GRANT(PI & MEMBERS)

33

PUBLICATIONS

49

INDEXED PUBLICATION

25

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

NATIONAL GRANTS
2
UNIVERSITY FUND
4
TOTAL

Publications

INDEXED PUBLICATION
25
NON-INDEXED PUBLICATION
13
OTHERS PUBLICATION
11
TOTAL

Supervisions

DEGREE
0
MASTER
26
PHD
28
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
ASSESSMENT AND MITIGATION OF LANDSLIDE RISKS THROUGH ARTIFICIAL INTELLIGENCE-BASED SOLUTION
UNIVERSITAS KRISTEN SATYA WACANA Networking Grant
2023
Hybrid Health Monitoring Predictions Algorithm Based on Extended Long Short-Term Memory Network (LSTM) and Decision Tree (DT) Approach
POST DOCTORAL FELLOWSHIP Professional Development Research University
2023
A Framework for Decision-Making under Risk and Uncertainty for Supply Chain Performance in Electric Vehicle Manufacturing in Malaysia
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2021
05E86 - Health Monitoring based on AI & Wearable IoT Sensors
POST DOCTORAL FELLOWSHIP (SPECIAL) Professional Development Research University
2021
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme)
MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract
2020
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme)
RUG OF UTM Matching Grant
2020
UTM STUDENT TRACER STUDY AND COMPETENCY TALENT INDEX (CTI)FOR GRADUATE EMPLOYABILITY(GE)IMPROVEMENT
PEJABAT NAIB CANSELOR Business Entity
2020
An Incremental Tourism (INCTOURISM) Software System based on Artificial Intelligent Approaches for Tourism Product Marketing in Malaysian Rural Areas
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2019
An Intelligent Decision Support System for Heart Disease Diagnosis
RUG OF UTM Tier 1
2016
SEMANTIC WEB ONTOLOGIES IN E-HEALTH TECHNOLOGIES FOR ENHANCING QUALITY OF HEALTHCARE SERVICES IN MALAYSIA
RUG OF UTM Tier 1
2014
COMPREHENSIVE PRIVACY-PRESERVING DATA MINING MODEL IN DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
SOCIAL IMPACT OF DIGITAL CAMPUS SECURITY INFRASTRUCTURE
RUG OF UTM Flagship-Research Group
2014
Multi-Criteria Collaborative Filtering System Based on Incremental Support Vector Regression and Dimensionality Reduction Techniques
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2014
DEVELOPMENT OF HUMAN FACTOR THREATS PROBLEM-BASED MODEL FOR HOSPITAL HEALTHCARE SYSTEM
RUG OF UTM Tier 1
2014
DEVELOPMENT OF A GRAPHICAL PASSWORD SCHEME USING HIGH USABILITY AUTHENTICATION TECHNIQUE FOR MULTI TOUCH SCREEN TECHNOLOGY
RUG OF UTM Tier 2
2011
Secure Digital Document Signing using Biometric Features
RUG OF UTM Tier 2
2011
An Understanding on Co-Creation of Value Integration for C2G Service Applications in Malaysia: A Case Study Approach
RUG OF UTM Tier 2
2011
An Alternative File Signature Analysis Technique for Computer Forensic Investigation
RUG OF UTM Tier 2
2011
Dynamic Risk Analysis Model for A Secure System
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2007
Development Of High Usability And Secure Knowledge Based Authentication Technique Using Hybrid Graphical Password Scheme
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2006
Risk Analysis On Cyber Campus Modules
Short Term
1995
Security Issues in Electronic Voting System (EVS)
Short Term
1995

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Comparing Malware Attack Detection Using Machine Learning Techniques In Iot Network Traffic
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed CO-AUTHOR
2023
Efficient Resource Allocation Algorithm In Uplink Ofdm-Based Cognitive Radio Networks
CMC-COMPUTERS, MATERIALS & CONTINUA
Publication In Scopus UTM FIRST AUTHOR
2023
Efficient Power Control For Uav Based On Trajectory And Game Theory
CMC-COMPUTERS MATERIALS & CONTINUA
Publication In Web Of Science UTM FIRST AUTHOR
2023
Probing Determinants Affecting Intention To Adopt Cloud Technology In E-Government Systems
SUSTAINABILITY
Publication In Web Of Science CO-AUTHOR
2022
Game Theory-Based Iot Efficient Power Control In Cognitive Uav
COMPUTERS, MATERIALS & CONTINUA
Publication In Web Of Science UTM FIRST AUTHOR
2022
Microsleep Detection Usingconvolution Neural Network (Cnn) In Deep Learning (Dl) For Accident Prevention
INTERNATIONAL CONFERENCE ON APPLIED DATA SCIENCE &COMPUTATIONAL INTELLIGENCE 2022 ADSCI 2022
Conference Paper CO-AUTHOR
2022
Feemd And Gwo Methodology For Flood Early Warning Prediction Model
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2022
Microsleep Accident Preventation For Smart Vehicle Via Image Processing Integrated With Artificial Intelligent
THE 3RD INTERNATIONAL CONFERENCE ON APPLIED COMPUTING ICAC2021
Conference Paper CO-AUTHOR
2021
Microsleep Accident Prevention For Smart Vehicle Via Image Processing Integrated With Artificial Intelligent
JOURNAL OF PHYSICS: CONFERENCE SERIES (JPCS)
Publication In Scopus CO-AUTHOR
2021
Locking System Via Deep Learning For Adult
PROCEEDING OF COMMUNICATION NETWORK SYSTEM COLLOQUIUM 2021
Proceedings CORRESPONDING AUTHOR
2021
Intelligent Locking System Using Deep Learning For Autonomous Vehicle In Internet Of Things
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
Publication In Scopus CO-AUTHOR
2021
Investigating A New Integrated Framework For Hacking Countermeasure: A Case Study To Depart From Traditional Thinking To Hackers Mind To Innovate Hacking Countermeasure – Part One
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2021
Toward Rainfall Prediction Model For Early Warning System Of Flood Disaster In Malaysia
JOURNAL OF ADV RESEARCH IN DYNAMICAL & CONTROL SYSTEMS
Publication In Scopus UTM FIRST AUTHOR
2020
Cfaas: Bilaterally Agreed Evidence Collection
JOURNAL OF CLOUD COMPUTING ADVANCES, SYSTEMS AND APPLICATIONS
Publication In Scopus UTM FIRST AUTHOR
2018
The Approaches To Quantify Web Application Security Scanners Quality: A Review
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER RESEARCH
Publication In Scopus UTM FIRST AUTHOR
2018
Privacy Preserving Data Mining Based On Geometrical Data Transformation Method (Gdtm) And K-Means Clustering Algorithm
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC)
Journal Article Non Citation-Indexed CO-AUTHOR
2018
Survey On The Representation Technique For Malware Detection System
AMERICAN JOURNAL OF APPLIED SCIENCES
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2017
Factors Influencing Cloud Computing Adoption For E-Government Implementation In Developing Countries: Instrument Development
JOURNAL OF SYSTEMS AND INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2016
Clustering- And Regression-Based Multi-Criteria Collaborative Filtering With Incremental Updates
INFORMATION SCIENCES
Publication In Web Of Science CO-AUTHOR
2015
A Multi-Criteria Collaborative Filtering Recommender System For The Tourism Domain Using Expectation Maximization (Em) And Pca-€“Anfis
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS
Publication In Web Of Science CO-AUTHOR
2015
A Multi-Criteria Recommendation System Using Dimensionality Reduction And Neuro-Fuzzy Techniques
SOFT COMPUTING
Publication In Web Of Science CO-AUTHOR
2015
Physical Security Framework For Power Plants In Yemen
JURNAL TEKNOLOGI
Publication In Scopus UTM FIRST AUTHOR
2015
An Artificial Neural Network Modeling For Pipeline Corrosion Growth Prediction
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus CO-AUTHOR
2015
Hybrid Recommendation Approaches For Multi-Criteria Collaborative Filtering
EXPERT SYSTEMS WITH APPLICATIONS
Publication In Web Of Science CO-AUTHOR
2014
Bsm: Broadcasting Of Safety Messages In Vehicular Ad Hoc Networks
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
Publication In Web Of Science UTM FIRST AUTHOR
2014
Towards Managing Information Security Knowledge Through Metamodeling Approach
INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST'14)
Conference Paper CO-AUTHOR
2014
A Conceptual Formative Framework Of Knowledge Risk Governance To Enhance Knowledge Sharing
PACIS2014 PROCEEDINGS
Proceedings CO-AUTHOR
2014
Click-Draw Eventsgrid Based Graphical Password Scheme
1ST INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES (IRICT 2014)
Proceedings UTM FIRST AUTHOR
2014
Broadcasting In Connected And Fragmented Vehicular Ad Hoc Networks
INTERNATIONAL JOURNAL OF VEHICULAR TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2014
Estimation Of Optimal Machining Control Parameters Using Artificial Bee Colony
JOURNAL OF INTELLIGENT MANUFACTURING
Publication In Web Of Science CO-AUTHOR
2014
Multi-Criteria Collaborative Filtering With High Accuracy Using Higher Order Singular Value Decomposition And Neuro-Fuzzy System
KNOWLEDGE-BASED SYSTEMS
Publication In Web Of Science CO-AUTHOR
2014
Numerical Analysis Of Parallel Modular Exponentiation For Rsa Using Interconnection Networks
SCIENCEASIA
Publication In Web Of Science UTM FIRST AUTHOR
2013
Measuring Semantic Similarity In Grids Using Ontology
INTERNATIONAL JOURNAL OF INNOVATION AND APPLIED STUDIES
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Parallel Rsa Encryption Based On Tree Architecture
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS
Publication In Web Of Science UTM FIRST AUTHOR
2013
Measuring Semantic Similarity In Grids Using Ontologyissn
INTERNATIONAL JOURNAL OF INNOVATION AND APPLIED STUDIES
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Strategic Assessment Of Brand Identity In Organizations By Using Aaker Model (Case Study: Iran And Asia Insurance Companies)
INTERNATIONAL JOURNAL OF EMERGING SCIENCES
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Dimensions Of Knowledge Sharing Quality: An Empirical Investigation
JOURNAL OF RESEARCH AND INNOVATION IN INFORMATION SYSTEMS
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Strategic Assessment Of Brand Identity In Organizations By Using Aaker Model (Case Study: Iran And Asia Insurance Companies)
INTERNATIONAL JOURNAL OF EMERGING SCIENCES
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Dimensions Of Knowledge Sharing Quality: An Empirical Investigation
JOURNAL OF RESEARCH AND INNOVATION IN INFORMATION SYSTEMS
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Competency Based Education (Cbe) For It Security: Towards Bridging The Gap (Extended)
INTERNATIONAL JOURNAL OF ENGINEERING PEDAGOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2012
An Optimization Of Tree Topology Based Parallel Cryptography
MATHEMATICAL PROBLEMS IN ENGINEERING
Publication In Web Of Science UTM FIRST AUTHOR
2012
User Affinity Of Choice-Features Of Mobile Device Graphical Password Scheme Anti-Shoulder Surfing Mechanism
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2011
Security Backlog In Scrum Security Practices
2011 5TH MALAYSIAN CONFERENCE IN SOFTWARE ENGINEERING, MYSEC 2011
Publication In Scopus CO-AUTHOR
2011
Identifying The Re-Usability Of Triangle Scheme And Intersection Scheme On Mobile Device
COMPUTER AND INFORMATION SCIENCE
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2011
Graphical Password: User'S Affinity Of Choice - An Analysis Of Picture Attributes Selection
International Symposium on Information Technology
Conference Paper INDIVIDUAL AUTHOR
2008
Towards Identifying Usability And Security Features Of Graphical Password In Knowledge Based Authentication Technique
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008
Conference Paper INDIVIDUAL AUTHOR
2008
Graphical Password: Comprehensive Study Of The Usability Features Of The Recognition Base Graphical Password Methods
Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Conference Paper INDIVIDUAL AUTHOR
2008
E-Government Services And Citizen Adoption .
Postgraduate Annual Research Seminar (PARS2006) Proceeding
Conference Paper CO-AUTHOR
2006
Security Issues, Attack Trends Related To The Confidentiality, Integrity, And Availability Of Information Assets On An Organization'S Computer System
Postgraduate Annual Research Seminar (PARS06) Proceeding
Conference Paper CORRESPONDING AUTHOR
2006

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
NORANIAH MOHD. YASSIN
TEACHING DIFFICULT CONCEPTS TO FIRST YEAR SOFTWARE ENGINEERING STUDENTS VIA PAIR PROGRAMMING
PHD FAIL AND DISMISSAL CO-SUPERVISOR
SALAHEDIN ALI .AB NAMROUSH
MODELING USER'S INTENTION TO USE E-GOVERNMENT TO CITIZEN SERVICES IN MALAYSIA
PHD GRADUATED CO-SUPERVISOR 2010
RAMIN KARIMI
IMPROVED CONNECTIVITY IN GEOGRAPHIC ROUTING PROTOCOLS USING DELAY-TOLERANT NETWORKS SCHEME IN VEHICULAR AD HOC NETWORKS
PHD GRADUATED SUPERVISOR 2013
SARA NAJAFZADEH
A NEIGHBOR-AWARE BROADCASTING PROTOCOL FOR SAFETY MESSAGES ON HETEROGENEOUS COMMUNICATION RANGE VEHICULAR AD HOC NETWORKS
PHD GRADUATED SUPERVISOR 2013
MASUMEH DAMRUDI
INTERCONNECTION NETWORKS FOR MODULAR EXPONENTIATION BASED CRYPTOGRAPHIC ALGORITHMS
PHD GRADUATED SUPERVISOR 2013
MAZURA BINTI MAT DIN
COMPUTATIONAL BASED AUTOMATED PIPELINE CORROSION DATA ASSESSMENT
PHD GRADUATED SUPERVISOR 2015
AZADEH SARKHEYLI
KNOWLEDGE SHARING RISK GOVERNANCE FRAMEWORK
PHD GRADUATED CO-SUPERVISOR 2015
HAZINAH BINTI KUTTY MAMMI
A CURRICULUM STRUCTURE FOR INSTITUTES OF HIGHER LEARNING (IHLS) THAT CONTRIBUTES TO PRODUCING COMPETENT SOFTWARE ENGINEERS (IN THE AREA OF SECURITY) FOR THE INDUSTRY.
PHD ON GOING SUPERVISOR
OBASAN ADEBOLA OLUKAYODE
IMPROVED MEMORABILITY RATE IN GRAPHICAL PASSWORD AUTHENTICATION SCHEME USING AUTOBIOGRAPHICAL MEMORY APPROACH
PHD GRADUATED SUPERVISOR 2016
SAID KHALFAN SAID AL-WAHAIBI
HACKING COUNTERMEASURE FRAMEWORK
PHD GRADUATED SUPERVISOR 2016
AHMED NOUR MOUSSA
ENHANCED FORENSIC PROCESS MODEL IN CLOUD ENVIRONMENT
PHD GRADUATED SUPERVISOR 2018
LIM KAH SENG
ENHANCEMENT OF AUTOMATED BLACK-BOX WEB APPLICATION VULNERABILITY ASSESSMENT ALGORITHMS
PHD GRADUATED SUPERVISOR 2019
SAID KHALFAN SAID AL-WAHAIBI
HACKING COUNTERMEASURE FRAMEWORK FOR OMAN COMPUTER EMERGENCY READINESS TEAM USING DELPHI APPROACH
PHD GRADUATED SUPERVISOR 2022
GAMAL ABDEL NASSIR AWAD ALI MOHAMED
STRING-BASED REPRESENTATION TECHNIQUES FOR MALWARE DETECTION MODEL
PHD GRADUATED SUPERVISOR 2022
ISHARA BARHOSON GALADIMA

PHD ON GOING SUPERVISOR
SITI ZALEHA BINTI HARUN
MACHINE LEARNING-DRIVEN MICROSLEEP DETECTION: AN ADVANCED MODEL INTEGRATING PHYSIOLOGICAL AND BEHAVIORAL FEATURES
PHD ON GOING SUPERVISOR
NOOR HAYATI BT MOHD ZAIN
IMPROVED ADAPTIVE NEURO FUZZY INFERENCE SYSTEM USING META-HEURISTICS OPTIMIZATION TECHNIQUE FOR RAINFALL PREDICTION ACCURACY
PHD ON GOING SUPERVISOR
KHALIFA AHMAD IBRAHIM ALI ALSUWAIDI
IMPLEMENTATION OF CYBERSECURITY POLICIES AND THEIR ROLE IN REDUCING CYBERCRIME WITHIN THE CHARITY SECTOR IN THE UAE AFTER 2010.
PHD ON GOING SUPERVISOR
JUNIARDI NUR FADILA
LEVERAGING SOFTWARE-DEFINED NETWORKING AND DIGITAL TWIN TECHNOLOGIES FOR EFFICIENT ROAD TRAFFIC CONTROL SYSTEM
PHD ON GOING CO-SUPERVISOR
NORSYALIZA BINTI ABD RAZAK
DATA QUALITY WITH DATA PRIVACY MODEL FOR BIG DATA INTEGRATION WITH UNIFIED MODEL APPROACHES
PHD ON GOING SUPERVISOR
SHUM CHEN YAU

PHD ON GOING SUPERVISOR
SAID HAMOOD AMUR ALTALA`I
ENHANCE TRUST EVALUATION MODEL OF THE CLOUD COMPUTING USING FUZZY LOGIC  
PHD ON GOING SUPERVISOR
MUHAMMAD DANIEL HAFIZ BIN ABDULLAH
MUTUAL INSTRUCTION DETECTION SYSTEM FOR AD-HOC NETWORKS
MASTER GRADUATED SUPERVISOR 2010
OYELAMI JULIUS OLUSEGUN

MASTER ON GOING SUPERVISOR
IKHWAN ZAINI BIN AWANG MAT SAAID
KOMPONEN MAKLUMBALAS INSIDEN KESELAMATAN MAKLUMAT IPTA
MASTER ON GOING SUPERVISOR
LIM KAH SENG
THE ENHANCEMENT OF AUTOMATED WEB APPLICATION SECURITY ASSESSMENT ALGORITHMS TO REDUCE THE FALSE NEGATIVE
MASTER GRADUATED SUPERVISOR 2011
MOHAMED ISMAIL GURHAN

MASTER GRADUATED SUPERVISOR 2013
ISSE MOHAMUD ABDI

MASTER GRADUATED SUPERVISOR 2013
SAMAN ASADI

MASTER GRADUATED SUPERVISOR 2013
ABUBAKAR MOHAMMED

MASTER GRADUATED SUPERVISOR 2014
ABUBAKAR MAGIRA TOM

MASTER GRADUATED SUPERVISOR 2014
NOR FAZLINA BINTI MOHD AMIN

MASTER GRADUATED SUPERVISOR 2015
NUR ZAFIRAH BINTI ABD HASHIM

MASTER GRADUATED SUPERVISOR 2015
MUSTAPHA ATIKU

MASTER GRADUATED SUPERVISOR 2015
NURHAMIZAH HAZWANI BINTI MOHAMAD

MASTER GRADUATED SUPERVISOR 2016
NURFARHANA SHAZWANI BINTI MOHAMAD

MASTER GRADUATED SUPERVISOR 2016
OYELAMI JULIUS OLUSEGUN
ENHANCING INFORMATION SECURITY MANAGEMENT FRAMEWORK BASED ON HUMAN FACTORS FOR ORGANIZATION INFORMATION SHARING
MASTER GRADUATED SUPERVISOR 2016
SAID KHALFAN SAID AL-WAHAIBI
HACKING COUNTERMEASURE FRAMEWORK
MASTER GRADUATED SUPERVISOR 2017
FATIN ZULAIKHA BINTI FEZARUDIN
KNOWLEDGE DISCOVERY FOR HALAL HUMAN CAPITAL AND HALAL TRAINING PROGRAMS IN MALAYSIA
MASTER GRADUATED CO-SUPERVISOR 2019
AYUB SULEIMAN JAMA

MASTER GRADUATED SUPERVISOR 2020
NURHIDAYAH BINTI MOHD TAHIR

MASTER GRADUATED SUPERVISOR 2023
SHUM CHEN YAU

MASTER GRADUATED SUPERVISOR 2023
SHIMRATH TEOH SHAN MEAY

MASTER GRADUATED SUPERVISOR 2023
HO XIAO HAN

MASTER ON GOING SUPERVISOR
HE YATING

MASTER ON GOING SUPERVISOR
MOHD HAFIZI BIN ABDUL RAZAK

MASTER ON GOING SUPERVISOR