GRANT(PI & MEMBERS)
27
PUBLICATIONS
47
INDEXED PUBLICATION
25
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
Publications
Supervisions
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
IMAGE SEGMENTATION ON MULTI MODAL OF MEDICAL IMAGES USING ACTIVE CONTOUR MODEL RUG OF UTM Tier 2 |
2019 |
Heart Failure Patient Readmission Prediction System using Data Mining Technique in Malaysian Healthcare Environment RUG OF UTM Tier 2 |
2019 |
BITCOIN FRAUD DETECTION AND CONTROL MODEL USING NEAREST NEIGHBOR TECHNIQUE FOR FINANCIAL INSTITUTIONS RUG OF UTM Tier 2 |
2019 |
DETECTION MODEL USING MULTIDIMENSIONAL FACTORS FOR INSIDER THREAT IN ORGANIZATION RUG OF UTM Tier 2 |
2019 |
FORMULATION OF HYBRID SIDE MATCH VECTOR QUANTIZATION-GENETIC ALGORITHM (SMVQ-GA) FOR INCREASING PAYLOAD CAPACITY IN DATA HIDING MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2019 |
Criminal Network Search Model using Social Network Analytics for the Internet of Things (IoT) Crime Investigation. MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2019 |
FORMULATION OF INTERNET OF THINGS(IOT) MONITORING SENSOR FRAMEWORK FOR PANDEMIC PREDICTION AND CONTROL RUG OF UTM Tier 2 |
2018 |
DEVELOPMENT OF AN ADAPTIVE SYSTEM FOR VISUALIZING NETWORK DATA RUG OF UTM Potential Academic Staff |
2017 |
Membekal dan Memasang Sistem Maklumat Pengurusan Dokumen Fatwa (SMPDF) Fasa 1 JABATAN KEMAJUAN ISLAM MALAYSIA Business Entity |
2017 |
SECURE AND INTELLIGENT AUTHENTICATION WATERMARKING SCHEME FOR DIGITAL MEDICAL IMAGES AT MALAYSIAN HOSPITALS RUG OF UTM Tier 1 |
2016 |
INFORMATION SECURITY RISK ASSESSMENT FRAMEWORK FOR CLOUD COMPUTING ENVIRONMENT USING SURVIVAL ANALYSIS METHOD RUG OF UTM Tier 1 |
2016 |
MULTILAYER REVERSIBLE WATERMARKING IN MEDICAL IMAGES USING NON-UNDERFLOW DIFFERENCE EXPANSION RUG OF UTM Tier 1 |
2015 |
ENTERPRISE ARCHITECTURE(EA) READINESS MEASUREMENT INSTRUMENT TO SUSTAIN EA INITIATIVES IN PUBLIC SECTORS RUG OF UTM Tier 1 |
2015 |
Cryptography Technology For National Defense Industry QUESTRANS SDN. BHD Business Entity |
2015 |
Novel Computer Forensic Approach for Cloud Computing Environment MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2015 |
A ROBUST TECHNIQUE AGAINST GEOMETRIC ATTACKS FOR DIGITAL VIDEO WATERMARKING MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2014 |
A NOVEL MODEL TO ENHANCE THE CLOUD AUTHENTICATION SECURITY BY USING WATERMARKING METHODS RUG OF UTM Tier 1 |
2014 |
AN WATERMARKING TOOL FOR E-PASSPORT PROTECTION SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor |
2012 |
Efficient Digital Image Authentication and Tamper Localization Technique Using Lsb Watermarking MINISTRY OF EDUCATION Exploratory Research Grant Scheme |
2012 |
A Secure Copyright Protection Algorithm Based On Watermarking Using SOM and PSO RUG OF UTM Tier 2 |
2011 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
Tamper Detection And Localization For Quranic Text Watermarking Scheme Based On Hybrid Technique
COMPUTERS, MATERIALS AND CONTINUA Publication In Web Of Science CO-AUTHOR |
2021 |
Payload Capacity Scheme For Quran Text Watermarking Based On Vowels With Kashida
COMPUTERS Publication In Web Of Science CO-AUTHOR |
2021 |
Recent Analysis Of Forged Request Headers Constitued By Http Ddos
SENSORS Publication In Web Of Science CO-AUTHOR |
2020 |
Enhanced Detection Algorithms To Detect Http Ddos
INTERNATIONAL JOURNAL OF ADVANCED TRENDS IN COMPUTER SCIENCE AND ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2019 |
Review Of Recent Detection Methods For Http Ddos Attack
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
A Review Of Technique To Self-Generate Ddos Dataset
INTERNATIONAL JOURNAL OF ADVANCED TRENDS IN COMPUTER SCIENCE AND ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2019 |
Biometric Solution To Prevent Credit Card Fraud In Malaysia
POSTGRADUATE ANNUAL RESEARCH INFORMATICS SEMINAR Conference Paper CO-AUTHOR |
2018 |
Digital Forensic Investigation Challenges Based On Cloud Computing Characteristics
INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY(UAE) Publication In Scopus CO-AUTHOR |
2018 |
A Review And Open Issues Of Diverse Text Watermarking Techniques In Spatial Domain
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2018 |
Towards Designing An Ea Readiness Instrument: A Systematic Review
4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY, CIST 2016 Publication In Scopus CO-AUTHOR |
2017 |
Understanding User Participation In Information Security Risk Management
OPEN INTERNATIONAL JOURNAL OF INFORMATICS Journal Article Non Citation-Indexed CO-AUTHOR |
2017 |
COPPA DOCUMENT FOR MSC(INFORMATICS) Clasified/Technical Report CO-AUTHOR |
2016 |
Temperature-Based Estimation Of Global Solar Radiation Using Soft Computing Methodologies
THEORETICAL AND APPLIED CLIMATOLOGY Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
A Robust Video Watermarking Technique For The Tamper Detection Of Surveillance Systems
MULTIMEDIA TOOLS AND APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
A Novel Wlan Client Puzzle Against Dos Attack On Pattern Matching
MATHEMATICAL PROBLEMS IN ENGINEERING Publication In Web Of Science CO-AUTHOR |
2015 |
Pattern Recognition Techniques: Studies On Appropriate Classifications
LECTURE NOTES IN ELECTRICAL ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2015 |
An Overview Of Objectionable Image Detection
INTERNATIONAL SYMPOSIUM ON TECHNOLOGY MANAGEMENT AND EMERGING TECHNOLOGIES (ISTMET) Publication In Scopus UTM FIRST AUTHOR |
2015 |
A Novel Wlan Client Puzzle Against Dos Attack On Pattern Matching
MATHEMATICAL PROBLEMS IN ENGINEERING Publication In Web Of Science CO-AUTHOR |
2015 |
Pattern Recognition Techniques: Studies On Appropriate Classifications
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus UTM FIRST AUTHOR |
2014 |
Secure Openid Authentication Model By Using Trusted Computing
ABSTRACT AND APPLIED ANALYSIS Publication In Scopus CO-AUTHOR |
2014 |
A Secure Model For Prevention Of Black Hole Attack In Wireless Mobile Ad Hoc Networks
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE Proceedings CO-AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Ad Hoc Networks Using Ids Agents
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13) Proceedings CO-AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13) Proceedings CO-AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13) Proceedings CO-AUTHOR |
2013 |
Review Of Digital Watermarking Techniques
1ST TECHNOLOGY, EDUCATION, AND SCIENCE INTERNATIONAL CONFERENCE (TESIC) 2013 Proceedings CORRESPONDING AUTHOR |
2013 |
A Taxonomy Of Sql Injection Attacks
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013) Publication In Scopus CO-AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Ids Agents
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE Proceedings CO-AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE Proceedings CO-AUTHOR |
2013 |
An Overview Of Principal Component Analysis
JOURNAL OF SIGNAL AND INFORMATION PROCESSING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Cryptographic Techniques
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE Proceedings CO-AUTHOR |
2013 |
An Overview Of Principal Component Analysis
JOURNAL OF SIGNAL AND INFORMATION PROCESSING Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
A Secure Model For Prevention Of Black Hole Attack In Wireless Mobile Ad Hoc Networks
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13) Conference Paper CO-AUTHOR |
2013 |
An Overview Of Holistic Face Recognition
JOURNAL OF RESEARCH COMMUNICATION TECHNOLOGY Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
Efficient Embedding For Audio Steganography
PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON ENVIRONMENTAL, ECONOMICS,ENERGY, DEVICES, SYSTEMS, COMMUNICATION, COMPUTER AND MATHEMATICS (EDSCM 12) Conference Paper CO-AUTHOR |
2012 |
Mazdak Technique For Psnr Estimation In Audio Steganography
4TH INTERNATIONAL CONFERENCE ON MECHANICAL AND ELECTRICAL TECHNOLOGY, ICMET 2012 Publication In Scopus CO-AUTHOR |
2012 |
An Overview On Audio Steganography Techniques
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS Publication In Scopus CO-AUTHOR |
2012 |
Mazdak Technique For Psnr Estimation In Audio Steganography
APPLIED MECHANICS AND MATERIALS Publication In Scopus CORRESPONDING AUTHOR |
2012 |
The Effect Of Dct And Dwt Domains On The Robustness Of Genetic Watermarking
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE Publication In Web Of Science UTM FIRST AUTHOR |
2011 |
Study Of The Effect Dct And Dwt Domains On The Imperceptibility And Robustness Of Genetic Watermarking
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2011 |
Data Hiding Method Based On Dna Basic Characteristics
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE Publication In Scopus CO-AUTHOR |
2011 |
Data Hiding Method Based On Dna Basic Characteristics
DIGITAL ENTERPRISE AND INFORMATION SYSTEMS Book Chapter CO-AUTHOR |
2011 |
Comparative Study Of Different Steganographic Techniques
11TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS '11) Conference Paper CO-AUTHOR |
2011 |
Multiple Layer Reversible Images Watermarking Using Enhancement Of Difference Expansion Techniques
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2010 |
Capacity And Quality Improvement In Reversible Image Watermarking Approach
PROCEEDING - 6TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, NCM 2010 Publication In Scopus CORRESPONDING AUTHOR |
2010 |
A Genetic-Algorithm-Based Approach For
Audio Steganography
World Academy of Science, Engineering and Technology Journal Article Non Citation-Indexed CO-AUTHOR |
2009 |
An Overview Of Video Watermarking Techniques
PARS 07 FSKSM UTM Conference Paper CORRESPONDING AUTHOR |
2007 |
Modul Penyediaan Teks Khutbah Bermultimedia
SEMINAR TEKNOLOGI MAKLUMAT KE EMPAT AKADEMI TENTERA MALAYSIA (ATMA) Conference Paper CO-AUTHOR |
2005 |
Legend : IP CATEGORY IP LEVEL
Intellectual Property Name | Grant Register No. | IP Level | IP Category |
---|
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
FARNAZ ARAB A ROBUST VIDEO WATERMARKING USING SIMULATED BLOCK BASED SPATIAL DOMAIN TECHNIQUE PHD GRADUATED SUPERVISOR 2014 |
REZA AGHABABAEYAN A ROBUST AGAINST ROTATION ATTACK WATERMARKING TECHNIQUE BASED ON WAVELET TRANSFORM PHD GRADUATED SUPERVISOR 2015 |
SASAN KARAMIZADEH ENHANCED ILLUMINATION SCHEME FOR FACE RECOGNITION PHD GRADUATED SUPERVISOR 2016 |
SANAZ KAVIANPOUR ENHANCING PRIVACY ON SOCIAL NETWORK SITES USING CLASSIFICATION AND ANONYMISATION PHD GRADUATED CO-SUPERVISOR 2017 |
HAITHAM AMEEN NOMAN ALANI AN AUTOMATED MECHANISM TO DETECT AND MITIGATE DEAUTHENTICATION AND DISASSOCIATION DOS ATTACKS IN WIRELESS 802.11 NETWORKS PHD GRADUATED SUPERVISOR 2017 |
AMIN DASTANPOUR IMPROVED FUZZY NEURAL NETWORK FOR INTRUSION DETECTION SYSTEM PHD GRADUATED SUPERVISOR 2018 |
MOHAMMAD JAVAD RAJABI ROBUST DISCRETE CONSINE TRANSFORM BASED TECHNIQUE FOR IMAGE WATERMARKING AGAINST CROPPING ATTACKS PHD GRADUATED SUPERVISOR 2018 |
AIDA SHAFIABADY OBJECT-ORIENTED SOFTWARE MAINTAINABILITY PREDICTION MODEL BASED ON ARTIFICIAL NEURAL NETWORKS PHD GRADUATED SUPERVISOR 2020 |
ALI ABDULRAHEEM ALWAN AL-KHAFAJI TAMPER DETECTION OF QURANIC TEXT WATERMARKING SCHEME BASED ON VOWEL LETTERS WITH KASHIDA USING EXCLUSIVE-OR AND QUEUEING TECHNIQUE PHD GRADUATED SUPERVISOR 2020 |
ABDUL GHAFAR BIN JAAFAR ENHANCED HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE DETECTION SCHEME WITH GET HEADERS ADOPTION PHD GRADUATED SUPERVISOR 2020 |
AMIR HESAM YARIBAKHT ROBUST COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND CAT FACE TRANSFORM PHD GRADUATED SUPERVISOR 2020 |
SASHI KUMAR A/L TERMARINGGAM INFORMATION TECHNOLOGY SERVICE MANAGEMENT FRAMEWORK FOR FINANCIAL REGULATORY BODY IN MALAYSIA PHD GRADUATED CO-SUPERVISOR 2023 |
RATNA DEWI BINTI IBRAHIM MASTER GRADUATED SUPERVISOR 2014 |
MABRUK ALI MOSBAH ELSEID MASTER GRADUATED SUPERVISOR 2014 |
NAJIHAH BINTI YAAKOB MASTER GRADUATED SUPERVISOR 2014 |
FADZRINA BINTI RAMLI MASTER GRADUATED SUPERVISOR 2014 |
ABDULLAH ALI HASSAN GHADAWI MASTER GRADUATED SUPERVISOR 2014 |
SULTAN FAYDULLAH M AL IDRISS MASTER GRADUATED SUPERVISOR 2014 |
BABAK HOSSEINNEJADNEDAEI MASTER GRADUATED SUPERVISOR 2014 |
KHALIL, MOAAD ABDULRAHMAN M MASTER GRADUATED SUPERVISOR 2014 |
AIN'NATUL MARDHIAH BINTI MOHAMAD HASBULLAH MASTER GRADUATED SUPERVISOR 2014 |
EMILIA BINTI MD NOAH MASTER GRADUATED SUPERVISOR 2014 |
KHAIRUL AZLAN BIN MUHAMAD MASTER GRADUATED SUPERVISOR 2014 |
TAQI MOHAMMED ALI AL-HADHRAMI MASTER GRADUATED SUPERVISOR 2015 |
FADZILAWATI BINTI KAINI MIDDLEWARE FRAMEWORK FOR ANTI-TERRORISM CAPABILITIES IN CYBER WARFARE   MASTER GRADUATED SUPERVISOR 2015 |
SURENTHIRAN A/L KRISHNAN ENHANCED RECURRENT NEURAL NETWORK (RNN) WITH GATED RECURRENT UNIT (GRU) FOR HEART DISEASE PREDICTION. MASTER GRADUATED SUPERVISOR 2015 |
MOHAMED GHAZALI BIN KHAIRUZZAMAN MASTER GRADUATED SUPERVISOR 2015 |
NURUL AFIFAH BTE ROSLE MASTER GRADUATED SUPERVISOR 2016 |
FILISIA ANAK BEDDIE MASTER GRADUATED SUPERVISOR 2016 |
KHALED SALEH AHMED ALLABANI MASTER GRADUATED SUPERVISOR 2017 |
KHALED GUBRAN YAHYA AL-HASHEDI FRAUD DETECTION MODEL USING COMMITTEE SEMI-SUPERVISED LEARNING FOR BITCOIN TRANSACTION MASTER GRADUATED SUPERVISOR 2017 |
JARIN FATHIMA BINTI M.A AHMAD N/A MASTER GRADUATED SUPERVISOR 2017 |
ASMADI BIN ABU BAKAR MASTER GRADUATED SUPERVISOR 2018 |
ROZITA BINTI AHAMMAD MASTER GRADUATED SUPERVISOR 2018 |
MOHD FAIZAL BIN AHMAD MASTER GRADUATED SUPERVISOR 2018 |
HURAIZAH BINTI ZAKARIA WORKING TITLE : SKILLSET FRAMEWORK FOR IT AUDITORS FROM PUBLIC SECTOR MASTER GRADUATED SUPERVISOR 2019 |