GRANT(PI & MEMBERS)
24
PUBLICATIONS
85
INDEXED PUBLICATION
37
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
Publications
Supervisions
Legend : SPONSOR TYPE OF GRANT
| Grant Name | Year |
|---|---|
| Novel Congestion Control Schemes for Enhancing Energy Efficiency in Named Data Networking-Based Wireless Mesh Networks for the Internet of Things RUG OF UTM UTM Encouragement Research |
2024 |
| Advanced Framework for Fraud Detection in Financial Transactions through the Integration of Ensemble Learning-Enhanced Temporal Analysis and Unsupervised Machine Learning-Based Behavioral Profiling RUG OF UTM UTM Encouragement Research |
2024 |
| F4+ 3.3: Integrating XAI for Automated Diagnosis and Generative AI for Smart Prescription for Cardiovascular Diseases RUG OF UTM Geran Penyelidikan Hi-Tech(F4) |
2024 |
| PENYELIDIKAN KANDUNGAN KURIKULUM, PEMETAAN KOMPETENSI DAN PENILAIAN KOMPETENSI BAGI KAJIAN SEMULA PROGRAM CERTIFIED FINANCIAL INVESTIGATOR PROGRAM (CFIP) Pusat Pencegahan Jenayah Kewangan Nasional (NFCC) Government Agency Grant |
2024 |
| Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme) MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract |
2020 |
| "R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme) RUG OF UTM Matching Grant |
2020 |
| USING DATA-DRIVEN DECISION MAKING (DDDM) TO IMPROVE ANNUAL PROGRAMME ASSESSMENT REPORT (APAR) FOR UTM RUG OF UTM UTM Encouragement Research |
2020 |
| UTMIcon 4.1: Development of Security Brain Intelligence (SBI) for Cyber Threat Behavioural Analysis RUG OF UTM UTM RA ICONIC GRANT |
2020 |
| UTM-TDR 5.2 (T2): Designing Named-Entity-Recognition Approach for Conflict Case Study RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
| UTM-TDR 5.4 (T1) Unstructured Data Analytics for Threat Intelligence RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
| UTM-TDR 5.5 (T2): Intelligent ChatBot for South China Sea Conflict RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
| UTM-TDR 5.0: STRATEGIC THREAT INTELLIGENCE FOR SOUTH CHINA SEA CONFLICT RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
| Fraudulent Websites Detection System RUG OF UTM High Impact Research Grant |
2018 |
| PRIVACY PRESERVING ASSOCIATION RULE MINING USING ATTRIBUTE-IDENTITY MAPPING ON REAL SENSITIVE DATA RUG OF UTM Tier 2 |
2018 |
| IMPROVED PIPELINE RELIABILITY SIMULATION PERFORMANCE USING COMPUTATIONAL MODELS RUG OF UTM Tier 2 |
2016 |
| Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones. Prototype Development Research Grant Scheme |
2015 |
| Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network Prototype Development Research Grant Scheme |
2015 |
| COMPREHENSIVE PRIVACY-PRESERVING DATA MINING MODEL IN DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
| AUTOMATED INTELLIGENT-BASED ALERT CORRELATION SYSTEM USING HYBRID METHOD RUG OF UTM Geran Penyelidik Baharu |
2014 |
| Public Technology Awareness and Readiness Study in Disaster Management RUG OF UTM Flagship |
2013 |
| Identification of Attacks/Misuse Associated with Email through Email Header Forensic RUG OF UTM Tier 2 |
2012 |
| IMPROVING THE PERFORMANCE OF STRUCTURAL-BASED REAL-TIME ALERT CORRELATION USING MULTIPLE CLUSTERING SYSTEMS RUG OF UTM Tier 2 |
2011 |
| MEASURING AND ASSESSING LEVELS OF PUBLIC SECURITY AWARENESS RUG OF UTM Tier 2 |
2011 |
| PROFILING IN-LINE INSPECTION DATA IN OIL AND GAS PIPELINES (MALAYSIAN TRANSMISSION LINES)USING BAYESIAN NETWORKS RUG OF UTM Tier 2 |
2011 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
| Publication Name | Year |
|---|---|
|
Cybersecurity Assessment Framework For Healthcare Institutions Pre-Medical Cyberphysical System Adoption
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2025 |
|
Enhancing Low-Resolution Images Through Noise Filtering And Feature Preservation
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2025 |
|
An Intrusion Detection Model Based On Convolutional Kolmogorov-Arnold Networks
SCIENTIFIC REPORTS Publication In Web Of Science CO-AUTHOR |
2025 |
|
Enhancing Ids For The Iomt Based On Advanced Features Selection And Deep Learning Methods To Increase The Model Trustworthiness
PLOS ONE Publication In Web Of Science FIRST UTM CORRESPONDING AUTHOR |
2025 |
|
Development Of Threats And Vulnerability Assessment Model For Electric Vehicles (Evs) Transportation Internet Of Things (T-Iot)
PROCEEDINGS OF 2025 4TH INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND THE DIGITAL ECONOMY, CSAIDE 2025 Publication In Scopus CO-AUTHOR |
2025 |
|
An Efficient Intrusion Detection Model Based On Convolutional Spiking
Neural Network
SCIENTIFIC REPORTS Publication In Web Of Science CO-AUTHOR |
2024 |
|
Anomaly-Based Intrusion Detection Model Using Deep Learning For Iot Networks
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES Publication In Web Of Science UTM FIRST AUTHOR |
2024 |
|
Adaptive Cloud Intrusion Detection System Based On Pruned Exact Linear Time Technique
CMC-COMPUTERS MATERIALS & CONTINUA Publication In Web Of Science FIRST UTM CORRESPONDING AUTHOR |
2024 |
|
Comprehensive Review On Data Preservation Models And Standards In Digital Forensic
2024 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ITS APPLICATIONS (ICODSA) Publication In Scopus UTM FIRST AUTHOR |
2024 |
|
An Anomaly Intrusion Detection Systems In Iot Based On Autoencoder: A Review
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES Publication In Scopus UTM FIRST AUTHOR |
2024 |
|
Performance Comparative Study On Zero Day Malware Detection Using Xgboost And Random Forest Classifiers
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2024 |
|
CSM.SOP.DPPDW.02 SOP FOR DATA PROTECTION AND PRESERVATION ON DARK WEB DATASETS Clasified/Technical Report FIRST UTM CORRESPONDING AUTHOR |
2024 |
|
SCIENTIFIC STUDY ON DEVELOPING STANDARD OPERATING PROCEDURE (SOP) FOR DATA PRIVACY AND PRESERVATION IN DARK WEB INVESTIGATION Clasified/Technical Report FIRST UTM CORRESPONDING AUTHOR |
2024 |
|
Utm Master Of Cyber Security In Odl Graduating Its First Batch
UTM NEWSHUB Article In Mass Media INDIVIDUAL AUTHOR |
2024 |
|
Kembara Scratch: Engaging Primary School Students In Coding Through
Scratch Programming
NEW ACADEMIA LEARNING INNOVATION (NALI 2024) Proceedings CO-AUTHOR |
2024 |
|
CSM.SOP.DPPDW.01 SOP FOR DARK WEB DATASETS MANAGEMENT ENSURING DATA SECURITY, PRIVACY AND PRESERVATION Clasified/Technical Report FIRST UTM CORRESPONDING AUTHOR |
2024 |
|
Annual Programme Assessment Report (Apar) Online System
NEW ACADEMIA LEARNING INNOVATION NALI 2023 PROCEEDING Proceedings CO-AUTHOR |
2023 |
|
An Anomaly Intrusion Detection Systems In Iot Based On Autoencoder: A Review
THE 7TH INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY 2023 IRICT 2023 Proceedings FIRST UTM CORRESPONDING AUTHOR |
2023 |
|
SCIENTIFIC STUDY ON DATA ANALYTICS AND TEXT FORENSICS (CAMTEKS SYSTEM) DATA PRESERVATION PROCESS Clasified/Technical Report FIRST UTM CORRESPONDING AUTHOR |
2023 |
|
ADVANCED TEXT ANALYSIS & FORENSIC TEXT ANALYSIS STUDY Clasified/Technical Report CO-AUTHOR |
2023 |
|
Security Issues And Challenges In The Internet Of Medical Things
THE 16TH POSTGRADUATE ANNUAL RESEARCH SEMINAR (PARS) 2023 Conference Paper UTM FIRST AUTHOR |
2023 |
|
Research Issues And Challenges Of Faces Recognition In Low Resolution Images
THE 15TH POSTGRADUATE ANNUAL RESEARCH SEMINARS (PARS) Conference Paper UTM FIRST AUTHOR |
2023 |
|
Hybrid Of Supervised Learning And Optimization
Algorithm For Optimal Detection Of Iot Distributed
Denial Of Service Attacks
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC) Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2023 |
|
STANDARD OPERATING PROCEDURE CYBERSECURITY MALAYSIA: DATA ANALYTICS AND FORENSIC TEXT (CAMTEKS) DATA PRESERVATION WITH FORENSICS COMPLIANCE Modules / Manual FIRST UTM CORRESPONDING AUTHOR |
2023 |
|
An Effective Attack Scenario Construction Model Based
On Identification Of Attack Steps And Stages
INNTERNATIONAL JOURNAL OF INFORMATION SECURITY Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
|
Data Integrity For Dynamic Big Data In Cloud Storage: A Comprehensive Review And Critical Issues
LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2023 |
|
Annual Programme Assessment
Report Online System
NEW ACADEMIA LEARNING INNOVATION 2023 CO-AUTHOR |
2023 |
|
Comparative Analysis On The Image Steganographic Algorithms
2022 2ND INTERNATIONAL CONFERENCE ON EMERGING SMART TECHNOLOGIES AND APPLICATIONS (ESMARTA) Publication In Scopus CO-AUTHOR |
2022 |
|
An Assessment Of Cybersecurity Awareness Level Among Northeastern University Students In Nigeria
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING Publication In Scopus CORRESPONDING AUTHOR |
2022 |
|
Cyber-Attack Prediction Based On Network Intrusion Detection Systems For Alert Correlation Techniques: A Survey
SENSORS Publication In Web Of Science CORRESPONDING AUTHOR |
2022 |
|
Online Penetration Testing For Web Application Based On Owasp Framework
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2021 |
|
Sistem Penempahan Fasiliti Sukan Futsal Daerah Johor Bahru
PROSIDING KOMPUTERAN UTM INOVASI DI DALAM TEKNOLOGI DAN APLIKASI KOMPUTERAN Proceedings CORRESPONDING AUTHOR |
2021 |
|
Mobile Parcel Delivery System For Utm
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2021 |
|
Sistem Pas Keselamatan Fakulti Kejuruteraan Utm
PROSIDING KOMPUTERAN UTM INOVASI DI DALAM TEKNOLOGI DAN APLIKASI KOMPUTERAN Proceedings CORRESPONDING AUTHOR |
2021 |
|
Towards Enhancement Of Privacy-Preserving Data Mining Model For Predicting Students Learning Outcomes Performance
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO) Publication In Scopus CO-AUTHOR |
2021 |
|
Anomaly Intrusion Detection Systems In Iot Using Deep Learning Techniques: A Survey
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES Publication In Scopus CO-AUTHOR |
2021 |
|
Visual Analytics Design For Students Assessment Representationbased On Supervised Learning Algorithms
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2021 |
|
Comparative Study On Feature Selection Techniques In Intrusion Detection Systems Using Ensemble Classifiers
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2021 |
|
Visual Analytics Design For Students Assessment Representation Based On Supervised Learning Algorithms
INTERNAIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2021 |
|
Hac: Model For Privacy-Preserving Outsourced Data Over Cloud
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) Publication In Scopus CORRESPONDING AUTHOR |
2021 |
|
Quasi-Identifier Recognition Algorithm For Privacy Preservation Of Cloud Data Based On Risk Reidentification
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
|
Anomaly-Based Intrusion Detection Systems In Iot Using Deep Learning: A Systematic Literature Review
APPLIED SCIENCES-BASEL Publication In Web Of Science CO-AUTHOR |
2021 |
|
Cybersecurity Awareness Of University Students In Nigeria: Analysis Approach
TURKISH JOURNAL OF COMPUTER AND MATHEMATICS EDUCATION Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2021 |
|
Intrusion Alert Reduction Based On Unsupervised And Supervised Learning Algorithms
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2021 |
|
Online Travel Booking System
UTM COMPUTING PROCEEDINGS INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2021 |
|
South China Sea Conflicts Classification Using Named Entity Recognition (Ner) And Part-Of-Speech (Pos) Tagging
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2020 |
|
A Review On Network Intrusion Detection System Using Machine Learning
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2020 |
|
Cyberbully Detection Using Term Weighting Scheme And Naive Bayes Classifier
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2020 |
|
An Explanatory Review On Cybersecurity Capability Maturity Models
ADVANCES IN SCIENCE, TECHNOLOGY AND ENGINEERING SYSTEMS Publication In Scopus UTM FIRST AUTHOR |
2020 |
|
Iot Real-Time People Counting Using Raspberry Pi (Iot-Repco)
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING Publication In Scopus CO-AUTHOR |
2020 |
|
Cyber Security Awareness Among University Students: A Case Study
JOURNAL OF CRITICAL REVIEWS Publication In Scopus UTM FIRST AUTHOR |
2020 |
|
Named Entity Recognition Of South China Sea Conflicts
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2020 |
|
A Harmony Search-Based Feature Selection Technique
For Cloud Intrusion Detection
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING: EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS Publication In Scopus UTM FIRST AUTHOR |
2020 |
|
Oil Well Detection System For Seismic Surveying Based On Internet Of Things (Iot)
IOP CONFERENCE SERIES: MATERIALS SCIENCE AND ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2020 |
|
Hybrid Solution For Privacy Preserving Data Mining On The Cloud Computing
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING: EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS Publication In Scopus CO-AUTHOR |
2020 |
|
Classification Of Online Grooming On Chat Logs Using Two Term Weighting Schemes
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2019 |
|
A Survey On Privacy Preserving Data Mining Approaches And Techniques
PROCEEDINGS OF THE 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA '19) Publication In Scopus CORRESPONDING AUTHOR |
2019 |
|
Integration Of Sql Injection Prevention Methods
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2019 |
|
Hybrid Method On Clickjacking Detection And Prevention In Modern Advertisements
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2019 |
|
Privacy Preserving Data Mining Based On Geometrical Data Transformation Method (Gdtm) And K-Means Clustering Algorithm
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC) Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2018 |
|
Development Of Metamodel On Information Security Risk Audit And Assessment For It Assets In Commercial Bank
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2018 |
|
Classification Of Sexual Harassment On Facebook Using Term Weighting Schemes
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC) Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2018 |
|
Cyber Physical Security Protection In Online Authentication Mechanisms For Banking Systems
COMPUTING CONFERENCE 2018 Publication In Scopus UTM FIRST AUTHOR |
2018 |
|
Ensemble Classifiers For Spam Review Detection
2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS) Publication In Scopus UTM FIRST AUTHOR |
2018 |
|
A Survey On Development Stages In Alert Correlation
ADVANCES IN DATA MINING AND BUSINESS INTELLIGENCE Book Chapter CORRESPONDING AUTHOR |
2018 |
|
Comparative Study On Corpus Development For Malay Investment Fraud Detection In Website
JOURNAL OF FUNDAMENTAL AND APPLIED SCIENCES Publication In Web Of Science CO-AUTHOR |
2017 |
|
Integration Of Pso And K-Means Clustering Algorithm For Structural-Based Alert Correlation Model
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2017 |
|
Comparative Study Of Aes, Blowfish, Cast-128 And Des Encryption Algorithm
IOSR JOURNAL OF ENGINEERING (IOSRJEN) Journal Article Non Citation-Indexed CO-AUTHOR |
2016 |
|
Feature Selection Using Information Gain For Improved Structural Based Alert Correlation
PLOS ONE Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
|
Privacy Preserving Decision Tree Classification
Using Rsa Encryption On Health Dataset
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2016 |
|
Privacy Preserving Data Mining Based On K-Anonymity And Decision Tree Classification
UTM COMPUTING PROCEEDINGS:INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2016 |
|
A Smart Approach Of E-Exam Assessment Method Using Face Recognition To Address Identity Theft And Cheating
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION SECURITY (IJCSIS) Journal Article Non Citation-Indexed CO-AUTHOR |
2016 |
|
Privacy Preserving Data Mining Based On Random Substitution And Decision Tree Classification
UTM COMPUTING PROCEEDINGS: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2016 |
|
An Improvement Of Student Examination Assessment Through Online (E-Exam) By Considering Psychological Distress Factors
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY & SECURITY (IJCSITS) Journal Article Non Citation-Indexed CO-AUTHOR |
2016 |
|
Hidden Features Extraction Using Independent Component Analysis For Improved Alert Clustering
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT) Publication In Scopus CORRESPONDING AUTHOR |
2015 |
|
Survey On Data Modification Attacks
INTERNATIONAL JOURNAL OF SCIENTIFIC AND ENGINEERING RESEARCH Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2015 |
|
An Artificial Neural Network Modeling For Pipeline Corrosion Growth Prediction
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2015 |
|
A Holistic Based Digital Forensic Readiness Framework For Zenith Bank, Nigeria
3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND SOCIAL SCIENCES (ICCSS2015) Conference Paper CORRESPONDING AUTHOR |
2015 |
|
Towards Metamodel-Based Approach For Information Security Awareness Management
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus UTM FIRST AUTHOR |
2014 |
|
COMPUTER ORGANIZATION AND ARCHITECTURE Modules / Manual CO-AUTHOR |
2014 |
|
Handwritten Alphabets Recognition Using Twelve Directional Feature Extraction And Self Organizing Maps
2014 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA) Publication In Scopus UTM FIRST AUTHOR |
2014 |
|
A Taxonomy On Intrusion Alert Aggregation Techniques
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CORRESPONDING AUTHOR |
2014 |
|
Automated Matching Systems And Correctional Method For Improved Inspection Data Quality
INTERNATIONAL JOURNAL OF COMPUTER THEORY AND ENGINEERING (IJCTE) Journal Article Non Citation-Indexed CO-AUTHOR |
2011 |
|
A Hybrid Intelligent Approach For Automated Alert Clustering And Filtering In Intrusion Alert Analysis
INT. JOURNAL OF COMPUTER THEORY AND ENGINEERING (IJCTE) Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2009 |
|
Network Intrusion Alert Correlation Challenges And Techniques
Jurnal Teknologi Maklumat Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2008 |
Legend : IP CATEGORY IP LEVEL
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
| Supervision List |
|---|
|
TAGWA AHMED MOHAMED ALHAJ AN EFFECTIVE ATTACK SCENARIO CONSTRUCTION MODEL BASED ON TWO-TIER FEATURE SELECTION AND COARSE GRAIN CLEANING PHD GRADUATED SUPERVISOR 2018 |
|
HUDA OSMAN MANSOUR OSMAN CLOUD BASED PRIVACY PRESERVING DATA MINING MODEL USING HYBRID K-ANONYMITY AND PARTIAL HOMOMORPHIC ENCRYPTION PHD GRADUATED SUPERVISOR 2022 |
|
SHAMIEL HASHIM IBRAHIM BAKHEIT ENHANCED INTEGRITY AUDITING SCHEME FOR DYNAMIC DATA STORAGE IN CLOUD COMPUTING PHD GRADUATED SUPERVISOR 2023 |
|
ADAMU ABDULLAHI GARBA AN ENHANCED CYBERSECURITY AWARENESS FRAMEWORK FOR NIGERIA PHD GRADUATED SUPERVISOR 2024 |
|
WIDAD MIRGHANI MAKKI ELBAKRI ENHANCED COLLABORATIVE AND ADAPTIVE CLOUD ANOMALY-BASED INTRUSION DETECTION MODEL PHD GRADUATED SUPERVISOR 2024 |
|
HASHIM HUSSEIN TAHA ENHANCED ADAPTIVE INTRUSION ALERT CORRELATION MODEL FOR ACCURATE DISCOVERY OF ATTACK SCENARIO PHD GRADUATED SUPERVISOR 2025 |
|
WANG ZHEN LIGHTWEIGHT INTRUSION DETECTION MODEL FOR THE INTERNET OF THINGS USING CONVOLUTIONAL SPIKING NEURAL NETWORKS PHD GRADUATED CO-SUPERVISOR 2025 |
|
MUAADH ABDULFATTAH HASSAN ALSOUFI AN INTERNET OF THINGS ADAPTIVE ANOMALY-BASED INTRUSION DETECTION MODEL BASED ON DEEP LEARNING ALGORITHM PHD GRADUATED SUPERVISOR 2025 |
|
ASMA BASHARAT IMAGE-BASED MALWARE CLASSIFICATION MODEL USING HYBRID VISION TRANSFORMER   PHD ON GOING CO-SUPERVISOR |
|
HANAN ALI ABDULHUSSEIN AL-RIKABI ENHANCED FACIAL RECOGNITION MODEL FOR LOW-RESOLUTION IMAGES BASED ON DBN - DAE DEEP LEARNING TECHNIQUES PHD ON GOING SUPERVISOR |
|
MARINA BINTI MD ARSHAD PROFILING OF MONEY LAUNDRING CRIMES USING GRAPH ANALYTICS PHD ON GOING CO-SUPERVISOR |
|
HUSSEIN MOHAMMED MAHMOUD DIFA PHD ON GOING SUPERVISOR |
|
ADLINA BINTI ABDUL SAMAD IDENTITY EXPOSURE OPTIMIZATION ALGORITHM BASED ON ANONYMIZATION AND HOMOMORPHIC ENCRYPTION IN PRIVACY PRESERVATION PHD ON GOING SUPERVISOR |
|
MOHAMED AWAD A ELMAGBARI A FRAMEWORK TO DETERMINE CYBERSECURITY READINESS OF HEALTHCARE TOWARDS APPLICATION OF MEDICAL CYBER PHYSICAL SYSTEMS PHD ON GOING SUPERVISOR |
|
CHIN CHEE YOON EVALUATION FRAMEWORK FOR ASSESSING THE PERFORMANCE OF CLOUD-BASED IDPS   PHD ON GOING SUPERVISOR |
|
IBRAHIM THORIG PHD ON GOING SUPERVISOR |
|
ANIS F ABDALLA ELGARDUH ENHANCING MALWARE DETECTION: A HYBRID IMAGE GENERATION MODEL WITH SPP-NET ADAPTATION AND FEW-SHOT LEARNING PHD ON GOING CO-SUPERVISOR |
|
KHALIFA AHMAD IBRAHIM ALI ALSUWAIDI PHD ON GOING CO-SUPERVISOR |
|
AHMED MUQDAD DAWOOD ALNASRALLAH ENHANCING AND ADAPTING ANOMALY DETECTION SYSTEM FOR THE INTERNET OF MEDICAL THINGS BASED ON FEATURE SELECTION AND DEEP LEARNING APPROACH PHD ON GOING SUPERVISOR |
|
MIRANDA DABIRANZOHOURI MASTER GRADUATED SUPERVISOR 2013 |
|
AHMED YOUSUF JAMA MASTER GRADUATED SUPERVISOR 2014 |
|
ALI OTMAN ALI ALBSHAYREH MASTER GRADUATED SUPERVISOR 2014 |
|
NOR'AQILAH BINTI MISMAN MASTER GRADUATED SUPERVISOR 2014 |
|
SHORAYHA A/P EH CHONG MASTER GRADUATED SUPERVISOR 2015 |
|
ADAMU ABDULLAHI GARBA MASTER GRADUATED SUPERVISOR 2015 |
|
NITHI SURACHMAN MASTER GRADUATED SUPERVISOR 2015 |
|
ALHASSAN JAMILU IBRAHIM MASTER GRADUATED SUPERVISOR 2015 |
|
NUR ATHIRAH BINTI JAMADI MASTER GRADUATED SUPERVISOR 2016 |
|
FAISAL SALEH NASSER AL-ASWER MASTER GRADUATED SUPERVISOR 2016 |
|
ABBAS YASLAM SAEED HUSSEIN MASTER GRADUATED SUPERVISOR 2016 |
|
JAFAR IBRAHEEM MASTER GRADUATED SUPERVISOR 2017 |
|
TAN ZHENG XUN MASTER GRADUATED SUPERVISOR 2017 |
|
KOO NYUK LIN MASTER GRADUATED SUPERVISOR 2017 |
|
SHAJAL ERACHAMPAT MASTER GRADUATED SUPERVISOR 2017 |
|
AMER SAEED ALI ALKATHERI MASTER GRADUATED SUPERVISOR 2017 |
|
SYED MOHD ANWAR ALHABSHI BIN SYED HAMED MASTER GRADUATED SUPERVISOR 2018 |
|
TALAL NASSER SAUD ALHARBI MASTER GRADUATED SUPERVISOR 2018 |
|
RAFEENA BINTI MOHAMAD RABII MASTER GRADUATED SUPERVISOR 2019 |
|
NUR RAFEEQKHA BINTI SULAIMAN MASTER GRADUATED SUPERVISOR 2019 |
|
NURUL ADIBAH BINTI RAHMAT MASTER GRADUATED SUPERVISOR 2020 |
|
BELLO NAZIFI KAGARA MASTER GRADUATED SUPERVISOR 2020 |
|
KIRIT SHASHANK DHURANDHAR MASTER GRADUATED SUPERVISOR 2020 |
|
AHMAD FARIS BIN HARUN ISKANDAR MASTER GRADUATED SUPERVISOR 2020 |
|
HANI GHASSAN ABDUL KARIM MASTER GRADUATED SUPERVISOR 2021 |
|
TALHA FARID MASTER GRADUATED SUPERVISOR 2021 |
|
OYINKANSOLA OLUWAPELUMI KEMI AFOLABI-BABARINSA MASTER GRADUATED SUPERVISOR 2021 |
|
FAKHRIYAH SALIH MOHAMMED ABOUZAEKOUK MASTER GRADUATED SUPERVISOR 2021 |
|
NURUL NADHIRAH BINTI ISMAIL MASTER GRADUATED SUPERVISOR 2021 |
|
ESMAEIL AHMED MOHAMED ELHASSAN AHMED MASTER GRADUATED SUPERVISOR 2022 |
|
A.RAFIZ BIN ISMAIL MASTER GRADUATED SUPERVISOR 2022 |
|
NURUL ABIDAH BINTI HYDRUS MASTER GRADUATED SUPERVISOR 2022 |
|
NAJWA HUSNA BINTI MOHD ISHAK MASTER GRADUATED SUPERVISOR 2022 |
|
MUHAMMAD MIRZA BADRI BIN MOHD MOKTAR MASTER GRADUATED SUPERVISOR 2024 |
|
CHIN HSIN TIEN MASTER GRADUATED SUPERVISOR 2024 |
|
USHARANI A/P RAJANDARAN MASTER GRADUATED SUPERVISOR 2024 |
|
MOHAMAD RIDZUAN BIN ABDUL RAHMAN MASTER GRADUATED SUPERVISOR 2024 |
|
WANG YUFEI MASTER GRADUATED SUPERVISOR 2024 |
|
WANG TINGYUE MASTER GRADUATED SUPERVISOR 2024 |
|
NICOLAS CHRISTINE ROSE MASTER GRADUATED SUPERVISOR 2024 |
|
KOONG DE KAI MASTER GRADUATED SUPERVISOR 2024 |
|
ADLINA BINTI ABDUL SAMAD IDENTITY EXPOSURE OPTIMIZATION ALGORITHM BASED ON ANONYMIZATION AND HOMOMORPHIC ENCRYPTION IN PRIVACY PRESERVATION MASTER GRADUATED SUPERVISOR 2024 |
|
MUNIF BIN FAIZ BAFANA MASTER GRADUATED SUPERVISOR 2025 |
|
KIRTHANA A/P RAMAKIRSHNAN MASTER ON GOING SUPERVISOR |
|
FAHEEM ABDUL RASHEED MASTER ON GOING SUPERVISOR |
|
SHAHRINA BINTI SAHRIL MASTER ON GOING SUPERVISOR |
|
SIVANRAAJ RAJENDRAN MASTER ON GOING SUPERVISOR |
|
TARVIND JAYARAMAN MASTER ON GOING SUPERVISOR |
|
CHAN JIA YI MASTER ON GOING SUPERVISOR |
|
EFFA OBAZI AMISSINE OGBAN MASTER ON GOING SUPERVISOR |
|
SAM JEBA RAJ A/L KRISHNAN MASTER ON GOING SUPERVISOR |