GRANT(PI & MEMBERS)
35
PUBLICATIONS
52
INDEXED PUBLICATION
28
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
NATIONAL GRANTS
2
UNIVERSITY FUND
4
TOTAL
Publications
INDEXED PUBLICATION
28
NON-INDEXED PUBLICATION
13
OTHERS PUBLICATION
11
TOTAL
Supervisions
MASTER
30
PHD
30
TOTAL
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
ASSESSMENT AND MITIGATION OF LANDSLIDE RISKS THROUGH ARTIFICIAL INTELLIGENCE-BASED SOLUTION UNIVERSITAS KRISTEN SATYA WACANA Networking Grant |
2023 |
Hybrid Health Monitoring Predictions Algorithm Based on Extended Long Short-Term Memory Network (LSTM) and Decision Tree (DT) Approach POST DOCTORAL FELLOWSHIP Professional Development Research University |
2023 |
A Framework for Decision-Making under Risk and Uncertainty for Supply Chain Performance in Electric Vehicle Manufacturing in Malaysia MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2021 |
05E86 - Health Monitoring based on AI & Wearable IoT Sensors POST DOCTORAL FELLOWSHIP (SPECIAL) Professional Development Research University |
2021 |
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme) MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract |
2020 |
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme) RUG OF UTM Matching Grant |
2020 |
UTM STUDENT TRACER STUDY AND COMPETENCY TALENT INDEX (CTI)FOR GRADUATE EMPLOYABILITY(GE)IMPROVEMENT PEJABAT NAIB CANSELOR Business Entity |
2020 |
An Incremental Tourism (INCTOURISM) Software System based on Artificial Intelligent Approaches for Tourism Product Marketing in Malaysian Rural Areas MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2019 |
An Intelligent Decision Support System for Heart Disease Diagnosis RUG OF UTM Tier 1 |
2016 |
SEMANTIC WEB ONTOLOGIES IN E-HEALTH TECHNOLOGIES FOR ENHANCING QUALITY OF HEALTHCARE SERVICES IN MALAYSIA RUG OF UTM Tier 1 |
2014 |
COMPREHENSIVE PRIVACY-PRESERVING DATA MINING MODEL IN DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
SOCIAL IMPACT OF DIGITAL CAMPUS SECURITY INFRASTRUCTURE RUG OF UTM Flagship-Research Group |
2014 |
Multi-Criteria Collaborative Filtering System Based on Incremental Support Vector Regression and Dimensionality Reduction Techniques MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2014 |
DEVELOPMENT OF HUMAN FACTOR THREATS PROBLEM-BASED MODEL FOR HOSPITAL HEALTHCARE SYSTEM RUG OF UTM Tier 1 |
2014 |
DEVELOPMENT OF A GRAPHICAL PASSWORD SCHEME USING HIGH USABILITY AUTHENTICATION TECHNIQUE FOR MULTI TOUCH SCREEN TECHNOLOGY RUG OF UTM Tier 2 |
2011 |
Secure Digital Document Signing using Biometric Features RUG OF UTM Tier 2 |
2011 |
An Understanding on Co-Creation of Value Integration for C2G Service Applications in Malaysia: A Case Study Approach RUG OF UTM Tier 2 |
2011 |
An Alternative File Signature Analysis Technique for Computer Forensic Investigation RUG OF UTM Tier 2 |
2011 |
Dynamic Risk Analysis Model for A Secure System MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2007 |
Development Of High Usability And Secure Knowledge Based Authentication Technique Using Hybrid Graphical Password Scheme MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2006 |
Risk Analysis On Cyber Campus Modules Short Term |
1995 |
Security Issues in Electronic Voting System (EVS) Short Term |
1995 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
An In-Depth Review Of Revolutionizing Traffic Control Systems Leveraging Software-Defined Networking (Sdn)
2024 IEEE 14TH SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE) Publication In Scopus CO-AUTHOR |
2024 |
Microsleep Detection Using Convolution Neural Network (Cnn) In Deep Learning (Dl) For Accident Prevention
AIP CONFERENCE PROCEEDINGS Publication In Scopus CO-AUTHOR |
2024 |
Efficient Power Control For Uav Based On Trajectory And Game Theory
CMC-COMPUTERS MATERIALS & CONTINUA Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
Efficient Resource Allocation Algorithm In Uplink Ofdm-Based Cognitive Radio Networks
CMC-COMPUTERS, MATERIALS & CONTINUA Publication In Scopus UTM FIRST AUTHOR |
2023 |
Comparing Malware Attack Detection Using Machine Learning Techniques In Iot Network Traffic
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2023 |
Facial Feature-Based Microsleep Detection With High Precision Using Deep Learning
INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE INFORMATION, INDUSTRIAL MANAGEMENT AND APPLICATIONS, SKIMA Publication In Scopus UTM FIRST AUTHOR |
2023 |
Probing Determinants Affecting Intention To Adopt Cloud Technology In E-Government Systems
SUSTAINABILITY Publication In Web Of Science CO-AUTHOR |
2022 |
Game Theory-Based Iot Efficient Power Control In Cognitive Uav
COMPUTERS, MATERIALS & CONTINUA Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
Feemd And Gwo Methodology For Flood Early
Warning Prediction Model
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2022 |
Microsleep Detection Usingconvolution Neural Network (Cnn) In Deep Learning (Dl) For Accident Prevention
INTERNATIONAL CONFERENCE ON APPLIED DATA SCIENCE &COMPUTATIONAL INTELLIGENCE 2022 ADSCI 2022 Conference Paper CO-AUTHOR |
2022 |
Locking System Via Deep Learning For Adult
PROCEEDING OF COMMUNICATION NETWORK SYSTEM COLLOQUIUM 2021 Proceedings CORRESPONDING AUTHOR |
2021 |
Intelligent Locking System Using Deep Learning For Autonomous Vehicle In Internet Of Things
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS Publication In Scopus CO-AUTHOR |
2021 |
Investigating A New Integrated Framework For Hacking Countermeasure: A Case Study To Depart From Traditional Thinking To Hackers Mind To Innovate Hacking Countermeasure – Part One
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2021 |
Microsleep Accident Preventation For Smart Vehicle Via Image Processing Integrated With Artificial Intelligent
THE 3RD INTERNATIONAL CONFERENCE ON APPLIED COMPUTING ICAC2021 Conference Paper CO-AUTHOR |
2021 |
Microsleep Accident Prevention For Smart Vehicle Via Image Processing Integrated With Artificial Intelligent
JOURNAL OF PHYSICS: CONFERENCE SERIES (JPCS) Publication In Scopus CO-AUTHOR |
2021 |
Toward Rainfall Prediction Model For Early Warning System Of Flood Disaster In Malaysia
JOURNAL OF ADV RESEARCH IN DYNAMICAL & CONTROL SYSTEMS Publication In Scopus UTM FIRST AUTHOR |
2020 |
Cfaas: Bilaterally Agreed Evidence Collection
JOURNAL OF CLOUD COMPUTING ADVANCES, SYSTEMS AND APPLICATIONS Publication In Scopus UTM FIRST AUTHOR |
2018 |
Privacy Preserving Data Mining Based On Geometrical Data Transformation Method (Gdtm) And K-Means Clustering Algorithm
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC) Journal Article Non Citation-Indexed CO-AUTHOR |
2018 |
The Approaches To Quantify Web Application Security Scanners Quality: A Review
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER RESEARCH Publication In Scopus UTM FIRST AUTHOR |
2018 |
Survey On The Representation Technique For Malware Detection System
AMERICAN JOURNAL OF APPLIED SCIENCES Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2017 |
Factors Influencing Cloud Computing Adoption For E-Government Implementation In Developing Countries: Instrument Development
JOURNAL OF SYSTEMS AND INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2016 |
A Multi-Criteria Recommendation System Using Dimensionality Reduction And Neuro-Fuzzy Techniques
SOFT COMPUTING Publication In Web Of Science CO-AUTHOR |
2015 |
Clustering- And Regression-Based Multi-Criteria Collaborative Filtering With Incremental Updates
INFORMATION SCIENCES Publication In Web Of Science CO-AUTHOR |
2015 |
A Multi-Criteria Collaborative Filtering Recommender System For The Tourism Domain Using Expectation Maximization (Em) And Pca-ÃÂÃÂÃÂÃÂAnfis
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS Publication In Web Of Science CO-AUTHOR |
2015 |
An Artificial Neural Network Modeling For Pipeline Corrosion Growth Prediction
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2015 |
Physical Security Framework For Power Plants In Yemen
JURNAL TEKNOLOGI Publication In Scopus UTM FIRST AUTHOR |
2015 |
Estimation Of Optimal Machining Control Parameters Using Artificial Bee Colony
JOURNAL OF INTELLIGENT MANUFACTURING Publication In Web Of Science CO-AUTHOR |
2014 |
Multi-Criteria Collaborative Filtering With High Accuracy Using Higher Order Singular Value Decomposition And Neuro-Fuzzy System
KNOWLEDGE-BASED SYSTEMS Publication In Web Of Science CO-AUTHOR |
2014 |
Hybrid Recommendation Approaches For Multi-Criteria Collaborative Filtering
EXPERT SYSTEMS WITH APPLICATIONS Publication In Web Of Science CO-AUTHOR |
2014 |
Bsm: Broadcasting Of Safety Messages In Vehicular Ad Hoc Networks
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Towards Managing Information Security Knowledge Through Metamodeling Approach
INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST'14) Conference Paper CO-AUTHOR |
2014 |
A Conceptual Formative Framework Of Knowledge Risk Governance To Enhance Knowledge Sharing
PACIS2014 PROCEEDINGS Proceedings CO-AUTHOR |
2014 |
Click-Draw Eventsgrid Based Graphical Password Scheme
1ST INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES (IRICT 2014) Proceedings UTM FIRST AUTHOR |
2014 |
Broadcasting In Connected And Fragmented Vehicular Ad Hoc Networks
INTERNATIONAL JOURNAL OF VEHICULAR TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2014 |
Measuring Semantic Similarity In Grids Using Ontology
INTERNATIONAL JOURNAL OF INNOVATION AND APPLIED STUDIES Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Parallel Rsa Encryption Based On Tree Architecture
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
Measuring Semantic Similarity In Grids Using Ontologyissn
INTERNATIONAL JOURNAL OF INNOVATION AND APPLIED STUDIES Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Strategic Assessment Of Brand Identity In Organizations By Using Aaker Model (Case Study: Iran And Asia Insurance Companies)
INTERNATIONAL JOURNAL OF EMERGING SCIENCES Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Dimensions Of Knowledge Sharing Quality: An Empirical Investigation
JOURNAL OF RESEARCH AND INNOVATION IN INFORMATION SYSTEMS Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Numerical Analysis Of Parallel Modular Exponentiation For Rsa Using Interconnection Networks
SCIENCEASIA Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
Dimensions Of Knowledge Sharing Quality: An Empirical Investigation
JOURNAL OF RESEARCH AND INNOVATION IN INFORMATION SYSTEMS Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Strategic Assessment Of Brand Identity In Organizations By Using Aaker Model (Case Study: Iran And Asia Insurance Companies)
INTERNATIONAL JOURNAL OF EMERGING SCIENCES Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Competency Based Education (Cbe) For It Security: Towards Bridging The Gap (Extended)
INTERNATIONAL JOURNAL OF ENGINEERING PEDAGOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2012 |
An Optimization Of Tree Topology Based
Parallel Cryptography
MATHEMATICAL PROBLEMS IN ENGINEERING Publication In Web Of Science UTM FIRST AUTHOR |
2012 |
User Affinity Of Choice-Features Of Mobile Device Graphical Password Scheme Anti-Shoulder Surfing Mechanism
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2011 |
Identifying The Re-Usability Of Triangle Scheme And Intersection Scheme On Mobile Device
COMPUTER AND INFORMATION SCIENCE Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2011 |
Security Backlog In Scrum Security Practices
2011 5TH MALAYSIAN CONFERENCE IN SOFTWARE ENGINEERING, MYSEC 2011 Publication In Scopus CO-AUTHOR |
2011 |
Graphical Password: Comprehensive Study Of The Usability Features Of The Recognition Base Graphical Password Methods
Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Towards Identifying Usability And Security Features Of Graphical Password In Knowledge Based Authentication Technique
Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008 Conference Paper INDIVIDUAL AUTHOR |
2008 |
Graphical Password: User'S Affinity Of Choice - An Analysis Of Picture Attributes Selection
International Symposium on Information Technology Conference Paper INDIVIDUAL AUTHOR |
2008 |
E-Government Services And Citizen Adoption .
Postgraduate Annual Research Seminar (PARS2006) Proceeding Conference Paper CO-AUTHOR |
2006 |
Security Issues, Attack Trends Related To The Confidentiality, Integrity, And Availability Of Information Assets On An Organization'S Computer System
Postgraduate Annual Research Seminar (PARS06) Proceeding Conference Paper CORRESPONDING AUTHOR |
2006 |
Legend : IP CATEGORY IP LEVEL
Intellectual Property Name | Grant Register No. | IP Level | IP Category |
---|---|---|---|
VARIABLE ANALYSIS FOR KNOWLEDGE CREATION THEORY | NATIONAL | PATENT | |
HYGRIPS-GRAPHICAL PASSWORD AUTHENTICATION | NATIONAL | PATENT | |
CONTENT-DRIVEN RECONNAISSANCE TECHNIQUE FOR AUTOMATED WEB APPLICATION VULNERABILITY ASSESSMENT | LY2019008991 | NATIONAL | COPYRIGHT |
A WEB APPLICATION SECURITY SCANNER | LY2018007006 | NATIONAL | COPYRIGHT |
INFORMATION SECURITY HACKING COUNTERMEASURES FRAMEWORK | LY2018001315 | NATIONAL | COPYRIGHT |
MOBILE-BASED CONSULTATION AND MEDICATION REMINDER APPLICATION | NATIONAL | COPYRIGHT | |
CAMPUS GATE PASS MANAGEMENT SYSTEM USING RFID | NATIONAL | COPYRIGHT | |
MOBILECURE GRAPHICAL PASSWORD ANTI-SHOULDER SURFING MEHCANISM | NATIONAL | COPYRIGHT | |
WEB BASED MATCHMAKING: AN APPLICATION ON DEVELOPING A MATRIMONIAL BASED WEB SERVICE(SOFTWARE) | NATIONAL | COPYRIGHT | |
HYGRIPS-GRAPHICAL PASSWORD AUTHENTICATION | NATIONAL | COPYRIGHT |
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
NORANIAH MOHD. YASSIN TEACHING DIFFICULT CONCEPTS TO FIRST YEAR SOFTWARE ENGINEERING STUDENTS VIA PAIR PROGRAMMING PHD FAIL AND DISMISSAL CO-SUPERVISOR |
SALAHEDIN ALI .AB NAMROUSH MODELING USER'S INTENTION TO USE E-GOVERNMENT TO CITIZEN SERVICES IN MALAYSIA PHD GRADUATED CO-SUPERVISOR 2010 |
SARA NAJAFZADEH A NEIGHBOR-AWARE BROADCASTING PROTOCOL FOR SAFETY MESSAGES ON HETEROGENEOUS COMMUNICATION RANGE VEHICULAR AD HOC NETWORKS PHD GRADUATED SUPERVISOR 2013 |
RAMIN KARIMI IMPROVED CONNECTIVITY IN GEOGRAPHIC ROUTING PROTOCOLS USING DELAY-TOLERANT NETWORKS SCHEME IN VEHICULAR AD HOC NETWORKS PHD GRADUATED SUPERVISOR 2013 |
MASUMEH DAMRUDI INTERCONNECTION NETWORKS FOR MODULAR EXPONENTIATION BASED CRYPTOGRAPHIC ALGORITHMS PHD GRADUATED SUPERVISOR 2013 |
AZADEH SARKHEYLI KNOWLEDGE SHARING RISK GOVERNANCE FRAMEWORK PHD GRADUATED CO-SUPERVISOR 2015 |
MAZURA BINTI MAT DIN COMPUTATIONAL BASED AUTOMATED PIPELINE CORROSION DATA ASSESSMENT PHD GRADUATED SUPERVISOR 2015 |
HAZINAH BINTI KUTTY MAMMI A CURRICULUM STRUCTURE FOR INSTITUTES OF HIGHER LEARNING (IHLS) THAT CONTRIBUTES TO PRODUCING COMPETENT SOFTWARE ENGINEERS (IN THE AREA OF SECURITY) FOR THE INDUSTRY. PHD ON GOING SUPERVISOR |
OBASAN ADEBOLA OLUKAYODE IMPROVED MEMORABILITY RATE IN GRAPHICAL PASSWORD AUTHENTICATION SCHEME USING AUTOBIOGRAPHICAL MEMORY APPROACH PHD GRADUATED SUPERVISOR 2016 |
SAID KHALFAN SAID AL-WAHAIBI HACKING COUNTERMEASURE FRAMEWORK PHD GRADUATED SUPERVISOR 2016 |
AHMED NOUR MOUSSA ENHANCED FORENSIC PROCESS MODEL IN CLOUD ENVIRONMENT PHD GRADUATED SUPERVISOR 2018 |
LIM KAH SENG ENHANCEMENT OF AUTOMATED BLACK-BOX WEB APPLICATION VULNERABILITY ASSESSMENT ALGORITHMS PHD GRADUATED SUPERVISOR 2019 |
SAID KHALFAN SAID AL-WAHAIBI HACKING COUNTERMEASURE FRAMEWORK FOR OMAN COMPUTER EMERGENCY READINESS TEAM USING DELPHI APPROACH PHD GRADUATED SUPERVISOR 2022 |
GAMAL ABDEL NASSIR AWAD ALI MOHAMED STRING-BASED REPRESENTATION TECHNIQUES FOR MALWARE DETECTION MODEL PHD GRADUATED SUPERVISOR 2022 |
NOOR HAYATI BT MOHD ZAIN IMPROVED ADAPTIVE NEURO FUZZY INFERENCE SYSTEM USING META-HEURISTICS OPTIMIZATION TECHNIQUE FOR RAINFALL PREDICTION ACCURACY PHD ON GOING SUPERVISOR |
SAID HAMOOD AMUR ALTALA`I ENHANCE TRUST EVALUATION MODEL OF THE CLOUD COMPUTING USING FUZZY LOGIC   PHD ON GOING SUPERVISOR |
NORSYALIZA BINTI ABD RAZAK PHD ON GOING SUPERVISOR |
AHMED IBRAHIM MOHAMED HASSAN PHD ON GOING SUPERVISOR |
SITI ZALEHA BINTI HARUN INNOVATIVE AI-BASED MICROSLEEP DETECTION FOR AUTOMOBILE SAFETY: A NON-INTRUSIVE MULTIMODAL APPROACH PHD ON GOING SUPERVISOR |
ISHARA BARHOSON GALADIMA ENHANCED CYBERSECURITY INSIDER THREAT DETECTION MODEL USING ENSEMBLE DEEP LEARNING TECHNIQUES PHD ON GOING SUPERVISOR |
SHUM CHEN YAU PHD ON GOING SUPERVISOR |
JUNIARDI NUR FADILA LEVERAGING SOFTWARE-DEFINED NETWORKING TECHNOLOGIES FOR EFFICIENT ROAD TRAFFIC CONTROL SYSTEM PHD ON GOING CO-SUPERVISOR |
KHALIFA AHMAD IBRAHIM ALI ALSUWAIDI PHD ON GOING SUPERVISOR |
MAHA JASSIM NIMA AL-BUKREDI PHD ON GOING SUPERVISOR |
MUHAMMAD DANIEL HAFIZ BIN ABDULLAH MUTUAL INSTRUCTION DETECTION SYSTEM FOR AD-HOC NETWORKS MASTER GRADUATED SUPERVISOR 2010 |
OYELAMI JULIUS OLUSEGUN MASTER ON GOING SUPERVISOR |
LIM KAH SENG THE ENHANCEMENT OF AUTOMATED WEB APPLICATION SECURITY ASSESSMENT ALGORITHMS TO REDUCE THE FALSE NEGATIVE MASTER GRADUATED SUPERVISOR 2011 |
MOHAMED ISMAIL GURHAN MASTER GRADUATED SUPERVISOR 2013 |
SAMAN ASADI MASTER GRADUATED SUPERVISOR 2013 |
ISSE MOHAMUD ABDI MASTER GRADUATED SUPERVISOR 2013 |
ABUBAKAR MOHAMMED MASTER GRADUATED SUPERVISOR 2014 |
ABUBAKAR MAGIRA TOM MASTER GRADUATED SUPERVISOR 2014 |
NOR FAZLINA BINTI MOHD AMIN MASTER GRADUATED SUPERVISOR 2015 |
NUR ZAFIRAH BINTI ABD HASHIM MASTER GRADUATED SUPERVISOR 2015 |
MUSTAPHA ATIKU MASTER GRADUATED SUPERVISOR 2015 |
NURHAMIZAH HAZWANI BINTI MOHAMAD MASTER GRADUATED SUPERVISOR 2016 |
NURFARHANA SHAZWANI BINTI MOHAMAD MASTER GRADUATED SUPERVISOR 2016 |
OYELAMI JULIUS OLUSEGUN ENHANCING INFORMATION SECURITY MANAGEMENT FRAMEWORK BASED ON HUMAN FACTORS FOR ORGANIZATION INFORMATION SHARING MASTER GRADUATED SUPERVISOR 2016 |
SAID KHALFAN SAID AL-WAHAIBI HACKING COUNTERMEASURE FRAMEWORK MASTER GRADUATED SUPERVISOR 2017 |
FATIN ZULAIKHA BINTI FEZARUDIN KNOWLEDGE DISCOVERY FOR HALAL HUMAN CAPITAL AND HALAL TRAINING PROGRAMS IN MALAYSIA MASTER GRADUATED CO-SUPERVISOR 2019 |
AYUB SULEIMAN JAMA MASTER GRADUATED SUPERVISOR 2020 |
NURHIDAYAH BINTI MOHD TAHIR MASTER GRADUATED SUPERVISOR 2023 |
SHUM CHEN YAU MASTER GRADUATED SUPERVISOR 2023 |
SHIMRATH TEOH SHAN MEAY MASTER GRADUATED SUPERVISOR 2023 |
HO XIAO HAN MASTER ON GOING SUPERVISOR |
UMAR JIBRILLA YA'UBA MASTER ON GOING SUPERVISOR |
KAVINESH ANTHONY THOMAS MASTER ON GOING SUPERVISOR |
SHAHAD ALI AHMED SAEED MASTER ON GOING SUPERVISOR |
MOHD HAFIZI BIN ABDUL RAZAK MASTER ON GOING SUPERVISOR |
MAITHELI A/P KUMARASAMY MASTER ON GOING SUPERVISOR |
HE YATING MASTER ON GOING SUPERVISOR |