GRANT(PI & MEMBERS)

18

PUBLICATIONS

19

INDEXED PUBLICATION

8

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

NATIONAL GRANTS
3
UNIVERSITY FUND
2
TOTAL

Publications

INDEXED PUBLICATION
8
NON-INDEXED PUBLICATION
1
OTHERS PUBLICATION
10
TOTAL

Supervisions

MASTER
10
PHD
11
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
A Master Data Management (MDM) Quality Model for a Centralized Data Exchange (CDX) Platform: Malaysia Public Sector Case Study
RUG OF UTM Tier 1
2015
A STUDY ON POTENTIAL SOCIO-ECONOMIC IMPACT OF ENERGY EFFICIENT VEHICLE INDUSTRY IN MALAYSIA
RUG OF UTM Tier 1
2015
pembangunan laman web jabatan pendidikan tinggi, kementerian pendidikan tinggi
Business Entity
2015
INTRUSION DETECTION SYSTEM FOR SOFTWARE AS A SEVICE IN CLOUD COMPUTING ENVIRONMENT.
RUG OF UTM Encouragement Grant
2014
DEVELOPING A NOVEL FRAMEWORK FOR CLOUD COMPUTING USING MEDICAL APPROACH.
RUG OF UTM Tier 2
2012
A TEST COVERAGE MODEL TO SUPPORT SOFTWARE DEVELOPMENT AND MAINTENANCE
RUG OF UTM Tier 1
2012
Analysis and assessment of bluetooth vulnerabilities in high end cars
SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor
2012
Development of a Mediated Discovery Approach to Support Semantic Web Services Interaction.
RUG OF UTM Tier 1
2011
A Secure Modeling for Semantic Web Service Composition
RUG OF UTM Tier 2
2011
Development of an Automated Testing Approach to Support Semantic Web Services Composition
RUG OF UTM Tier 1
2011
The Development of Advanced Methods in Reverse Engineering Technique for Software Maintenance
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1998
Database Security: The Application Of Cryptographic Technology In Commercial Database
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1996
Security Control and Analysis System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1992
Design and Development of Achieve System Data Through Driver Data
Short Term
1991
Writing Interfacing Device Drivers.
Short Term
1991
Pembangunan perisian Am Audit Komputer
Short Term
1990

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY
Publication In Scopus UTM FIRST AUTHOR
2017
A Holistic Botnet Detection Framework Independent Of Botnet Protocols And Architecture
1ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY
Conference Paper UTM FIRST AUTHOR
2016
Proposed Architecture For Intrusion Detection System For Software As A Service In Cloud Computing Environment
4 INTERNATIONAL CONFERENCE ON ENGINEERING BUSINESS MANAGEMENT (ICEBM 2015) MAYA HOTEL, KUALA LUMPUR ORGANIZED BY : UTM RAZAK SCHOOL OF ENGINEERING AND ADVANCED TECHNOLOGY, UTM KUALA LUMPUR, KUALA LUMPUR, MALAYSIA & GRADUATE SCHOOL OF BUSINESS ADMINISTRATION (GSBA), MEIJI UNIVERSITY, TOKYO, JAPAN PRO CEEDINGS TH
Proceedings CO-AUTHOR
2015
A Novel Wlan Client Puzzle Against Dos Attack On Pattern Matching
MATHEMATICAL PROBLEMS IN ENGINEERING
Publication In Web Of Science UTM FIRST AUTHOR
2015
Kumpulan Penyelidik Myev
HTTP://WWW.UTUSAN.COM.MY/SAINS-TEKNOLOGI/TEKNOLOGI/KUMPULAN-PENYELIDIK-MYEV-DARI-KANAN-DR-MOHD-NAZRI-KAMA-DAN-1.171317
CORRESPONDING AUTHOR
2015
Traditional Security Risk Assessment Methods In Cloud Computing Environment: Usability Analysis
JURNAL TEKNOLOGI
Publication In Scopus CO-AUTHOR
2015
A Prototype For Network Intrusion Detection System Using Danger Theory
JURNAL TEKNOLOGI
Publication In Scopus UTM FIRST AUTHOR
2015
A Novel Wlan Client Puzzle Against Dos Attack On Pattern Matching
MATHEMATICAL PROBLEMS IN ENGINEERING
Publication In Web Of Science UTM FIRST AUTHOR
2015
Pengecas Kenderaan Elektrik
UTUSAN MALAYSIA
UTM FIRST AUTHOR
2015
Cloud Computing Adoption Challenges
ADVANCED SCIENCE LETTERS
Publication In Scopus CO-AUTHOR
2014
Security Risk Assessment Framework For Cloud Computing Environments
SECURITY AND COMMUNICATION NETWORKS JOURNAL
Publication In Web Of Science CO-AUTHOR
2014
A Case Study For The Cloud Computing Security Threats In A Governmental Organization
COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014 INTERNATIONAL CONFERENCE ON
Conference Paper CO-AUTHOR
2014
Chapter 33. Alert Processing Method With Data Reduction And Correlation Technique
RECENT TRENDS IN SOCIAL AND BEHAVIOUR SCIENCES PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INTERDISCIPLINARY BEHAVIOUR AND SOCIAL SCIENCES 2013
Book Chapter UTM FIRST AUTHOR
2014
Traditional Security Risk Assessment Methods In Cloud Computing Environment: Usability Analysis
INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES 2014 (IRICT 2014)
Conference Paper CO-AUTHOR
2014
Danger Theory Based Hybrid Intrusion Detection Systems For Cloud Computing
INTERNATIONAL JOURNAL OF COMPUTER AND COMMUNICATIONS ENGINEERING
Journal Article Non Citation-Indexed CO-AUTHOR
2013
New Wedges Design For Audible Frequency Test Anechoic Room
Seminar Kebangsaan Pendidikan Sains dan Matematik
Conference Paper INDIVIDUAL AUTHOR
2008
A Static Analysis Approach To Support Program Understanding Of Structured Program
The 3rd Malaysian Software Engineering Conference
Conference Paper INDIVIDUAL AUTHOR
2007
Online Handwritten Signature Verification Discriminators Based On Global Feature
Postgraduate Annual Research Seminar (PARS¿ 07).
Conference Paper INDIVIDUAL AUTHOR
2007
Improved Hybrid Intelligent Intrusion Detection System Using Ai Technique.
Neural Network World, 17(4)
Publication In Web Of Science INDIVIDUAL AUTHOR
2007

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
AWAD MOHED AWADELKARIM
AN XML-BASED MODEL FOR INTEGRATING AND MANAGING LABEL-BASED ACCESS CONTROL OF HETEROGENEOUS LEGACY DATABASES
PHD GRADUATED SUPERVISOR 2005
SUHAIMI BIN IBRAHIM
A DOCUMENT-BASED SOFTWARE TRACEABILITY TO SUPPORT CHANGE IMPACT ANALYSIS OF OBJECT-ORIENTED SOFTWARE
PHD GRADUATED SUPERVISOR 2006
BHARANIDHARAN SHANMUGAM
A HYBRID INTELLIGENT INTRUSION DETECTION SYSTEM USING FUZZY LOGIC AND IMPROVED PACKET TRACING MODEL
PHD GRADUATED SUPERVISOR 2009
HAMED KHIABANI
A UNIFIED TRUST MODEL FOR PERVASIVE COMPUTING ENVIRONMENT
PHD GRADUATED SUPERVISOR 2013
ALI ORDI
DNA-BASED CLIENT PUZZLE FOR WLAN ASSOCIATION PROTOCOL AGAINST CONNECTION REQUEST FLOODING
PHD GRADUATED CO-SUPERVISOR 2016
UPASNA OBEROI SALUJA
INFORMATION SECURITY RISK ASSESSMENT METHODOLOGY USING PARTIAL LEAST SQUARES STATISTICAL TECHNIQUE
PHD GRADUATED SUPERVISOR 2016
KHALIL SALAH
INDEPENDENT PROTOCOL SUPPORTING REAL-TIME CROSS-NETWORK AUTHENTICATION IN ELECTRIC VEHICLES' NETWORK
PHD GRADUATED CO-SUPERVISOR 2018
NORZAKIMI BIN ZAHARI

MASTER ON GOING SUPERVISOR
NOR ALIZA BTE MOHD JALI

MASTER ON GOING SUPERVISOR
RAMLI BIN JAAFAR

MASTER ON GOING SUPERVISOR
TEOH SU CHI

MASTER ON GOING SUPERVISOR
NAZARUDDIN BIN OMAR
ONLINE SIGNATURE VERIFICATION BASED ON DYNAMIC FEATURE DISCRIMINATORS
MASTER GRADUATED SUPERVISOR 2009
DAHLIA BINTI DIN
STATIC ANALYZER IN JAVA CODE AS A PROTOTYPE FOR REVERSE ENGINEERING TECHNIQUE
MASTER GRADUATED SUPERVISOR 2009
RITA NOREMI BT MOHAMAD
SOFTWARE VISUALIZATION TO SUPPORT IMPACT ANALYSIS PROPOSAL
MASTER GRADUATED SUPERVISOR 2009
ABUBAKER ESSID ABUHTERA
INFORMATION SECURITY AWARENESS AND TRAINING PROGRAM STUDY ON WAHDA BANK-LIBYA
MASTER GRADUATED SUPERVISOR 2013
ROHAYU BINTI A. WAHID

MASTER GRADUATED SUPERVISOR 2016