GRANT(PI & MEMBERS)
27
PUBLICATIONS
69
INDEXED PUBLICATION
27
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
Publications
Supervisions
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
Novel Congestion Control Schemes for Enhancing Energy Efficiency in Named Data Networking-Based Wireless Mesh Networks for the Internet of Things RUG OF UTM UTM Encouragement Research |
2024 |
F4+ 3.3: Integrating XAI for Automated Diagnosis and Generative AI for Smart Prescription for Cardiovascular Diseases RUG OF UTM Geran Penyelidikan Hi-Tech(F4) |
2024 |
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme) MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract |
2020 |
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme) RUG OF UTM Matching Grant |
2020 |
USING DATA-DRIVEN DECISION MAKING (DDDM) TO IMPROVE ANNUAL PROGRAMME ASSESSMENT REPORT (APAR) FOR UTM RUG OF UTM UTM Encouragement Research |
2020 |
UTMIcon 4.1: Development of Security Brain Intelligence (SBI) for Cyber Threat Behavioural Analysis RUG OF UTM UTM RA ICONIC GRANT |
2020 |
UTM-TDR 5.2 (T2): Designing Named-Entity-Recognition Approach for Conflict Case Study RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.4 (T1) Unstructured Data Analytics for Threat Intelligence RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.5 (T2): Intelligent ChatBot for South China Sea Conflict RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM-TDR 5.0: STRATEGIC THREAT INTELLIGENCE FOR SOUTH CHINA SEA CONFLICT RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
Fraudulent Websites Detection System RUG OF UTM High Impact Research Grant |
2018 |
PRIVACY PRESERVING ASSOCIATION RULE MINING USING ATTRIBUTE-IDENTITY MAPPING ON REAL SENSITIVE DATA RUG OF UTM Tier 2 |
2018 |
IMPROVED PIPELINE RELIABILITY SIMULATION PERFORMANCE USING COMPUTATIONAL MODELS RUG OF UTM Tier 2 |
2016 |
Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones. MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
COMPREHENSIVE PRIVACY-PRESERVING DATA MINING MODEL IN DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
AUTOMATED INTELLIGENT-BASED ALERT CORRELATION SYSTEM USING HYBRID METHOD RUG OF UTM Potential Academic Staff |
2014 |
Public Technology Awareness and Readiness Study in Disaster Management RUG OF UTM Flagship |
2013 |
Identification of Attacks/Misuse Associated with Email through Email Header Forensic RUG OF UTM Tier 2 |
2012 |
IMPROVING THE PERFORMANCE OF STRUCTURAL-BASED REAL-TIME ALERT CORRELATION USING MULTIPLE CLUSTERING SYSTEMS RUG OF UTM Tier 2 |
2011 |
MEASURING AND ASSESSING LEVELS OF PUBLIC SECURITY AWARENESS RUG OF UTM Tier 2 |
2011 |
PROFILING IN-LINE INSPECTION DATA IN OIL AND GAS PIPELINES (MALAYSIAN TRANSMISSION LINES)USING BAYESIAN NETWORKS RUG OF UTM Tier 2 |
2011 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
An Anomaly Intrusion Detection Systems In Iot Based On Autoencoder: A Review
THE 7TH INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY 2023 IRICT 2023 Proceedings FIRST UTM CORRESPONDING AUTHOR |
2023 |
Annual Programme Assessment Report (Apar) Online System
NEW ACADEMIA LEARNING INNOVATION NALI 2023 PROCEEDING Proceedings CO-AUTHOR |
2023 |
SCIENTIFIC STUDY ON DATA ANALYTICS AND TEXT FORENSICS (CAMTEKS SYSTEM) DATA PRESERVATION PROCESS Clasified/Technical Report FIRST UTM CORRESPONDING AUTHOR |
2023 |
ADVANCED TEXT ANALYSIS & FORENSIC TEXT ANALYSIS STUDY Clasified/Technical Report CO-AUTHOR |
2023 |
Security Issues And Challenges In The Internet Of Medical Things
THE 16TH POSTGRADUATE ANNUAL RESEARCH SEMINAR (PARS) 2023 Conference Paper UTM FIRST AUTHOR |
2023 |
Research Issues And Challenges Of Faces Recognition In Low Resolution Images
THE 15TH POSTGRADUATE ANNUAL RESEARCH SEMINARS (PARS) Conference Paper UTM FIRST AUTHOR |
2023 |
Annual Programme Assessment
Report Online System
NEW ACADEMIA LEARNING INNOVATION 2023 CO-AUTHOR |
2023 |
STANDARD OPERATING PROCEDURE CYBERSECURITY MALAYSIA: DATA ANALYTICS AND FORENSIC TEXT (CAMTEKS) DATA PRESERVATION WITH FORENSICS COMPLIANCE Modules / Manual FIRST UTM CORRESPONDING AUTHOR |
2023 |
Hybrid Of Supervised Learning And Optimization
Algorithm For Optimal Detection Of Iot Distributed
Denial Of Service Attacks
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC) Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2023 |
Data Integrity For Dynamic Big Data In Cloud Storage: A Comprehensive Review And Critical Issues
LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2023 |
An Effective Attack Scenario Construction Model Based
On Identification Of Attack Steps And Stages
INNTERNATIONAL JOURNAL OF INFORMATION SECURITY Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
An Assessment Of Cybersecurity Awareness Level Among Northeastern University Students In Nigeria
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING Publication In Scopus CORRESPONDING AUTHOR |
2022 |
Comparative Analysis On The Image Steganographic Algorithms
2022 2ND INTERNATIONAL CONFERENCE ON EMERGING SMART TECHNOLOGIES AND APPLICATIONS (ESMARTA) Publication In Scopus CO-AUTHOR |
2022 |
Cyber-Attack Prediction Based On Network Intrusion Detection Systems For Alert Correlation Techniques: A Survey
SENSORS Publication In Web Of Science CORRESPONDING AUTHOR |
2022 |
Online Travel Booking System
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2021 |
Mobile Parcel Delivery System For Utm
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2021 |
Online Penetration Testing For Web Application Based On Owasp Framework
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2021 |
Sistem Penempahan Fasiliti Sukan Futsal Daerah Johor Bahru
PROSIDING KOMPUTERAN UTM INOVASI DI DALAM TEKNOLOGI DAN APLIKASI KOMPUTERAN Proceedings CORRESPONDING AUTHOR |
2021 |
Sistem Pas Keselamatan Fakulti Kejuruteraan Utm
PROSIDING KOMPUTERAN UTM INOVASI DI DALAM TEKNOLOGI DAN APLIKASI KOMPUTERAN Proceedings CORRESPONDING AUTHOR |
2021 |
Visual Analytics Design For Students Assessment Representationbased On Supervised Learning Algorithms
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2021 |
Intrusion Alert Reduction Based On Unsupervised And Supervised Learning Algorithms
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2021 |
Comparative Study On Feature Selection Techniques In Intrusion Detection Systems Using Ensemble Classifiers
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2021 |
Visual Analytics Design For Students Assessment Representation Based On Supervised Learning Algorithms
INTERNAIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2021 |
Cybersecurity Awareness Of University Students In Nigeria: Analysis Approach
TURKISH JOURNAL OF COMPUTER AND MATHEMATICS EDUCATION Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2021 |
Anomaly-Based Intrusion Detection Systems In Iot Using Deep Learning: A Systematic Literature Review
APPLIED SCIENCES-BASEL Publication In Web Of Science CO-AUTHOR |
2021 |
Quasi-Identifier Recognition Algorithm For Privacy Preservation Of Cloud Data Based On Risk Reidentification
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Hac: Model For Privacy-Preserving Outsourced Data Over Cloud
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Scopus CORRESPONDING AUTHOR |
2021 |
Anomaly Intrusion Detection Systems In Iot Using Deep Learning Techniques: A Survey
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES Publication In Scopus CO-AUTHOR |
2021 |
Towards Enhancement Of Privacy-Preserving Data Mining Model For Predicting Students Learning Outcomes Performance
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO) Publication In Scopus CO-AUTHOR |
2021 |
A Review On Network Intrusion Detection System Using Machine Learning
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2020 |
Iot Real-Time People Counting Using Raspberry Pi (Iot-Repco)
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING Publication In Scopus CO-AUTHOR |
2020 |
An Explanatory Review On Cybersecurity Capability Maturity Models
ADVANCES IN SCIENCE, TECHNOLOGY AND ENGINEERING SYSTEMS Publication In Scopus UTM FIRST AUTHOR |
2020 |
Named Entity Recognition Of South China Sea Conflicts
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2020 |
Oil Well Detection System For Seismic Surveying Based On Internet Of Things (Iot)
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2020 |
Hybrid Solution For Privacy Preserving Data Mining On The Cloud Computing
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING: EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS Publication In Scopus CO-AUTHOR |
2020 |
A Harmony Search-Based Feature Selection Technique
For Cloud Intrusion Detection
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING: EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS Publication In Scopus UTM FIRST AUTHOR |
2020 |
South China Sea Conflicts Classification Using Named Entity Recognition (Ner) And Part-Of-Speech (Pos) Tagging
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2020 |
Cyber Security Awareness Among University Students: A Case Study
JOURNAL OF CRITICAL REVIEWS Publication In Scopus UTM FIRST AUTHOR |
2020 |
Cyberbully Detection Using Term Weighting Scheme And Naive Bayes Classifier
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2020 |
A Survey On Privacy Preserving Data Mining Approaches And Techniques
PROCEEDINGS OF THE 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA '19) Publication In Scopus CORRESPONDING AUTHOR |
2019 |
Hybrid Method On Clickjacking Detection And Prevention In Modern Advertisements
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2019 |
Integration Of Sql Injection Prevention Methods
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2019 |
Classification Of Online Grooming On Chat Logs Using Two Term Weighting Schemes
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2019 |
Ensemble Classifiers For Spam Review Detection
2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS) Publication In Scopus UTM FIRST AUTHOR |
2018 |
Cyber Physical Security Protection In Online Authentication Mechanisms For Banking Systems
COMPUTING CONFERENCE 2018 Publication In Scopus UTM FIRST AUTHOR |
2018 |
Classification Of Sexual Harassment On Facebook Using Term Weighting Schemes
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC) Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2018 |
Development Of Metamodel On Information Security Risk Audit And Assessment For It Assets In Commercial Bank
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2018 |
A Survey On Development Stages In Alert Correlation
ADVANCES IN DATA MINING AND BUSINESS INTELLIGENCE Book Chapter CORRESPONDING AUTHOR |
2018 |
Privacy Preserving Data Mining Based On Geometrical Data Transformation Method (Gdtm) And K-Means Clustering Algorithm
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC) Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2018 |
Integration Of Pso And K-Means Clustering Algorithm For Structural-Based Alert Correlation Model
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2017 |
Comparative Study On Corpus Development For Malay Investment Fraud Detection In Website
JOURNAL OF FUNDAMENTAL AND APPLIED SCIENCES Publication In Web Of Science CO-AUTHOR |
2017 |
Feature Selection Using Information Gain For Improved Structural Based Alert Correlation
PLOS ONE Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
Privacy Preserving Data Mining Based On K-Anonymity And Decision Tree Classification
UTM COMPUTING PROCEEDINGS:INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2016 |
An Improvement Of Student Examination Assessment Through Online (E-Exam) By Considering Psychological Distress Factors
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY & SECURITY (IJCSITS) Journal Article Non Citation-Indexed CO-AUTHOR |
2016 |
Privacy Preserving Decision Tree Classification
Using Rsa Encryption On Health Dataset
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2016 |
Privacy Preserving Data Mining Based On Random Substitution And Decision Tree Classification
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2016 |
Comparative Study Of Aes, Blowfish, Cast-128 And Des Encryption Algorithm
IOSR JOURNAL OF ENGINEERING (IOSRJEN) Journal Article Non Citation-Indexed CO-AUTHOR |
2016 |
A Smart Approach Of E-Exam Assessment Method Using Face Recognition To Address Identity Theft And Cheating
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION SECURITY (IJCSIS) Journal Article Non Citation-Indexed CO-AUTHOR |
2016 |
Hidden Features Extraction Using Independent Component Analysis For Improved Alert Clustering
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT) Publication In Scopus CORRESPONDING AUTHOR |
2015 |
A Holistic Based Digital Forensic Readiness Framework For Zenith Bank, Nigeria
3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND SOCIAL SCIENCES (ICCSS2015) Conference Paper CORRESPONDING AUTHOR |
2015 |
Survey On Data Modification Attacks
INTERNATIONAL JOURNAL OF SCIENTIFIC AND ENGINEERING RESEARCH Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2015 |
An Artificial Neural Network Modeling For Pipeline Corrosion Growth Prediction
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2015 |
COMPUTER ORGANIZATION AND ARCHITECTURE Modules / Manual CO-AUTHOR |
2014 |
A Taxonomy On Intrusion Alert Aggregation Techniques
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CORRESPONDING AUTHOR |
2014 |
Towards Metamodel-Based Approach For Information Security Awareness Management
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus UTM FIRST AUTHOR |
2014 |
Handwritten Alphabets Recognition Using Twelve Directional Feature Extraction And Self Organizing Maps
2014 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA) Publication In Scopus UTM FIRST AUTHOR |
2014 |
Automated Matching Systems And Correctional Method For Improved Inspection Data Quality
INTERNATIONAL JOURNAL OF COMPUTER THEORY AND ENGINEERING (IJCTE) Journal Article Non Citation-Indexed CO-AUTHOR |
2011 |
A Hybrid Intelligent Approach For Automated Alert Clustering And Filtering In Intrusion Alert Analysis
INT. JOURNAL OF COMPUTER THEORY AND ENGINEERING (IJCTE) Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2009 |
Network Intrusion Alert Correlation Challenges And Techniques
Jurnal Teknologi Maklumat Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2008 |
Legend : IP CATEGORY IP LEVEL
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
TAGWA AHMED MOHAMED ALHAJ AN EFFECTIVE ATTACK SCENARIO CONSTRUCTION MODEL BASED ON TWO-TIER FEATURE SELECTION AND COARSE GRAIN CLEANING PHD GRADUATED SUPERVISOR 2018 |
HUDA OSMAN MANSOUR OSMAN CLOUD BASED PRIVACY PRESERVING DATA MINING MODEL USING HYBRID K-ANONYMITY AND PARTIAL HOMOMORPHIC ENCRYPTION PHD GRADUATED SUPERVISOR 2022 |
SHAMIEL HASHIM IBRAHIM BAKHEIT ENHANCED INTEGRITY AUDITING SCHEME FOR DYNAMIC DATA STORAGE IN CLOUD COMPUTING PHD GRADUATED SUPERVISOR 2023 |
ASMA BASHARAT IMAGE-BASED MALWARE CLASSIFICATION MODEL USING HYBRID VISION TRANSFORMER   PHD ON GOING CO-SUPERVISOR |
HASHIM HUSSEIN TAHA AN INTRUSION ALERT CORRELATION MODEL BASED ON DATA ANALYSIS AND GRAPH CONVOLUTIONAL NETWORK (GCN) APPROACH   PHD ON GOING SUPERVISOR |
MOHAMED AWAD A ELMAGBARI A FRAMEWORK TO DETERMINE CYBERSECURITY READINESS OF HEALTHCARE TOWARDS APPLICATION OF MEDICAL CYBER PHYSICAL SYSTEMS PHD ON GOING SUPERVISOR |
ADAMU ABDULLAHI GARBA AN ENHANCED CYBERSECURITY AWARENESS FRAMEWORK FOR NIGERIA PHD GRADUATED SUPERVISOR 2024 |
IKHLAS SAAD AHMED SAAD IN PROGRESS PHD ON GOING CO-SUPERVISOR |
HANAN ALI ABDULHUSSEIN AL-RIKABI ENHANCED FACIAL RECOGNITION MODEL FOR LOW-RESOLUTION IMAGES BASED ON DBN - DAE DEEP LEARNING TECHNIQUES PHD ON GOING SUPERVISOR |
SAMAH MAHDI HASSAN ALWAHBANI AN EARLY AND LIGHTWEIGHT DETECTION MODEL OF IOT ATTACKS BASED ON ENHANCED ONLINE LEARNING ALGORITHM PHD ON GOING SUPERVISOR |
WIDAD MARGHANI MAKKI ELBAKRI AN ENHANCED ADAPTIVE AND COLLABORATIVE INTRUSION  DETECTION MODEL BASED ON HYBRID FEATURE SELECTION   ALGORITHMS FOR CLOUD COMPUTING PHD ON GOING SUPERVISOR |
MARINA BINTI MD ARSHAD PROFILING OF MONEY LAUNDRING CRIMES USING GRAPH ANALYTICS PHD ON GOING CO-SUPERVISOR |
AHMED MUQDAD DAWOOD ALNASRALLAH ENHANCED ANOMALY DETECTION MODEL FOR INTERNET OF MEDICALTHINGS BASED ON DEEP LEARNING PHD ON GOING SUPERVISOR |
MUAADH ABDULFATTAH HASSAN ALSOUFI AN ADAPTIVE ANOMALY-BASED INTRUSION DETECTION MODEL USING DEEP LEARNING TECHNIQUES FOR INTERNET OF THINGS  PHD ON GOING SUPERVISOR |
WANG ZHEN CONVOLUTIONAL SPIKING NEURAL NETWORK BASED EFFICIENT INTRUSION DETECTION MODEL FOR INTERNET OF THINGS PHD ON GOING CO-SUPERVISOR |
IBRAHIM THORIG PHD ON GOING SUPERVISOR |
ANIS F ABDALLA ELGARDUH ENHANCING MALWARE DETECTION: A HYBRID IMAGE GENERATION MODEL WITH SPP-NET ADAPTATION AND FEW-SHOT LEARNING PHD ON GOING CO-SUPERVISOR |
KHALIFA AHMAD IBRAHIM ALI ALSUWAIDI PHD ON GOING CO-SUPERVISOR |
CHIN CHEE YOON EVALUATION FRAMEWORK FOR ASSESSING THE PERFORMANCE OF CLOUD-BASED IDPS   PHD ON GOING SUPERVISOR |
MIRANDA DABIRANZOHOURI MASTER GRADUATED SUPERVISOR 2013 |
AHMED YOUSUF JAMA MASTER GRADUATED SUPERVISOR 2014 |
ALI OTMAN ALI ALBSHAYREH MASTER GRADUATED SUPERVISOR 2014 |
NOR'AQILAH BINTI MISMAN MASTER GRADUATED SUPERVISOR 2014 |
ADAMU ABDULLAHI GARBA MASTER GRADUATED SUPERVISOR 2015 |
NITHI SURACHMAN MASTER GRADUATED SUPERVISOR 2015 |
ALHASSAN JAMILU IBRAHIM MASTER GRADUATED SUPERVISOR 2015 |
SHORAYHA A/P EH CHONG MASTER GRADUATED SUPERVISOR 2015 |
NUR ATHIRAH BINTI JAMADI MASTER GRADUATED SUPERVISOR 2016 |
FAISAL SALEH NASSER AL-ASWER MASTER GRADUATED SUPERVISOR 2016 |
ABBAS YASLAM SAEED HUSSEIN MASTER GRADUATED SUPERVISOR 2016 |
TAN ZHENG XUN MASTER GRADUATED SUPERVISOR 2017 |
KOO NYUK LIN MASTER GRADUATED SUPERVISOR 2017 |
SHAJAL ERACHAMPAT MASTER GRADUATED SUPERVISOR 2017 |
JAFAR IBRAHEEM MASTER GRADUATED SUPERVISOR 2017 |
AMER SAEED ALI ALKATHERI MASTER GRADUATED SUPERVISOR 2017 |
TALAL NASSER SAUD ALHARBI MASTER GRADUATED SUPERVISOR 2018 |
SYED MOHD ANWAR ALHABSHI BIN SYED HAMED MASTER GRADUATED SUPERVISOR 2018 |
RAFEENA BINTI MOHAMAD RABII MASTER GRADUATED SUPERVISOR 2019 |
NUR RAFEEQKHA BINTI SULAIMAN MASTER GRADUATED SUPERVISOR 2019 |
NURUL ADIBAH BINTI RAHMAT MASTER GRADUATED SUPERVISOR 2020 |
KIRIT SHASHANK DHURANDHAR MASTER GRADUATED SUPERVISOR 2020 |
BELLO NAZIFI KAGARA MASTER GRADUATED SUPERVISOR 2020 |
AHMAD FARIS BIN HARUN ISKANDAR MASTER GRADUATED SUPERVISOR 2020 |
HANI GHASSAN ABDUL KARIM MASTER GRADUATED SUPERVISOR 2021 |
TALHA FARID MASTER GRADUATED SUPERVISOR 2021 |
OYINKANSOLA OLUWAPELUMI KEMI AFOLABI-BABARINSA MASTER GRADUATED SUPERVISOR 2021 |
FAKHRIYAH SALIH MOHAMMED ABOUZAEKOUK MASTER GRADUATED SUPERVISOR 2021 |
NURUL NADHIRAH BINTI ISMAIL MASTER GRADUATED SUPERVISOR 2021 |
ESMAEIL AHMED MOHAMED ELHASSAN AHMED MASTER GRADUATED SUPERVISOR 2022 |
A.RAFIZ BIN ISMAIL MASTER GRADUATED SUPERVISOR 2022 |
NURUL ABIDAH BINTI HYDRUS MASTER GRADUATED SUPERVISOR 2022 |
NAJWA HUSNA BINTI MOHD ISHAK MASTER GRADUATED SUPERVISOR 2022 |
CHIN HSIN TIEN MASTER GRADUATED SUPERVISOR 2024 |
USHARANI A/P RAJANDARAN MASTER GRADUATED SUPERVISOR 2024 |
MOHAMAD RIDZUAN BIN ABDUL RAHMAN MASTER GRADUATED SUPERVISOR 2024 |
MUHAMMAD MIRZA BADRI BIN MOHD MOKTAR MASTER GRADUATED SUPERVISOR 2024 |
WANG YUFEI MASTER ON GOING SUPERVISOR |
MUNIF BIN FAIZ BAFANA MASTER ON GOING SUPERVISOR |
KOONG DE KAI MASTER ON GOING SUPERVISOR |
NICOLAS CHRISTINE ROSE MASTER ON GOING SUPERVISOR |
ADLINA BINTI ABDUL SAMAD AN EHHANCED PRIVACY-PRESERVING EDUCATIONAL DATA MINING MODEL BASED ON K-ANONYMIZATION AND PARTIAL HOMOMORPHIC ENCRYPTION ALGORITHMS MASTER ON GOING SUPERVISOR |
WANG TINGYUE MASTER ON GOING SUPERVISOR |
SHAHAD ALI AHMED SAEED MASTER ON GOING SUPERVISOR |
EFFA OBAZI AMISSINE OGBAN MASTER ON GOING SUPERVISOR |