GRANT(PI & MEMBERS)

41

PUBLICATIONS

82

INDEXED PUBLICATION

50

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

INDUSTRY GRANTS
4
NATIONAL GRANTS
4
UNIVERSITY FUND
3
TOTAL

Publications

INDEXED PUBLICATION
50
NON-INDEXED PUBLICATION
9
OTHERS PUBLICATION
23
TOTAL

Supervisions

DEGREE
0
MASTER
6
PHD
11
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
SAFEUHUB CLOUD RESEARCH ON SYSTEM MIGRATION AND PREVENTIVE MAINTENANCE FRAMEWORK
UMW CORPORATION SDN. BHD. Contract Research DTD
2022
Occluded Face Detection with Context Awareness Using Machine Learning
RUG OF UTM Industry-International Incentive Grant
2021
HSSE Scheduled Waste e-Tracking System (SWeT)
UMW CORPORATION SDN BHD Contract Research DTD
2020
Tjap Go Meh - Introduction of Acculturation as Mutual Respect for Society
TELKOM UNIVERSITY International Grant
2020
STUDY AND DEVELOPMENT OF HIGH-LEVEL INTEGRATION BETWEEN PHYSICAL SECURITY INFORMATION SYSTEM (PSIM) VMS, PIDS, ACS, PA SYSTEM, VIDEO ANALYTICS AND BMS DEVICES.(UIP-UNIFIED INTELLIGENT PLATFORM)
VENTIONEX INTERNATIONAL SDN BHD Contract Research DTD
2020
RPG GAME APPROACH FOR TJAP GO MEH - ACCULTURATION AS MUTUAL RESPECT FOR SOCIETY
RUG OF UTM Matching Grant
2020
UTM FACE SHIELD DAN INTUBATION BOX: PENYEDIAAN PERLIDUNGAN UNTUK PETUGAS KESIHATAN MENANGANI COVID-19
RUG OF UTM UTM R&D Fund
2020
THE DEVELOPMENT OF UMW HEALTH, SAFETY AND ENVIRONMENT SOFTWARE FOR INDUSTRIAL 4.0 TRANSFORMATION
UMW CORPORATION SDN BHD Contract Research DTD
2019
MRUN 5.2 : GAMIFICATION PLATFORM USER DATA AND CONTENT SECURITY USING BLOCKCHAIN TECHNOLOGY FOR UNIVERSITY 4.0
MINISTRY OF EDUCATION MALAYSIA RESEARCH UNIVERSITY NETWORK
2018
MRUN 5.0 - VIRTUAL REALITY AND GAMIFICATION PLATFORM FOR ENGINEERING AND TVET ENGINEERING IN UNIVERSITY 4.0
MINISTRY OF EDUCATION MALAYSIA RESEARCH UNIVERSITY NETWORK
2018
Study of Sharia Compliant Digital Coin
OK BLOCKCHAIN CENTRE SDN BHD Contract Research DTD
2018
Feasibility Study and The Development of HSE Software Prototype
UMW CORPORATION SDN BHD Contract Research DTD
2018
HYBRID CRYPTO-TOKEN BLOCKCHAIN: A NEW ARCHITECTURE OF DIGITAL MARKETPLACES
RUG OF UTM COE Research Grant
2018
PROGRAM USAHAWAN DIGITAL 2017
PERBADANAN USAHAWAN JOHOR SDN. BHD Networking Grant
2017
PEMUPUKAN MINAT REMAJA TERHADAP PEMBANGUNAN APPS BERASASKAN PEMBELAJARAN
RUG OF UTM Business Entity
2016
PANGKALAN DATA PROFIL BAKAT BELIA JOHOR
RUG OF UTM Institut Inovasi Strategik Johor
2016
PENGLIBATAN BELIA DI DALAM PEMBANGUNAN APPS BERKAITAN STEM
RUG OF UTM Institut Inovasi Strategik Johor
2016
Security and Privacy Enhancement with Middleware Device for Securing a Heterogeneous Internet of Things on Air Quality Monitoring
UNIVERSITAS SRIWIJAYA Networking Grant
2016
Hemodialysis Data Loss Mitigation and Patient Tracking During Flood Disaster
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Interactive Data Visualization
RUG OF UTM Flagship
2014
Hybrid Virtual Learning Platform For English Education
RUG OF UTM Flagship-COE
2014
ENHANCED DYNAMIC SKIN COLOUR DETECTION METHOD FOR STILL IMAGE BASED ON ONLINE SAMPLING APPROACH
RUG OF UTM Encouragement Grant
2014
REAL-TIME TEXT LOCALIZATION IN HIGH SIMILARITY BACKGROUND AND DISTORTION IMAGES ON WEARABLE MOBILE COMPUTER
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2013
URBAN WORKBENCH : GESTURE-BASED INTERACTION WITH 3D OBJECT TRACKING ON TABLETOP AUGMENTED REALITY
MINISTRY OF EDUCATION Exploratory Research Grant Scheme
2013
AN ARCHITECTURE OF INTELLIGENT TRANSPORTATION SYSTEMS BASED ON WIRELESS SENSOR NETWORKS
RUG OF UTM Tier 1
2012
Early detection algorithm for volume-based network intrusion detection
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2009
A Study on Advanced Statistical Analysis for Network Anomaly Detection
Short Term
2000
The Design and Development of Artificial Immune System Architecture for Intrusion Detection System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1999
A Metodologi Pembangunan Aplikasi Web (RMM & OOHM): Pendekatan baru bagi tujuan Kemudahan Pembangunan dan Penyelengaraaan
MINISTRY OF EDUCATION Short Term
1998
Design and Development of an Intelligent Security Layer for Web-Based Applications
Sciencefund
1998
A Authentification Technique on Electronic Performance Support System (EPSS) Security in a Web-Based Environmennt
MINISTRY OF EDUCATION Short Term
1998
The Development of Attack Response Mechanism for Intrusion Detection System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1998
Software Engineering Methodoligies for Modelling Complex Real-Time Systems
Short Term
1995
Sistem Pakar Rawatan Tradisional yang Tidak Bercanggah dengan Al-Quran dan Al-Sunnah
Short Term
1990

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
An Improved Lstm-Pca Ensemble Classifier For Sql Injection And Xss Attack Detection
COMPUTER SYSTEMS SCIENCE AND ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2023
The Development Of An Internet Of Things (Iot) Network Traffic Dataset With Simulated Attack Data
JOURNAL OF INTERNET TECHNOLOGY
Publication In Web Of Science UTM FIRST AUTHOR
2023
Iot Botnet Attack Detection Using Deep Autoencoder And Artificial Neural Networks
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
Publication In Web Of Science UTM FIRST AUTHOR
2023
Dimensional Reduction With Fast Ica For Iot Botnet Detection
JOURNAL OF APPLIED SECURITY RESEARCH
Publication In Web Of Science UTM FIRST AUTHOR
2023
Feature Selection Using Chi Square To Improve Attack Detection Classification In Iot Network: Work In Progress
INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI)
Publication In Scopus UTM FIRST AUTHOR
2022
Cyberattack Feature Selection Using Correlation-Based Feature Selection Method In An Intrusion Detection System
INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI)
Publication In Scopus UTM FIRST AUTHOR
2022
Blockchain-Based Distributed File System Security And Privacy: A Systematic Mapping Study
2022 4TH INTERNATIONAL CONFERENCE ON SMART SENSORS AND APPLICATION (ICSSA)
Publication In Scopus UTM FIRST AUTHOR
2022
Time Efficiency On Computational Performance Of Pca, Fa And Tsvd On Ransomware Detection
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATICS
Publication In Scopus UTM FIRST AUTHOR
2022
Improvement Of Attack Detection Performance On The Internet Of Things With Pso-Search And Random Forest
JOURNAL OF COMPUTATIONAL SCIENCE
Publication In Web Of Science UTM FIRST AUTHOR
2022
An Improved Robust Misbehavior Detection Scheme For Vehicular Ad Hoc Network
IEEE ACCESS
Publication In Web Of Science UTM FIRST AUTHOR
2022
Impact Of Dimensionality Reduction On Performance Of Iot Intrusion Detection System
INTERNET OF THINGS FRAMEWORKS FOR ENABLING AND EMERGING TECHNOLOGIES
Book Chapter UTM FIRST AUTHOR
2022
An Approach For Optimizing Ensemble Intrusion Detection Systems
IEEE ACCESS
Publication In Web Of Science UTM FIRST AUTHOR
2021
Ransomware Detection Based On Opcode Behaviour Using K-Nearest Neighbours Algorithm
INFORMATION TECHNOLOGY AND CONTROL
Publication In Web Of Science UTM FIRST AUTHOR
2021
Ping Flood Attack Pattern Recognition Using A K-Means Algorithm In An Internet Of Things (Iot) Network
IEEE ACCESS
Publication In Web Of Science UTM FIRST AUTHOR
2021
Designing Consensus Algorithm For Collaborative Signature-Based Intrusion Detection System
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2021
The Trend Malware Source Of Iot Network
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2021
Intrusion Detection With Deep Learning On Internet Of Things Heterogeneous Network
IAES INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE
Publication In Scopus UTM FIRST AUTHOR
2021
The Trends Of Supervisory Control And Data Acquisition Security Challenges In Heterogeneous Networks
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2021
Enhanced Deep Learning Intrusion Detection In Iot Heterogeneous Network With Feature Extraction
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATICS (IJEEI)
Publication In Scopus UTM FIRST AUTHOR
2021
The Future Of Office
UTM NEXUS
Publication In Academic And Profesional Magazine CORRESPONDING AUTHOR
2021
Agile Software Development Using Cloud Computing: A Case Study
IEEE ACCESS
Publication In Web Of Science CO-AUTHOR
2020
Iot Botnet Malware Classification Using Weka Tool And Scikit-Learn Machine Learning
2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCES AND INFORMATICS (EECSI)
Publication In Scopus UTM FIRST AUTHOR
2020
Optimal Parameters For Modified Butterfly Interpolation Scheme Inspired Configurations As Hole-Filling Method In 3d Volume Reconstruction
2020 IEEE GRAPHICS AND MULTIMEDIA (GAME)
Publication In Scopus CO-AUTHOR
2020
Poas: Enhanced Consensus Algorithm For Collaborative Blockchain Intrusion Detection System
2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICOIACT)
Publication In Scopus UTM FIRST AUTHOR
2020
Improving The Anomaly Detection By Combining Pso Search Methods And J48 Algorithm
2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCES AND INFORMATICS (EECSI)
Publication In Scopus UTM FIRST AUTHOR
2020
Cicids-2017 Dataset Feature Analysis With Information Gain For Anomaly Detection
IEEE ACCESS
Publication In Web Of Science UTM FIRST AUTHOR
2020
Features Extraction On Iot Intrusion Detection System Using Principal Components Analysis (Pca)
2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCES AND INFORMATICS (EECSI)
Publication In Scopus UTM FIRST AUTHOR
2020
Review Of Some Existing Shariah-Compliant Cryptocurrency
JOURNAL OF CONTEMPORARY ISLAMIC STUDIES
Journal Article Non Citation-Indexed CO-AUTHOR
2020
A Taxonomy And Survey Of Data Partitioning Algorithms For Big Data Distributed Systems
MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING
Book Chapter CO-AUTHOR
2020
Enhancing Trust Model Of Information Vehicular Ad-Hoc Networks Through Blockchain Consensus Algorithm
2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICOIACT)
Publication In Scopus UTM FIRST AUTHOR
2020
The State Of The Art On Secure Software Engineering: A Systematic Mapping Study
ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES
Publication In Scopus UTM FIRST AUTHOR
2020
Behavior Pattern Recognition Of Game Dragon Nest Using Bloom Filter Method
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY
Publication In Scopus UTM FIRST AUTHOR
2019
Investigating Brute Force Attack Patterns In Iot Network
JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING
Publication In Web Of Science UTM FIRST AUTHOR
2019
An Evaluation Framework For Communication And Coordination Processes In Offshore Software Development Outsourcing Relationship: Using Fuzzy Methods
IEEE ACCESS
Publication In Web Of Science UTM FIRST AUTHOR
2019
Tcp Fin Flood Attack Pattern Recognition On Internet Of Things With Rule Based Signature Analysis
INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING (IJOE)
Publication In Web Of Science UTM FIRST AUTHOR
2019
A Comparative Analysis Of Blockchain Consensus Algorithms From Shariah Perspective
4TH INTERNATIONAL HALAL CONFERENCE (INHAC) 2019
Conference Paper CO-AUTHOR
2019
Review Of Existing Shariah-Compliant Cryptocurrency
4TH INTERNATIONAL HALAL CONFERENCE (INHAC) 2019
Conference Paper CO-AUTHOR
2019
Frame Extraction In Wearable Vision
ADVANCES IN HUMAN INTERACTION TECHNOLOGY
Book Chapter CORRESPONDING AUTHOR
2018
Localizing Text In High Color Similarity Images
ADVANCES IN HUMAN INTERACTION TECHNOLOGY
Book Chapter CORRESPONDING AUTHOR
2018
Systematic Mapping Study Protocol For Secure Software Engineering
2ND ASIA INTERNATIONAL MULTIDISCIPLINARY CONFERENCE
Conference Paper UTM FIRST AUTHOR
2018
Iot Blockchain For Smart City: A Survey
7TH INTERNATIONAL GRADUATE CONFERENCE ON ENGINEERING, SCIENCE AND HUMANITIES
Conference Paper CORRESPONDING AUTHOR
2018
Iot Smart Device For E-Learning Content Sharing On Hybrid Cloud Environment
4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS
Proceedings CORRESPONDING AUTHOR
2017
Cyber-Attack Penetration Test And Vulnerability Analysis
INTERNATIONAL JOURNAL OF ONLINE ENGINEERING
Publication In Web Of Science CORRESPONDING AUTHOR
2017
Payload Recognition And Detection Of Cross Site Scripting Attack
2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC 2017).
Publication In Scopus UTM FIRST AUTHOR
2017
Real Traffic-Data Based Evaluation Of Vehicular Traffic Environment And Stateof- The-Art With Future Issues In Location-Centric Data Dissemination For Vanets
DIGITAL COMMUNICATIONS AND NETWORK
Publication In Web Of Science UTM FIRST AUTHOR
2017
Flood Disaster Management Approachfor Tracking Hemodialysis Patient In Kelantan
PERSIDANGAN KAJIAN BENCANA BANJIR
Conference Paper CORRESPONDING AUTHOR
2016
An Exploratory Study Of Communication And Coordination Challenges In Offshore Software Development Outsourcing: Results Of Systematic Literature Review And Empirical Study
SCIENCE INTERNATIONAL
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2016
Google Glass Translator
INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings CORRESPONDING AUTHOR
2016
An Exploratory Study Of Communication And Coordination Challenges In Offshore Software Development Outsourcing: Results Of Systematic Literature Review And Empirical Study
SCIENCE INTERNATIONAL
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2016
Anomaly Detection And Monitoring In Internet Of Things Communication
PROCEEDINGS OF 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING: EMPOWERING TECHNOLOGY FOR BETTER FUTURE, ICITEE 2016
Publication In Scopus UTM FIRST AUTHOR
2016
Penetration Testing And Mitigation Of Vulnerabilities Windows Server
INTERNATIONAL JOURNAL OF NETWORK SECURITY
Publication In Scopus UTM FIRST AUTHOR
2016
Location Based Challenges In Vehicular Communication: Privacy, Verification And Accuracy
THE 11TH ASIA PACIFIC INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY
Conference Paper UTM FIRST AUTHOR
2016
Penetration Testing And Network Auditing: Linux
JOURNAL OF INFORMATION PROCESSING SYSTEMS
Publication In Web Of Science UTM FIRST AUTHOR
2015
Text Localization In Images Using Reverse Thresholds Algorithm
JURNAL TEKNOLOGI
Publication In Web Of Science CORRESPONDING AUTHOR
2015
Atlas: Adaptive Text Localization Algorithm In High Color Similarity Background
TELKOMNIKA (TELECOMMUNICATION COMPUTING ELECTRONICS AND CONTROL)
Publication In Scopus UTM FIRST AUTHOR
2015
Threat And Vulnerability Penetration Testing: Linux
JOURNAL OF INTERNET TECHNOLOGY
Publication In Web Of Science CORRESPONDING AUTHOR
2014
Attribute Normalization Techniques And Performance Of Intrusion Classifiers: A Comparative Analysis
LIFE SCIENCE JOURNAL
Publication In Scopus UTM FIRST AUTHOR
2013
Attack And Vulnerability Penetration Testing: Freebsd
TELKOMNIKA
Publication In Scopus UTM FIRST AUTHOR
2013
Intrusion Threat Detection From Insider Attack Using Learning Behavior-Based
INTERNATIONAL JOURNAL OF THE PHYSICAL SCIENCES
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2012
Intrusion Prevention System: A Survey
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2012
Intrinsic Authentication Of Multimedia Objects Using Biometric Data Manipulation
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY
Publication In Web Of Science CO-AUTHOR
2012
Protocol Share Based Traffic Rate Analysis (Psbtra) For Udp Bandwidth Attack
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
Publication In Scopus CORRESPONDING AUTHOR
2011
Pitcher Flow: Unified Integration For Intrusion Prevention System
PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND MANAGEMENT
Proceedings CO-AUTHOR
2011
Heteregeneous Parameters For Accuracy Threat
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2011
Characterizing Network Intrusion Prevention System
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS
Journal Article Non Citation-Indexed CO-AUTHOR
2011
Research On Heteregeneous Data For Recognizing Threat
ICSOFT 2011 - PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATABASE TECHNOLOGIES
Publication In Scopus CO-AUTHOR
2011
Survey On Heterogeneous Data For Recognizing Threat
JOURNAL OF COMPUTATIONAL INFORMATION SYSTEMS
Publication In Scopus CO-AUTHOR
2011
Classification Of Habitual Activities In Behavior-Based Network Detection
JOURNAL OF COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2010
Enhanced Technique For Secure Wireless Sensor Routing With Respect To Energy Conservation
LECTURE NOTES IN COMPUTER SCIENCE
Publication In Scopus CO-AUTHOR
2010
Reliability Measurement Of Internet Services
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND THE SECOND AUN/SEED-NET REGIONAL CONFERENCE ON ICT, ICGC-RCICT 2010
Proceedings CO-AUTHOR
2010
The Prevention Threat Of Behavior-Based Signature Using Pitcher Flow Architecture
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY
Journal Article Non Citation-Indexed CO-AUTHOR
2010
The Trends Of Intrusion Prevention System Network
ICETC 2010 - 2010 2ND INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTER
Publication In Scopus CO-AUTHOR
2010
Volume-Based Network Intrusion Attacks Detection
Advanced computer network & security
Book Chapter INDIVIDUAL AUTHOR
2008
Fast Optimization Method: The Window Size And Hurst Parameter Estimator On Self-Similar Network Traffic
Journal of Information and Optimization Sciences
Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR
2007
Qos Based Anomaly Detection Based On Self-Similar Network Traffic
4TH INTERNATIONAL WORKSHOP ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2006)
Conference Paper CORRESPONDING AUTHOR
2006
Network Anomaly Detection On Self-Similar Network Traffic Using The Optimization And Sliding Window Methods
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (ICIS2005)
Conference Paper CORRESPONDING AUTHOR
2005
Self-Boundary Analyzing Method In Self- Similar Network Traffic For Anomaly Detection
1ST INTERNATIONAL SYMPOSIUM ON BIO-INSPIRED COMPUTING (BIC'05)
Conference Paper CORRESPONDING AUTHOR
2005
Normal And Anomalous Network Traffic Modeling: A Synthetic Data Generator Tool
BRUNEI INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (BICET 2005)
Conference Paper CORRESPONDING AUTHOR
2005
Iterative Window Size Estimation On Self-Similarity Measurement For Network Traffic Anomaly Detection
INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATION SCIENCES
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2004
An Iterative Estimation Of Data Window Size For Anomaly Detection Using Self-Similar Feature In Network Traffic
1ST CONFERENCE ON TELEMATICS SYSTEM, SERVICES, AND APPLICATION 2004 (TSSA2004)
Conference Paper CORRESPONDING AUTHOR
2004
File Access Permission Change Detection Using Immunological Negative Selection Approach
INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY 2002
Conference Paper CORRESPONDING AUTHOR
2002

KEJURUTERAAN PERISIAN
Book (Text) CO-AUTHOR
1999

Legend : IP CATEGORY IP LEVEL

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
DERIS STIAWAN
ACTIVE RESPONSE INTRUSION PREVENTION SYSTEM USING DYNAMIC PARAMETERS SELECTION
PHD GRADUATED CO-SUPERVISOR 2013
MAQSOOD MAHMUD
A NEW IRIS PROTECTION METHOD USING BIO-CHAOTIC ALGORITHM AND BIO-GAUSSIAN CIPHER
PHD GRADUATED CO-SUPERVISOR 2013
WONG LIH FONG
ENHANCED EDGE DETECTION AND RESTORATION METHODS FOR STROKE WIDTH TRANSFORM ALGORITHM
PHD GRADUATED SUPERVISOR 2018
NORZIANA BINTI YAHYA
SERVICE INTERFACE MEDIATOR MODEL FOR INTEROPERABILITY OF HETEROGENEOUS OPERATION CENTER SYSTEMS
PHD GRADUATED CO-SUPERVISOR 2018
AGUS LAKSONO
ADAPTIVE CHURN PREVENTION MACHINE LEARNING MODEL IN TELECOMMUNICATION INDUSTRIES
PHD ON GOING SUPERVISOR
MOHAMMED ABDULLAH R ALZAHRANI
COLLUDING-RESISTANCE CONTEXT-AWARE MISBEHAVIOUR DETECTION MODEL FOR VEHICULAR AD HOC NETWORK USING MACHINE LEARNING TECHNIQUES 
PHD ON GOING SUPERVISOR
ALZAHRANI, FAWAZ MOHAMMAD A
HYPERLEDGER FABRIC CONFLICT TRANSACTIONS DETECTION AND CORRECTION ALGORITHM FOR BANKING OPERATIONS.
PHD ON GOING SUPERVISOR
AFRIZAL NEHEMIA TOSCANY

PHD ON GOING SUPERVISOR
YOVI PRATAMA

PHD ON GOING SUPERVISOR
ADITYA PUTRA PERDANA PRASETYO
AN OPTIMIZED EDGE INTELLIGENCE ALGORITHM IN INDUSTRIAL INTERNET OF THINGS (IIOT) FOR WASTEWATER QUALITY CONTROL
PHD ON GOING SUPERVISOR
ARITH AMAMI BIN MISLAN

MASTER GRADUATED SUPERVISOR 2015
MOHD ASRAF BIN ABU BAKAR

MASTER GRADUATED SUPERVISOR 2015
MUHAMMAD SULKHAN NURFATIH
ENHANCED BLOCKCHAIN CONSENSUS TECHNIQUE FOR TRUST MODEL IN VEHICLE AD HOC NETWORK
MASTER GRADUATED SUPERVISOR 2021
EKO ARIP WINANTO
EXTENSION PROOF OF ATTACK SIGNATURE IN COLLABORATIVE INSTRUSION DETECTION SYSTEM USING BLOCKCHAIN CONSENSUS ALGORITHM
MASTER GRADUATED SUPERVISOR 2021
MASSOLIHEN BIN DASUKI
ENHANCED INTERNET OF THINGS LOAD BALANCING ALGORITHM WITH AWARENESS IN RESOURCES AVAILABILITY
MASTER GRADUATED SUPERVISOR 2021
ZULWAQAR ZAIN BIN MOHTAR
SMART CONTRACT ACCESS CONTROL METHOD IN BLOCKCHAIN-BASED DISTRIBUTED FILE SYSTEM  
MASTER ON GOING SUPERVISOR