GRANT(PI & MEMBERS)

27

PUBLICATIONS

69

INDEXED PUBLICATION

27

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

UNIVERSITY FUND
5
TOTAL

Publications

INDEXED PUBLICATION
27
NON-INDEXED PUBLICATION
23
OTHERS PUBLICATION
18
TOTAL

Supervisions

MASTER
66
PHD
20
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
Novel Congestion Control Schemes for Enhancing Energy Efficiency in Named Data Networking-Based Wireless Mesh Networks for the Internet of Things
RUG OF UTM UTM Encouragement Research
2024
F4+ 3.3: Integrating XAI for Automated Diagnosis and Generative AI for Smart Prescription for Cardiovascular Diseases
RUG OF UTM Geran Penyelidikan Hi-Tech(F4)
2024
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme)
MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract
2020
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme)
RUG OF UTM Matching Grant
2020
USING DATA-DRIVEN DECISION MAKING (DDDM) TO IMPROVE ANNUAL PROGRAMME ASSESSMENT REPORT (APAR) FOR UTM
RUG OF UTM UTM Encouragement Research
2020
UTMIcon 4.1: Development of Security Brain Intelligence (SBI) for Cyber Threat Behavioural Analysis
RUG OF UTM UTM RA ICONIC GRANT
2020
UTM-TDR 5.2 (T2): Designing Named-Entity-Recognition Approach for Conflict Case Study
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.4 (T1) Unstructured Data Analytics for Threat Intelligence
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.5 (T2): Intelligent ChatBot for South China Sea Conflict
RUG OF UTM UTM Transdiciplinary Research Grant
2018
UTM-TDR 5.0: STRATEGIC THREAT INTELLIGENCE FOR SOUTH CHINA SEA CONFLICT
RUG OF UTM UTM Transdiciplinary Research Grant
2018
Fraudulent Websites Detection System
RUG OF UTM High Impact Research Grant
2018
PRIVACY PRESERVING ASSOCIATION RULE MINING USING ATTRIBUTE-IDENTITY MAPPING ON REAL SENSITIVE DATA
RUG OF UTM Tier 2
2018
IMPROVED PIPELINE RELIABILITY SIMULATION PERFORMANCE USING COMPUTATIONAL MODELS
RUG OF UTM Tier 2
2016
Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones.
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2015
COMPREHENSIVE PRIVACY-PRESERVING DATA MINING MODEL IN DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
AUTOMATED INTELLIGENT-BASED ALERT CORRELATION SYSTEM USING HYBRID METHOD
RUG OF UTM Potential Academic Staff
2014
Public Technology Awareness and Readiness Study in Disaster Management
RUG OF UTM Flagship
2013
Identification of Attacks/Misuse Associated with Email through Email Header Forensic
RUG OF UTM Tier 2
2012
IMPROVING THE PERFORMANCE OF STRUCTURAL-BASED REAL-TIME ALERT CORRELATION USING MULTIPLE CLUSTERING SYSTEMS
RUG OF UTM Tier 2
2011
MEASURING AND ASSESSING LEVELS OF PUBLIC SECURITY AWARENESS
RUG OF UTM Tier 2
2011
PROFILING IN-LINE INSPECTION DATA IN OIL AND GAS PIPELINES (MALAYSIAN TRANSMISSION LINES)USING BAYESIAN NETWORKS
RUG OF UTM Tier 2
2011

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
An Anomaly Intrusion Detection Systems In Iot Based On Autoencoder: A Review
THE 7TH INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY 2023 IRICT 2023
Proceedings FIRST UTM CORRESPONDING AUTHOR
2023
Annual Programme Assessment Report (Apar) Online System
NEW ACADEMIA LEARNING INNOVATION NALI 2023 PROCEEDING
Proceedings CO-AUTHOR
2023

SCIENTIFIC STUDY ON DATA ANALYTICS AND TEXT FORENSICS (CAMTEKS SYSTEM) DATA PRESERVATION PROCESS
Clasified/Technical Report FIRST UTM CORRESPONDING AUTHOR
2023

ADVANCED TEXT ANALYSIS & FORENSIC TEXT ANALYSIS STUDY
Clasified/Technical Report CO-AUTHOR
2023
Security Issues And Challenges In The Internet Of Medical Things
THE 16TH POSTGRADUATE ANNUAL RESEARCH SEMINAR (PARS) 2023
Conference Paper UTM FIRST AUTHOR
2023
Research Issues And Challenges Of Faces Recognition In Low Resolution Images
THE 15TH POSTGRADUATE ANNUAL RESEARCH SEMINARS (PARS)
Conference Paper UTM FIRST AUTHOR
2023
Annual Programme Assessment Report Online System
NEW ACADEMIA LEARNING INNOVATION 2023
CO-AUTHOR
2023

STANDARD OPERATING PROCEDURE CYBERSECURITY MALAYSIA: DATA ANALYTICS AND FORENSIC TEXT (CAMTEKS) DATA PRESERVATION WITH FORENSICS COMPLIANCE
Modules / Manual FIRST UTM CORRESPONDING AUTHOR
2023
Hybrid Of Supervised Learning And Optimization Algorithm For Optimal Detection Of Iot Distributed Denial Of Service Attacks
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC)
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2023
Data Integrity For Dynamic Big Data In Cloud Storage: A Comprehensive Review And Critical Issues
LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2023
An Effective Attack Scenario Construction Model Based On Identification Of Attack Steps And Stages
INNTERNATIONAL JOURNAL OF INFORMATION SECURITY
Publication In Web Of Science UTM FIRST AUTHOR
2023
An Assessment Of Cybersecurity Awareness Level Among Northeastern University Students In Nigeria
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING
Publication In Scopus CORRESPONDING AUTHOR
2022
Comparative Analysis On The Image Steganographic Algorithms
2022 2ND INTERNATIONAL CONFERENCE ON EMERGING SMART TECHNOLOGIES AND APPLICATIONS (ESMARTA)
Publication In Scopus CO-AUTHOR
2022
Cyber-Attack Prediction Based On Network Intrusion Detection Systems For Alert Correlation Techniques: A Survey
SENSORS
Publication In Web Of Science CORRESPONDING AUTHOR
2022
Online Travel Booking System
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings CORRESPONDING AUTHOR
2021
Mobile Parcel Delivery System For Utm
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings CORRESPONDING AUTHOR
2021
Online Penetration Testing For Web Application Based On Owasp Framework
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings CORRESPONDING AUTHOR
2021
Sistem Penempahan Fasiliti Sukan Futsal Daerah Johor Bahru
PROSIDING KOMPUTERAN UTM INOVASI DI DALAM TEKNOLOGI DAN APLIKASI KOMPUTERAN
Proceedings CORRESPONDING AUTHOR
2021
Sistem Pas Keselamatan Fakulti Kejuruteraan Utm
PROSIDING KOMPUTERAN UTM INOVASI DI DALAM TEKNOLOGI DAN APLIKASI KOMPUTERAN
Proceedings CORRESPONDING AUTHOR
2021
Visual Analytics Design For Students Assessment Representationbased On Supervised Learning Algorithms
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2021
Intrusion Alert Reduction Based On Unsupervised And Supervised Learning Algorithms
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2021
Comparative Study On Feature Selection Techniques In Intrusion Detection Systems Using Ensemble Classifiers
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2021
Visual Analytics Design For Students Assessment Representation Based On Supervised Learning Algorithms
INTERNAIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2021
Cybersecurity Awareness Of University Students In Nigeria: Analysis Approach
TURKISH JOURNAL OF COMPUTER AND MATHEMATICS EDUCATION
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2021
Anomaly-Based Intrusion Detection Systems In Iot Using Deep Learning: A Systematic Literature Review
APPLIED SCIENCES-BASEL
Publication In Web Of Science CO-AUTHOR
2021
Quasi-Identifier Recognition Algorithm For Privacy Preservation Of Cloud Data Based On Risk Reidentification
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
Publication In Web Of Science UTM FIRST AUTHOR
2021
Hac: Model For Privacy-Preserving Outsourced Data Over Cloud
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC)
Publication In Scopus CORRESPONDING AUTHOR
2021
Anomaly Intrusion Detection Systems In Iot Using Deep Learning Techniques: A Survey
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES
Publication In Scopus CO-AUTHOR
2021
Towards Enhancement Of Privacy-Preserving Data Mining Model For Predicting Students Learning Outcomes Performance
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO)
Publication In Scopus CO-AUTHOR
2021
A Review On Network Intrusion Detection System Using Machine Learning
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2020
Iot Real-Time People Counting Using Raspberry Pi (Iot-Repco)
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING
Publication In Scopus CO-AUTHOR
2020
An Explanatory Review On Cybersecurity Capability Maturity Models
ADVANCES IN SCIENCE, TECHNOLOGY AND ENGINEERING SYSTEMS
Publication In Scopus UTM FIRST AUTHOR
2020
Named Entity Recognition Of South China Sea Conflicts
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2020
Oil Well Detection System For Seismic Surveying Based On Internet Of Things (Iot)
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2020
Hybrid Solution For Privacy Preserving Data Mining On The Cloud Computing
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING: EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS
Publication In Scopus CO-AUTHOR
2020
A Harmony Search-Based Feature Selection Technique For Cloud Intrusion Detection
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING: EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS
Publication In Scopus UTM FIRST AUTHOR
2020
South China Sea Conflicts Classification Using Named Entity Recognition (Ner) And Part-Of-Speech (Pos) Tagging
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2020
Cyber Security Awareness Among University Students: A Case Study
JOURNAL OF CRITICAL REVIEWS
Publication In Scopus UTM FIRST AUTHOR
2020
Cyberbully Detection Using Term Weighting Scheme And Naive Bayes Classifier
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2020
A Survey On Privacy Preserving Data Mining Approaches And Techniques
PROCEEDINGS OF THE 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA '19)
Publication In Scopus CORRESPONDING AUTHOR
2019
Hybrid Method On Clickjacking Detection And Prevention In Modern Advertisements
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2019
Integration Of Sql Injection Prevention Methods
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2019
Classification Of Online Grooming On Chat Logs Using Two Term Weighting Schemes
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2019
Ensemble Classifiers For Spam Review Detection
2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS)
Publication In Scopus UTM FIRST AUTHOR
2018
Cyber Physical Security Protection In Online Authentication Mechanisms For Banking Systems
COMPUTING CONFERENCE 2018
Publication In Scopus UTM FIRST AUTHOR
2018
Classification Of Sexual Harassment On Facebook Using Term Weighting Schemes
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC)
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2018
Development Of Metamodel On Information Security Risk Audit And Assessment For It Assets In Commercial Bank
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2018
A Survey On Development Stages In Alert Correlation
ADVANCES IN DATA MINING AND BUSINESS INTELLIGENCE
Book Chapter CORRESPONDING AUTHOR
2018
Privacy Preserving Data Mining Based On Geometrical Data Transformation Method (Gdtm) And K-Means Clustering Algorithm
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC)
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2018
Integration Of Pso And K-Means Clustering Algorithm For Structural-Based Alert Correlation Model
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2017
Comparative Study On Corpus Development For Malay Investment Fraud Detection In Website
JOURNAL OF FUNDAMENTAL AND APPLIED SCIENCES
Publication In Web Of Science CO-AUTHOR
2017
Feature Selection Using Information Gain For Improved Structural Based Alert Correlation
PLOS ONE
Publication In Web Of Science UTM FIRST AUTHOR
2016
Privacy Preserving Data Mining Based On K-Anonymity And Decision Tree Classification
UTM COMPUTING PROCEEDINGS:INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings CORRESPONDING AUTHOR
2016
An Improvement Of Student Examination Assessment Through Online (E-Exam) By Considering Psychological Distress Factors
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY & SECURITY (IJCSITS)
Journal Article Non Citation-Indexed CO-AUTHOR
2016
Privacy Preserving Decision Tree Classification Using Rsa Encryption On Health Dataset
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings CORRESPONDING AUTHOR
2016
Privacy Preserving Data Mining Based On Random Substitution And Decision Tree Classification
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings CORRESPONDING AUTHOR
2016
Comparative Study Of Aes, Blowfish, Cast-128 And Des Encryption Algorithm
IOSR JOURNAL OF ENGINEERING (IOSRJEN)
Journal Article Non Citation-Indexed CO-AUTHOR
2016
A Smart Approach Of E-Exam Assessment Method Using Face Recognition To Address Identity Theft And Cheating
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION SECURITY (IJCSIS)
Journal Article Non Citation-Indexed CO-AUTHOR
2016
Hidden Features Extraction Using Independent Component Analysis For Improved Alert Clustering
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT)
Publication In Scopus CORRESPONDING AUTHOR
2015
A Holistic Based Digital Forensic Readiness Framework For Zenith Bank, Nigeria
3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND SOCIAL SCIENCES (ICCSS2015)
Conference Paper CORRESPONDING AUTHOR
2015
Survey On Data Modification Attacks
INTERNATIONAL JOURNAL OF SCIENTIFIC AND ENGINEERING RESEARCH
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2015
An Artificial Neural Network Modeling For Pipeline Corrosion Growth Prediction
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus CO-AUTHOR
2015

COMPUTER ORGANIZATION AND ARCHITECTURE
Modules / Manual CO-AUTHOR
2014
A Taxonomy On Intrusion Alert Aggregation Techniques
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus CORRESPONDING AUTHOR
2014
Towards Metamodel-Based Approach For Information Security Awareness Management
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus UTM FIRST AUTHOR
2014
Handwritten Alphabets Recognition Using Twelve Directional Feature Extraction And Self Organizing Maps
2014 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA)
Publication In Scopus UTM FIRST AUTHOR
2014
Automated Matching Systems And Correctional Method For Improved Inspection Data Quality
INTERNATIONAL JOURNAL OF COMPUTER THEORY AND ENGINEERING (IJCTE)
Journal Article Non Citation-Indexed CO-AUTHOR
2011
A Hybrid Intelligent Approach For Automated Alert Clustering And Filtering In Intrusion Alert Analysis
INT. JOURNAL OF COMPUTER THEORY AND ENGINEERING (IJCTE)
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2009
Network Intrusion Alert Correlation Challenges And Techniques
Jurnal Teknologi Maklumat
Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR
2008

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
TAGWA AHMED MOHAMED ALHAJ
AN EFFECTIVE ATTACK SCENARIO CONSTRUCTION MODEL BASED ON TWO-TIER FEATURE SELECTION AND COARSE GRAIN CLEANING
PHD GRADUATED SUPERVISOR 2018
HUDA OSMAN MANSOUR OSMAN
CLOUD BASED PRIVACY PRESERVING DATA MINING MODEL USING HYBRID K-ANONYMITY AND PARTIAL HOMOMORPHIC ENCRYPTION
PHD GRADUATED SUPERVISOR 2022
SHAMIEL HASHIM IBRAHIM BAKHEIT
ENHANCED INTEGRITY AUDITING SCHEME FOR DYNAMIC DATA STORAGE IN CLOUD COMPUTING
PHD GRADUATED SUPERVISOR 2023
ASMA BASHARAT
IMAGE-BASED MALWARE CLASSIFICATION MODEL USING HYBRID VISION TRANSFORMER  
PHD ON GOING CO-SUPERVISOR
HASHIM HUSSEIN TAHA
AN INTRUSION ALERT CORRELATION MODEL BASED ON DATA ANALYSIS AND GRAPH CONVOLUTIONAL NETWORK (GCN) APPROACH  
PHD ON GOING SUPERVISOR
MOHAMED AWAD A ELMAGBARI
A FRAMEWORK TO DETERMINE CYBERSECURITY READINESS OF HEALTHCARE TOWARDS APPLICATION OF MEDICAL CYBER PHYSICAL SYSTEMS
PHD ON GOING SUPERVISOR
ADAMU ABDULLAHI GARBA
AN ENHANCED CYBERSECURITY AWARENESS FRAMEWORK FOR NIGERIA
PHD GRADUATED SUPERVISOR 2024
IKHLAS SAAD AHMED SAAD
IN PROGRESS
PHD ON GOING CO-SUPERVISOR
HANAN ALI ABDULHUSSEIN AL-RIKABI
ENHANCED FACIAL RECOGNITION MODEL FOR LOW-RESOLUTION IMAGES BASED ON DBN - DAE DEEP LEARNING TECHNIQUES
PHD ON GOING SUPERVISOR
SAMAH MAHDI HASSAN ALWAHBANI
AN EARLY AND LIGHTWEIGHT DETECTION MODEL OF IOT ATTACKS BASED ON ENHANCED ONLINE LEARNING ALGORITHM
PHD ON GOING SUPERVISOR
WIDAD MARGHANI MAKKI ELBAKRI
AN ENHANCED ADAPTIVE AND COLLABORATIVE INTRUSION  DETECTION MODEL BASED ON HYBRID FEATURE SELECTION   ALGORITHMS FOR CLOUD COMPUTING
PHD ON GOING SUPERVISOR
MARINA BINTI MD ARSHAD
PROFILING OF MONEY LAUNDRING CRIMES USING GRAPH ANALYTICS
PHD ON GOING CO-SUPERVISOR
AHMED MUQDAD DAWOOD ALNASRALLAH
ENHANCED ANOMALY DETECTION MODEL FOR INTERNET OF MEDICALTHINGS BASED ON DEEP LEARNING
PHD ON GOING SUPERVISOR
MUAADH ABDULFATTAH HASSAN ALSOUFI
AN ADAPTIVE ANOMALY-BASED INTRUSION DETECTION MODEL USING DEEP LEARNING TECHNIQUES FOR INTERNET OF THINGS 
PHD ON GOING SUPERVISOR
WANG ZHEN
CONVOLUTIONAL SPIKING NEURAL NETWORK BASED EFFICIENT INTRUSION DETECTION MODEL FOR INTERNET OF THINGS
PHD ON GOING CO-SUPERVISOR
IBRAHIM THORIG

PHD ON GOING SUPERVISOR
ANIS F ABDALLA ELGARDUH
ENHANCING MALWARE DETECTION: A HYBRID IMAGE GENERATION MODEL WITH SPP-NET ADAPTATION AND FEW-SHOT LEARNING
PHD ON GOING CO-SUPERVISOR
KHALIFA AHMAD IBRAHIM ALI ALSUWAIDI

PHD ON GOING CO-SUPERVISOR
CHIN CHEE YOON
EVALUATION FRAMEWORK FOR ASSESSING THE PERFORMANCE OF CLOUD-BASED IDPS  
PHD ON GOING SUPERVISOR
MIRANDA DABIRANZOHOURI

MASTER GRADUATED SUPERVISOR 2013
AHMED YOUSUF JAMA

MASTER GRADUATED SUPERVISOR 2014
ALI OTMAN ALI ALBSHAYREH

MASTER GRADUATED SUPERVISOR 2014
NOR'AQILAH BINTI MISMAN

MASTER GRADUATED SUPERVISOR 2014
ADAMU ABDULLAHI GARBA

MASTER GRADUATED SUPERVISOR 2015
NITHI SURACHMAN

MASTER GRADUATED SUPERVISOR 2015
ALHASSAN JAMILU IBRAHIM

MASTER GRADUATED SUPERVISOR 2015
SHORAYHA A/P EH CHONG

MASTER GRADUATED SUPERVISOR 2015
NUR ATHIRAH BINTI JAMADI

MASTER GRADUATED SUPERVISOR 2016
FAISAL SALEH NASSER AL-ASWER

MASTER GRADUATED SUPERVISOR 2016
ABBAS YASLAM SAEED HUSSEIN

MASTER GRADUATED SUPERVISOR 2016
TAN ZHENG XUN

MASTER GRADUATED SUPERVISOR 2017
KOO NYUK LIN

MASTER GRADUATED SUPERVISOR 2017
SHAJAL ERACHAMPAT

MASTER GRADUATED SUPERVISOR 2017
JAFAR IBRAHEEM

MASTER GRADUATED SUPERVISOR 2017
AMER SAEED ALI ALKATHERI

MASTER GRADUATED SUPERVISOR 2017
TALAL NASSER SAUD ALHARBI

MASTER GRADUATED SUPERVISOR 2018
SYED MOHD ANWAR ALHABSHI BIN SYED HAMED

MASTER GRADUATED SUPERVISOR 2018
RAFEENA BINTI MOHAMAD RABII

MASTER GRADUATED SUPERVISOR 2019
NUR RAFEEQKHA BINTI SULAIMAN

MASTER GRADUATED SUPERVISOR 2019
NURUL ADIBAH BINTI RAHMAT

MASTER GRADUATED SUPERVISOR 2020
KIRIT SHASHANK DHURANDHAR

MASTER GRADUATED SUPERVISOR 2020
BELLO NAZIFI KAGARA

MASTER GRADUATED SUPERVISOR 2020
AHMAD FARIS BIN HARUN ISKANDAR

MASTER GRADUATED SUPERVISOR 2020
HANI GHASSAN ABDUL KARIM

MASTER GRADUATED SUPERVISOR 2021
TALHA FARID

MASTER GRADUATED SUPERVISOR 2021
OYINKANSOLA OLUWAPELUMI KEMI AFOLABI-BABARINSA

MASTER GRADUATED SUPERVISOR 2021
FAKHRIYAH SALIH MOHAMMED ABOUZAEKOUK

MASTER GRADUATED SUPERVISOR 2021
NURUL NADHIRAH BINTI ISMAIL

MASTER GRADUATED SUPERVISOR 2021
ESMAEIL AHMED MOHAMED ELHASSAN AHMED

MASTER GRADUATED SUPERVISOR 2022
A.RAFIZ BIN ISMAIL

MASTER GRADUATED SUPERVISOR 2022
NURUL ABIDAH BINTI HYDRUS

MASTER GRADUATED SUPERVISOR 2022
NAJWA HUSNA BINTI MOHD ISHAK

MASTER GRADUATED SUPERVISOR 2022
CHIN HSIN TIEN

MASTER GRADUATED SUPERVISOR 2024
USHARANI A/P RAJANDARAN

MASTER GRADUATED SUPERVISOR 2024
MOHAMAD RIDZUAN BIN ABDUL RAHMAN

MASTER GRADUATED SUPERVISOR 2024
MUHAMMAD MIRZA BADRI BIN MOHD MOKTAR

MASTER GRADUATED SUPERVISOR 2024
WANG YUFEI

MASTER ON GOING SUPERVISOR
MUNIF BIN FAIZ BAFANA

MASTER ON GOING SUPERVISOR
KOONG DE KAI

MASTER ON GOING SUPERVISOR
NICOLAS CHRISTINE ROSE

MASTER ON GOING SUPERVISOR
ADLINA BINTI ABDUL SAMAD
AN EHHANCED PRIVACY-PRESERVING EDUCATIONAL DATA MINING MODEL BASED ON K-ANONYMIZATION AND PARTIAL HOMOMORPHIC ENCRYPTION ALGORITHMS
MASTER ON GOING SUPERVISOR
WANG TINGYUE

MASTER ON GOING SUPERVISOR
SHAHAD ALI AHMED SAEED

MASTER ON GOING SUPERVISOR
EFFA OBAZI AMISSINE OGBAN

MASTER ON GOING SUPERVISOR