND APPLICATIONS
Publication In Scopus CO-AUTHOR
2018
Hybrid Cat Swarm Optimization And Simulated Annealing For Dynamic Task Scheduling On Cloud Computing Environment
JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2018
Quality Of Service (Qos) Task Scheduling Algorithm With Taguchi Orthogonal Approach For Cloud Computing Environment
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY
Publication In Web Of Science CO-AUTHOR
2018
Unified Approach For Operating System Comparisons With Windows Os Case Study
2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS)
Proceedings CO-AUTHOR
2017
Threat Actors Profiling Towards Targeted Critical Infrastructures By Adapting The Grounded-Theory Approach Framework
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings UTM FIRST AUTHOR
2017
Data Analytics And Classification Of Fraud Website
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings UTM FIRST AUTHOR
2017
Cyber Attack Profiling Towards Critical Infrastructure Using Modified System Fault Risk Framework
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings UTM FIRST AUTHOR
2017

DYNAMIC ADJUSTMENT ALGORITHM WITH QOS ATTRIBUTES FOR NON-PREEMPTIVE TASK ALLOCATION IN CLOUD COMPUTING ENVIRONMENT
Clasified/Technical Report CO-AUTHOR
2017

FACULTY OF COMPUTING ANNUAL REPORT 2016
Clasified/Technical Report UTM FIRST AUTHOR
2017
Solving Task Scheduling Problem In Cloud Computing Environment Using Orthogonal Taguchi-Cat Algorithm
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING
Publication In Scopus CO-AUTHOR
2017
Quality Of Service (Qos) Task Scheduling Algorithm With Taguchi Orthogonal Approach For Cloud Computing Environment
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2017
Scalability-Aware Scheduling Optimization Algorithm For Multi-Objective Cloud Task Scheduling Problem
IEEE
Journal Article Non Citation-Indexed CO-AUTHOR
2017
Improved Vehicle Positioning Algorithm Using Enhanced Innovation-Based Adaptive Kalman Filter
PERVASIVE AND MOBILE COMPUTING
Publication In Web Of Science UTM FIRST AUTHOR
2017
Two Stage Integration Of Gps, Kinematic Information, And Cooperative Awareness Messages Using Cascaded Kalman Filters
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY
Book Chapter UTM FIRST AUTHOR
2017
A Feature Selection Technique For Cloud Ids Using Ant Colony Optimization And Decision Tree
ADVANCED SCIENCE LETTER
Publication In Scopus UTM FIRST AUTHOR
2017
Cloud Scalable Multi-Objective Task Scheduling Algorithm For Cloud Computing Using Cat Swarm Optimization And Simulated Annealing
IEEE
Journal Article Non Citation-Indexed CO-AUTHOR
2017
Multi-Objective Task Scheduling Optimization In Cloud Computing: An Appraisal
INTERNATIONAL CONFERENCE IN SCIENCE, ENGINEERING AND SOCIAL SCIENCES 2016 (ICSESS2016)
Conference Paper CO-AUTHOR
2016
Task Scheduling Based Makespan Minimization In Cloud Computing Using Cat Swarm Optimization
INTERNATIONAL CONFERENCE IN SCIENCE, ENGINEERING, MANAGEMENT AND SOCIAL SCIENCES 2016 (ICSEMSS2016)
Conference Paper CO-AUTHOR
2016
Solving Task Scheduling Problem In Cloud Computing Environment Using Orthogonal Taguchi-Cat Algorithm
INTERNATION CONFERENCE ON ELECTRICAL, ELECTRONIC, COMMUNICATION AND CONTROL ENGINEERING 2016
Conference Paper CO-AUTHOR
2016
Feature Selection Using Information Gain For Improved Structural Based Alert Correlation
PLOS ONE
Publication In Web Of Science CO-AUTHOR
2016
A Review Of The Opinion Target Extraction Using Sequence Labeling Algorithms Based On Features Combinations
JOURNAL OF INTERNET COMPUTING AND SERVICES (JICS)
Publication In Web Of Science CO-AUTHOR
2016
Fraud Detection System: A Survey
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Publication In Web Of Science CO-AUTHOR
2016
Malay Word Stemmer To Stem Standard And Slang Word Patterns On Social Media
DATA MINING AND BIG DATA
Book Chapter CO-AUTHOR
2016
A Review On Challenging Issues In Arabic Sentiment Analysis
JOURNAL OF COMPUTER SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2016
Word Stemming Challenges In Malay Text A Literature Review
2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICOICT 2016
Publication In Scopus CO-AUTHOR
2016
A Robust Keypoint Descriptor Based On Tomographic Image Reconstruction Using Heuristic Genetic Algorithm And Principal Component Analysis Techniques
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE
Publication In Scopus CO-AUTHOR
2016
A New Tomographic Based Keypoint Descriptor Using Heuristic Genetic Algorithm
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2016
A Survey Of Feature Extraction Techniques In Content-Based Illicit Image Detection
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2016
Enhanced Rules Application Order To Stem Affixation, Reduplication And Compounding Words In Malay Texts
KNOWLEDGE MANAGEMENT AND ACQUISITION FOR INTELLIGENT SYSTEMS
Publication In Scopus CO-AUTHOR
2016
Wireless Sensor Network Performance Analysis And Effect Of Blackhole And Sinkhole Attacks
JURNAL TEKNOLOGI
Publication In Scopus CO-AUTHOR
2016
Mobility Information Estimation Algorithm Using Kalman-Filter For Vehicular Ad Hoc Networks
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY
Publication In Scopus UTM FIRST AUTHOR
2016
Malicious Node Detection Through Trust Aware Routing In Wireless Sensor Networks
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2015
Principal Component Analysis-Based Data Reduction Model For Wireless Sensor Networks
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING
Publication In Web Of Science UTM FIRST AUTHOR
2015
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014
Publication In Scopus UTM FIRST AUTHOR
2015
Hidden Features Extraction Using Independent Component Analysis For Improved Alert Clustering
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT)
Publication In Scopus CO-AUTHOR
2015
Systematic Review On Existing Load Balancing Techniques In Cloud Computing
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS
Journal Article Non Citation-Indexed CO-AUTHOR
2015
A Survey Of Wireless Sensor Network Security And Routing Techniques
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY
Publication In Scopus CO-AUTHOR
2015
Fast And Effective Bag-Of-Visual-Word Model To Pornographic Images Recognition Using The Freak Descriptor
JOURNAL OF SOFT COMPUTING AND DECISION SUPPORT SYSTEMS
Journal Article Non Citation-Indexed CO-AUTHOR
2015
Deploying Cloud Computing Technology In E-Learning For Malaysian Polytechnic
JOURNAL OF NETWORK AND INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2015
Security In Wireless Sensor Network: Approaches And Issues
TELKOMNIKA INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING
Journal Article Non Citation-Indexed CO-AUTHOR
2015
Design Consideration For Improved Term Weighting Scheme For Pornographic Web Sites
4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, WICT 2014 (ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING)
Publication In Scopus CO-AUTHOR
2015
Lightweight Symmetric Encryption Algorithm In Big Data
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS
Publication In Scopus CO-AUTHOR
2015
Defining Generic Attributes For Ids Classification
JURNAL TEKNOLOGI (SCIENCES & ENGINEERING)
Publication In Scopus CO-AUTHOR
2015
Cloud Computing: A General Userã¢Â€Â™S Perception And Security Awareness In Malaysian Polytechnic
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING VOLUME
Publication In Scopus CO-AUTHOR
2015
A General User’S Perception And Security Awareness In Malaysian Polytechnic
PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING VOLUME
Publication In Scopus CO-AUTHOR
2015
Data Verification And Misbehavior Detection In Vehicular Ad-Hoc Networks
JURNAL TEKNOLOGI
Publication In Scopus UTM FIRST AUTHOR
2015
A Hybrid Color Space For Skin Detection Using Genetic Algorithm Heuristic Search And Principal Component Analysis Technique
PLOS ONE
Publication In Web Of Science CO-AUTHOR
2015
Enhancing Rough Set Theory Attributes Selection Of Kdd Cup 1999.
JOURNAL OF THEORETICAL & APPLIED INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2015
Data Integrity And Privacy Model In Cloud Computing
INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus CO-AUTHOR
2014
A Taxonomy On Intrusion Alert Aggregation Techniques
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus CO-AUTHOR
2014
Mobility Pattern Based Misbehavior Detection To Avoid Collision In Vehicular Adhoc Networks
LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS)
Publication In Scopus CO-AUTHOR
2014
Secure Search Over Encrypted Data In Cloud Computing
PROCEEDINGS - 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES, ACSAT 2013
Publication In Scopus CO-AUTHOR
2014
Spam Detection Using Hybrid Artificial Neural Network And Genetic Algorithm
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 13TH 2013
Publication In Scopus UTM FIRST AUTHOR
2014
Security Issues And Attacks In Wireless Sensor Network
WORLD APPLIED SCIENCES JOURNAL
Publication In Scopus CO-AUTHOR
2014
Printed Document Integrity Verification Using Barcode
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING)
Publication In Scopus CO-AUTHOR
2014
Enhanced Rules Application Order Approach To Stem Reduplication Words In Malay Text
RECENT ADVANCES ON SOFT COMPUTING AND DATA MINING ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING
Publication In Scopus CO-AUTHOR
2014
Islamic Web Content Filtering And Categorization On Deviant Teaching
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING
Publication In Scopus CO-AUTHOR
2014
Adaptive And Online Data Anomaly Detection For Wireless Sensor Systems
KNOWLEDGE-BASED SYSTEMS
Publication In Web Of Science CO-AUTHOR
2014
A Colour Space For Skin Detection Using Principal Components Analysis Technique
JOURNAL OF APPLIED AND ENVIRONMENTAL BIOLOGICAL SCIENCES
Journal Article Non Citation-Indexed CO-AUTHOR
2014
Colour Space Using Principal Component Analysis Technique For Skin Detection
2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND SOCIAL SCIENCES (ICCS-14) (RIZE, TURKEY)
Proceedings CO-AUTHOR
2014
Malicious Data Detection In Vehicular Ad-Hoc Networks
1ST INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES
Proceedings UTM FIRST AUTHOR
2014
Mobility Pattern Based Misbehavior Detection In Vehicular Adhoc Networks To Enhance Safety
2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO, ICCVE 2014 - PROCEEDINGS
Publication In Scopus UTM FIRST AUTHOR
2014
E-Tafseer: Plants And Animals From Al-Quran
2ND INTERNATIONAL CONFERENCE ON ISLAMIC APPLICATIONS IN COMPUTER SCIENCE AND TECHNOLOGIES (IMAN 2014)
Conference Paper CO-AUTHOR
2014
Selection Of Soil Features For Detection Of Ganoderma Using Rough Set Theory
THIRD WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES
Conference Paper UTM FIRST AUTHOR
2014
A Digital Forensic Investigation Model For Insider Misuse
PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY (CCSEIT-2013)
Publication In Scopus CO-AUTHOR
2013
Advancements Of Data Anomaly Detection Research In Wireless Sensor Networks: A Survey And Open Issues
SENSORS
Publication In Web Of Science UTM FIRST AUTHOR
2013
An Adaptive And Efficient Dimension Reduction Model For Multivariate Wireless Sensor Networks Applications
APPLIED SOFT COMPUTING
Publication In Web Of Science UTM FIRST AUTHOR
2013
Feature Extraction Process: A Phishing Detection Approach
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 13TH 2013
Publication In Scopus UTM FIRST AUTHOR
2013
Compact Classification Of Optimized Boolean Reasoning With Particle Swarm Optimization
INTELLIGENT DATA ANALYSIS
Publication In Web Of Science CO-AUTHOR
2012
Data Reduction And Ensemble Classifiers In Intrusion Detection
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008
Conference Paper INDIVIDUAL AUTHOR
2008
Ensemble Of One-Class Classifiers For Network Intrusion Detection System
Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
Conference Paper INDIVIDUAL AUTHOR
2008
Class Specific Features For Attacks In Network Intrusion Detection System
Jurnal Teknologi Maklumat
Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR
2008
Using Significant Features For Classification Of Attacks In Intrusion Detection
Advanced computer network & security
Book Chapter INDIVIDUAL AUTHOR
2008
Feature Selection Using Rough-Dpso In Anomaly Intrusion Detection
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS- ICCSA 2007, PT 1 PROCEEDING
Publication In Web Of Science CORRESPONDING AUTHOR
2007

Legend : IP CATEGORY IP LEVEL

Intellectual Property Name Grant Register No. IP Level IP Category
NKABOT 2018065829 Class 42 NATIONAL TRADEMARK
ENHANCED MALAY WORD STEMMING METHOD NATIONAL PATENT
ENHANCED REDUPLICATION WORD STEMMING METHOD NATIONAL PATENT
ENHANCED AFFIXATION WORD STEMMING METHOD NATIONAL PATENT
TAGRAPH: KNOWLEDGE GRAPH OF THREAT ACTOR LY2020006176 NATIONAL COPYRIGHT
IMPROVED VEHICLE POSITIONING ALGORITHM USING ENHANCED INNOVATION-BASED ADAPTIVE KALMAN FILTER LY2018006418 NATIONAL COPYRIGHT
CLOUD SCALABLE MULTI-OBJECTIVE CAT SWARM OPTIMIZATION-BASED SIMULATED ANNEALING ALGORITHM CSM-CSOSA LY2018006375 NATIONAL COPYRIGHT
ORTHOGONAL TAGUCHI-BASED CAT ALGORITHM OTB-CSO FOR SOLVING TASK SCHEDULING PROBLEM IN CLOUD COMPUTING LY2018006376 NATIONAL COPYRIGHT
VISUALIZATION DASHBOARD FOR FOREIGN WORKERS IN PENGERANG LY2018006271 NATIONAL COPYRIGHT
LEACH-CR ALGORITHM FOR ENERGY EFFICIENT IN WIRELESS SENSOR NETWORKS LY2018001366 NATIONAL COPYRIGHT
DISTRIBUTED CENTERED ELLIPSOID SUPPORT VECTOR MACHINE - DIMENSION REDUCTION (DCESVM-DR) NATIONAL COPYRIGHT
AN ONTOLOGY FRAMEWORK OF THE STRATEGIC THREAT INTELLIGENCE FOR SOUTH CHINA SEA CONFLICT NATIONAL COPYRIGHT
ADIBA - PROCESS FRAMEWORK FOR ACCELERATING DIGITAL TRANSFORMATION USING BIG DATA ADOPTION AND IMPLEMENTATION NATIONAL COPYRIGHT
ENSEMBLE CLASSIFICATION APPROACH FOR ENHANCED FRAUD DETECTION SYSTEM (FDS) MODEL NATIONAL COPYRIGHT
ENHANCED FRAUD DETECTION SYSTEM (FDS) MODEL WITH COMBINATION OF ADAPTIVE LEARNING STRATEGIES NATIONAL COPYRIGHT
WORKFLOW OF FEATURE SELECTION FOR ENHANCED FRAUD DETECTION SYSTEM (FDS) MODEL USING FORWARD AND BACKWARD STEPWISE APPROACH IN MULTIVARIATE ADAPTIVE REGRESSION SPLINES (MARS) ALGORITHM NATIONAL COPYRIGHT
FLOWCHART OF FEATURE DERIVATION AND USER PROFILES DEVELOPMENT FOR ENHANCED FRAUD DETECTION SYSTEM (FDS) MODEL NATIONAL COPYRIGHT
INFORMATION TECHNOLOGY APTITUDE TEST LY2020006298 NATIONAL COPYRIGHT
POLITICAL SENTIMENT ANALYTIC DASHBOARD USING FACEBOOK AND NEWS DATA LY2020006350 NATIONAL COPYRIGHT
INTERACTIVE WEB DESIGN FOR DESCRIPTIVE AND PRESCRIPTIVE DATA OF COVID-19 IN MALAYSIA LY2020006193 NATIONAL COPYRIGHT
IOT THREAT SENSOR NATIONAL COPYRIGHT
MY E-TAFSIR (APLIKASI ANDROID) NATIONAL COPYRIGHT
MOBILITY PATTERN FORMATION ALGORITHM (MPFA) TO ENHANCE SAFETY AND TRAFFIC EFFICIENCY IN VANET WITH PRESERVING SECURITY AND PRIVACY NATIONAL COPYRIGHT
MISBEHAVIOR DETECTION ALGORITHM BASED ON MOBILITY PATTERN ANALYSIS FOR VANET SAFETY APPLICATION NATIONAL COPYRIGHT
DPCCAD-A DISTRIBUTED ANOMALY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORK NATIONAL COPYRIGHT
R_PCADR- ROBUST DATA DIMENSIONALITY REDUCTION ALGORITHM BASED ON INCREMENTAL PRINCIPAL COMPONENT ANALYSIS FOR HIERARCHICAL WIRELESS SENSOR NETWORKS NATIONAL COPYRIGHT
APCCAD- ADAPTIVE ANOMALY DETECTION ALGORITHM FOR WIRELESS SEOSNOR NETWORKS BASED ON PRINCIPAL COMPONENT CLASSIFIER NATIONAL COPYRIGHT
PCCAD- EFFICIENT ONLINE ANOMALY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS BASED ON PRINCIPAL COMPONENT CLASSIFIER NATIONAL COPYRIGHT
MCC-1513-ADVANCED ARTIFICIAL INTELLIGENCE LECTURE#10: ARTIFICIAL IMMUNE SYSTEM NATIONAL COPYRIGHT
MCC 1513-ADVANCED ARTIFICIAL INTELLIGENCE LECTURE #9: SWARM INTELLIGENCE- PARTICLE SWARM OPTIMIZATION NATIONAL COPYRIGHT
MCC 1513-ADVANCED ARTIFICIAL INTELLIGENCE LECTURE #8:EVOLUTIONARY COMPUTING & GENETIC ALGORITHM NATIONAL COPYRIGHT

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
MURAD ABDO RASSAM QASEM
AN ANOMALY DETECTION MODEL USING CANDID COVARIANCE-FREE INCREMENTAL PRINCIPAL COMPONENT ANALYSIS FOR WIRELESS SENSOR NETWORKS
PHD GRADUATED CO-SUPERVISOR 2013
SEYEDHADI YAGHOUBYAN
ILLICIT IMAGE DETECTION BASED ON ENHANCED BAG OF VISUAL WORD MODEL
PHD GRADUATED CO-SUPERVISOR 2017
FUAD ABDULGALEEL ABDOH GHALEB
CONTEXT-AWARE MISBEHAVIOUR DETECTION MODEL FOR VEHICLE AD HOC NETWORK USING STATISTICAL TECHNIQUES
PHD GRADUATED SUPERVISOR 2017
DANLAMI GABI
DYNAMIC AND SCALABLE TASK SCHEDULING SCHEMES FOR CLOUD COMPUTING USING ORTHOGONAL TAGUCHI-BASED CAT SWARM OPTIMISATION
PHD GRADUATED CO-SUPERVISOR 2017
AHLAM HASHIM MOHSIN
CONGESTION-AWARE AND PREDICTIVE GEO-CASTING ROUTING SCHEMES FOR MOBILE AD HOC NETWORK
PHD GRADUATED CO-SUPERVISOR 2017
AISHA ABDALLAH ZAIN ALABDEEN AHMED
ADAPTIVE ANOMALY BASED FRAUD DETECTION MODEL FOR HANDLING CONCEPT DRIFT IN SHORT-TERM PROFILE
PHD GRADUATED CO-SUPERVISOR 2018
TAGWA AHMED MOHAMED ALHAJ
AN EFFECTIVE ATTACK SCENARIO CONSTRUCTION MODEL BASED ON TWO-TIER FEATURE SELECTION AND COARSE GRAIN CLEANING
PHD GRADUATED CO-SUPERVISOR 2018
NURUDEEN IBRAHIM MAHMUD
AN ADAPTIVE AND DISTRIBUTED INTRUSION DETECTION SCHEME FOR CLOUD COMPUTING
PHD GRADUATED SUPERVISOR 2019
MOHAMAD NIZAM BIN KASSIM
ENHANCED TEXT STEMMER FOR STANDARD AND NON-STANDARD WORD PATTERNS IN MALAY TEXTS
PHD GRADUATED CO-SUPERVISOR 2019
MUSTAFA SABAH TAHA EL-TAMEEMI
AN IMPROVED IMAGE STEGANOGRAPHY SCHEME BASED ON DISTINCTION GRADE VALUE AND SECRET MESSAGE ENCRYPTION
PHD GRADUATED CO-SUPERVISOR 2020
AJIBADE SAMUEL MOFOLUWA
HYBRID CHAOTIC MAP PARTICLE SWARM OPTIMIZATION AND DIFFERENTIAL EVOLUTION FOR FEATURE SELECTION AND CLASSIFICATION
PHD GRADUATED CO-SUPERVISOR 2021
MUHALIM BIN MOHAMED AMIN
ENHANCED FRAUD DETECTION MODEL BASED ON ENSEMBLE CLASSIFICATION AND CONCEPT DRIFT
PHD GRADUATED SUPERVISOR 2021
RAJA WASEEM ANWAR
TRUST-BASED ENERGY EFFICIENT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
PHD GRADUATED SUPERVISOR 2021
NURFAZRINA BINTI MOHD ZAMRY
DISTRIBUTED ANOMALY DETECTION SCHEME BASED ON LIGHTWEIGHT DATA AGGREGATION IN WIRELESS SENSOR NETWORK
PHD GRADUATED SUPERVISOR 2021
MUHAMMAD ZAFRAN BIN MUHAMMAD ZALY SHAH
PROTOTYPE-BASED MANIFOLD REGULARIZATION APPROACH WITH CONCEPT DRIFT ADAPTATION IN DATA STREAM CLASSIFICATION
PHD GRADUATED SUPERVISOR 2022
KHAIRUN NISYAK BINTI ZAKARIA
THREAT DRIVEN CYBERSECURITY AUDIT MODEL USING METAMODELLING APPROACH
PHD GRADUATED SUPERVISOR 2022
SITI SALMAH BINTI MD KASSIM
USER TRUST EVALUATION SCHEME BASED ON SERVICE LEVEL AGREEMENT IN CLOUD BASED E-LEARNING
PHD GRADUATED SUPERVISOR 2023
MOHAMMAD ALI NASSIRI ABRISHAMCHI
DECENTERALIZED ENERGY EFFICIENT ZERO-DELAY PRIVACY PROTECTION METHOD AGAINST FINGERPRINT AND TIMING-BASED SNOOPING ATTACK
PHD GRADUATED SUPERVISOR 2023
FAITOURI AWADH FAITOURI ABDULLAH
STACKING AND ENSEMBLE EVASIVE MALWARE DETECTION MODEL BASED ON IMPROVED FEATURE EXTRACTION AND REPRESENTATION TECHNIQUES
PHD GRADUATED SUPERVISOR 2023
HASHIM HUSSEIN TAHA
AN INTRUSION ALERT CORRELATION MODEL BASED ON DATA ANALYSIS AND GRAPH CONVOLUTIONAL NETWORK (GCN) APPROACH  
PHD ON GOING CO-SUPERVISOR
ANIS F ABDALLA ELGARDUH
ENHANCING MALWARE DETECTION: A HYBRID IMAGE GENERATION MODEL WITH SPP-NET ADAPTATION AND FEW-SHOT LEARNING
PHD ON GOING SUPERVISOR
FAWAZ MOHAMMAD HAYEL OTHMAN

PHD ON GOING SUPERVISOR
UMARA UROOJ
ADAPTIVE EARLY DETECTION SYSTEM FOR CRYPTO-RANSOMWARE ATTACKS
PHD ON GOING CO-SUPERVISOR
ALMANIA MOAAD ABDULAZIZ M
A FUZZY ADAPTIVE DYNAMIC EVOLVING SPIKING NEURAL NETWORK BASED INTRUSION DETECTION MODEL FOR EDGE COMPUTING  
PHD ON GOING SUPERVISOR
ZUBAIDI MAYTHAM SAHAR SAEED
DEEP LEARNING-BASED ADAPTIVE ECONOMIC DENIAL OF SUSTAINABILITY ATTACK DETECTION MODEL FOR PUBLIC CLOUD ENVIRONMENT    
PHD ON GOING SUPERVISOR
MOHAMMED FAEZ ABDULLAH ALJABERI

PHD ON GOING SUPERVISOR
NOOR AZEERA BINTI ABDUL AZIZ
FUSION OF ENHANCED TEXT-BASED AND WORD EMBEDDING FEATURES FOR HATE SPEECH AND OFFENSIVE LANGUAGE MULTI-CHANNEL DEEP LEARNING CLASSIFICATION
PHD GRADUATED SUPERVISOR 2024
ABU SAQ ABDULLAH HUSSAIN H
A CONTEXT-AWARE ADAPTIVE INTRUSION DETECTION MODEL FORÂ THE INTERNET OF THINGS USING DEEP BELIEF NETWORK
PHD ON GOING CO-SUPERVISOR
ANAS ROUBI ABDELSATTAR ROUBI NASR
ENHANCING WEB APPLICATION FIREWALLS WITH IMAGE-BASED THREAT DETECTION
PHD ON GOING SUPERVISOR
ABDULAH AHMAD ALSOLAIMAN
ADAPTIVE CONTEXT-AWARE MISBEHAVIOUR DETECTION SYSTEM FOR VEHICUALR AD-HOC NETWORKS
PHD ON GOING SUPERVISOR
RAWAN ADEL FAWZI AL-SHARIDA
AN INTEGRATED MODEL FOR EVALUATING USERS’ CYBERSECURITY BEHAVIORS IN THE METAVERSE: EVIDENCE FROM SEM-ANN APPROACH  
PHD ON GOING CO-SUPERVISOR
AL LAWATI HADI MOHAMED REDHA MOHSIN
AN INTEGRATED ADAPTIVE WINDOWING AND STOCHASTIC GRADIENT DESCENT FOR DYNAMIC FRAUD DETECTION IN PAYMENT SYSTEMS   
PHD ON GOING SUPERVISOR
MARINA BINTI MD ARSHAD
PROFILING OF MONEY LAUNDRING CRIMES USING GRAPH ANALYTICS
PHD ON GOING SUPERVISOR
ADAM KHALID
ENHANCED MACHINE LEARNING FRAMEWORK FOR APT DETECTION
PHD ON GOING SUPERVISOR
EMILY TSWAFIA KORMENE

PHD ON GOING SUPERVISOR
MUHAMMAD AKMAL DODGSON BIN TARIQ
CYBER FRAUD CONCEPT MODEL  
PHD ON GOING SUPERVISOR
NORDALIELA BINTI MOHD RUSLI
GRAPH CONVOLUTIONAL NETWORKS FOR MONEY LAUNDERING SUSPICIOUS TRANSACTIONS DETECTION WITH RE-WEIGHTED NETWORK
PHD ON GOING SUPERVISOR
MUHAMMAD YUSUF IDRIS

PHD ON GOING CO-SUPERVISOR
WANG ZHEN
CONVOLUTIONAL SPIKING NEURAL NETWORK BASED EFFICIENT INTRUSION DETECTION MODEL FOR INTERNET OF THINGS
PHD ON GOING SUPERVISOR
IMRAN MOHD KHAN
DETECTION OF DDOS ATTACKS ON SOFTWARE DEFINED NETWORK’S CONTROLLER USING ENSEMBLE MACHINE LEARNING TECHNIQUES  
PHD ON GOING SUPERVISOR
SARA MAROUF

MASTER GRADUATED SUPERVISOR 2013
LEE CHUN HOW

MASTER GRADUATED SUPERVISOR 2013
MOHAMMED FAEZ ABDULLAH ALJABERI

MASTER GRADUATED SUPERVISOR 2013
MIRANDA DABIRANZOHOURI

MASTER GRADUATED CO-SUPERVISOR 2013
FUAD ABDULGALEEL ABDOH GHALEB
CONTEXT-AWARE MISBEHAVIOUR DETECTION SCHEME FOR VEHICULAR AD HOC NETWORK
MASTER GRADUATED CO-SUPERVISOR 2013
MOHAMUD SHEIKH-ALI HUSSEIN

MASTER GRADUATED SUPERVISOR 2014
MOHAMAD NIZAM BIN KASSIM
ENHANCED TEXT STEMMER WITH STRUCTURED ORDER RULES FOR STANDARD AND NON-STANDARD WORD PATTERNS
MASTER GRADUATED CO-SUPERVISOR 2014
MOHAMMED ABDULLAH OMAR AL ZUBAIDI

MASTER GRADUATED SUPERVISOR 2014
DENI YULIANTI
ENHANCEMENTS OF ADAPTIVE FUZZY SPRAY AND WAIT PROTOCOL FOR POCKET SWITCHED NETWORK
MASTER GRADUATED SUPERVISOR 2015
'UZMA BINTI MOHAMAD TAHIR
KNOWLEDGE GRAPH
MASTER GRADUATED SUPERVISOR 2016
ABDULHAMID ALIYU ARDO

MASTER GRADUATED SUPERVISOR 2016
ALI HAMDI FERGANI ALI
HYBRID MODEL FOR SENTIMENT ANALYSIS OF MULTI-FACETED ARABIC REVIEWS
MASTER GRADUATED SUPERVISOR 2017
OKWARA JERRY CHIZOBA

MASTER GRADUATED SUPERVISOR 2019
NUR SHAMILLA BINTI SELAMAT
ASPECT-BASED SENTIMENT ANALYSIS OF TOURISTS' REVISIT INTENTION FROM TOURISTS' ONLINE REVIEWS ON THEME PARKS
MASTER GRADUATED CO-SUPERVISOR 2020
NURULMANJA ATIQAH BINTI MALIKI
USER SECURITY AND SOCIAL VULNERABILITIES BEHAVIOURAL PROFILE USING HISTORICAL BROWSING WEBSITE
MASTER GRADUATED SUPERVISOR 2021
MUHAMMAD LIMAN GAMBO

MASTER GRADUATED SUPERVISOR 2022
MUHAMMAD AKMAL DODGSON BIN TARIQ
CYBER FRAUD CONCEPT MODEL  
MASTER GRADUATED SUPERVISOR 2022
NURFADILAH BINTI ARIFFIN
RANSOMWARE BEHAVIOUR ENTITY CLASSIFICATION FROM ONLINE FORUM
MASTER GRADUATED SUPERVISOR 2022
FIFY FARISHA BINTI ASMAWALI

MASTER GRADUATED SUPERVISOR 2022
ERIC KHOO JIUN HOOI
ENTITY EMBEDDINGS AND RANK-BASED BOOTSTRAP COST SENSITIVE STACKING METHOD FOR CUSTOMS TAX EVASION DETECTION
MASTER GRADUATED SUPERVISOR 2023
HUSNIYAH BINTI AB RAHMAN

MASTER ON GOING SUPERVISOR
WAN MUHAMMAD ARIF AMRIN BIN WAN ROSLEE
INTERNET OF THINGS (IOT) SECURITY READINESS ASSESSTMENT FOR MALAYSIAN SMALL TO MEDIUM ENTERPRISES (SMES)
MASTER ON GOING SUPERVISOR
UMMU SULAIM BINTI MOHD EMRAN

MASTER ON GOING SUPERVISOR
MUHAMMAD FARIS EZANY BIN ZIKRI

MASTER ON GOING SUPERVISOR