GRANT(PI & MEMBERS)
11
PUBLICATIONS
15
INDEXED PUBLICATION
7
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
NATIONAL GRANTS
1
UNIVERSITY FUND
2
TOTAL
Publications
INDEXED PUBLICATION
7
NON-INDEXED PUBLICATION
2
OTHERS PUBLICATION
6
TOTAL
Supervisions
MASTER
5
PHD
13
TOTAL
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
SECURITY MITIGATION BASED ON A NEW MODIFIED ALGORITHM TO PRESERVE USERS PRIVACY AND ANONYMITY RUG OF UTM Tier 1 |
2014 |
INTRUSION DETECTION SYSTEM FOR SOFTWARE AS A SEVICE IN CLOUD COMPUTING ENVIRONMENT. RUG OF UTM Encouragement Grant |
2014 |
New TPM Security Testing Approach based on Colored Petri Nets and IOCO Theory MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2013 |
DEVELOPING A NOVEL FRAMEWORK FOR CLOUD COMPUTING USING MEDICAL APPROACH. RUG OF UTM Tier 2 |
2012 |
ALGORITHMS FOR ENERGY-EFFICIENT SCHEDULER IN CLOUD COMPUTING PLATFORM RUG OF UTM Tier 2 |
2012 |
Analysis and assessment of bluetooth vulnerabilities in high end cars SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor |
2012 |
AN WATERMARKING TOOL FOR E-PASSPORT PROTECTION SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor |
2012 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
Botnet Evolution : Network Traffic Indicators
2014 INTERNATIONAL SYMPOSIUM ON BIOMETICS AND SECUIRTY TECHNOLOGIES Publication In Scopus CO-AUTHOR |
2015 |
Traditional Security Risk Assessment Methods In Cloud Computing Environment: Usability Analysis
JURNAL TEKNOLOGI Publication In Scopus CORRESPONDING AUTHOR |
2015 |
Towards A New Framework For Tpm Compliance Testing
INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES 2014 (IRICT 2014) Conference Paper UTM FIRST AUTHOR |
2014 |
A Case Study For The Cloud Computing Security Threats In A Governmental Organization
COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014 INTERNATIONAL CONFERENCE ON Conference Paper CORRESPONDING AUTHOR |
2014 |
Calculating Trust Value In Information Propagation For Online Social Network Sites
INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNICAL RESEARCH Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2014 |
Security Risk Assessment Framework For Cloud Computing Environments
SECURITY AND COMMUNICATION NETWORKS JOURNAL Publication In Web Of Science CORRESPONDING AUTHOR |
2014 |
Chapter 33. Alert Processing Method With Data Reduction And Correlation Technique
RECENT TRENDS IN SOCIAL AND BEHAVIOUR SCIENCES PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INTERDISCIPLINARY BEHAVIOUR AND SOCIAL SCIENCES 2013 Book Chapter CO-AUTHOR |
2014 |
Traditional Security Risk Assessment Methods In Cloud Computing Environment: Usability Analysis
INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES 2014 (IRICT 2014) Conference Paper CORRESPONDING AUTHOR |
2014 |
Business Impact Analysis Ontology For Information Technology Continuity Management
3RD INTERNATIONAL CONFERENCE ON ENGINEERING BUSINESS MANAGEMENT (ICEBM 2014) Proceedings CORRESPONDING AUTHOR |
2014 |
Ontology Development For Business Impact Analysis In Information Technology Business Continuity Management For Public Sector In Malaysia
13TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '14) Conference Paper CORRESPONDING AUTHOR |
2014 |
Evaluation Of Studentsã¢Â Knowledge On Information
Security At Technical And Vocational Training
Corporation In Saudi Arabia
ADVANCED SCIENCE LETTERS Publication In Scopus CORRESPONDING AUTHOR |
2014 |
Cloud Computing Adoption Challenges
ADVANCED SCIENCE LETTERS Publication In Scopus CORRESPONDING AUTHOR |
2014 |
Factors Affecting Security Perception In Online Purchase Intention
ADVANCED SCIENCE LETTERS Publication In Scopus CO-AUTHOR |
2014 |
Danger Theory Based Hybrid Intrusion Detection Systems For Cloud Computing
INTERNATIONAL JOURNAL OF COMPUTER AND COMMUNICATIONS ENGINEERING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2013 |
Security Threats In Online Social Networks
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013) Publication In Scopus CO-AUTHOR |
2013 |
Legend : IP CATEGORY IP LEVEL
Intellectual Property Name | Grant Register No. | IP Level | IP Category |
---|---|---|---|
A METHOD FOR TESTING TRUSTED PLATFORM MODULE AND SYSTEM THEREOF | MY-180763-A | NATIONAL | PATENT |
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
FATEMEH MESKARAN THE EFFECT OF PERCEIVED TRUST, PERCEIVED SECURITY AND ATTITUDE ON ONLINE PURCHASE INTENTION IN MALAYSIAN PUBLIC UNIVERSITIES PHD GRADUATED CO-SUPERVISOR 2015 |
ASHARA BANU BINTI MOHAMED ENHANCED FRAMEWORK FOR ALERT PROCESSING USING CLUSTERING APPROACH BASED ON ARTIFICIAL IMMUNE SYSTEM PHD GRADUATED SUPERVISOR 2015 |
USAMA THARWAT FARAG ELHAGARI A MODEL BASED TESTING FRAMEWORK FOR TRUSTED PLATFORM MODULE PHD GRADUATED SUPERVISOR 2015 |
SALIMA OMAR M. HAMAD GRAVITATIONAL SEARCH ALGORITHM-BASED ANOMALY INSTRUSION DETECTION SYSTEM PHD GRADUATED CO-SUPERVISOR 2015 |
SANAZ KAVIANPOUR ENHANCING PRIVACY ON SOCIAL NETWORK SITES USING CLASSIFICATION AND ANONYMISATION PHD GRADUATED CO-SUPERVISOR 2017 |
SIVAKUMAR A/L PERTHEBAN INFORMATION ACCURACY ASSESSMENT FRAMEWORK FOR MALAYSIA TOURISM INDUSTRY PHD GRADUATED CO-SUPERVISOR 2019 |
SRI LAKSHMI A/P KANNIAH SECURE SOFTWARE DEVELOPMENT PRACTICE SELECTION MODEL PHD GRADUATED CO-SUPERVISOR 2020 |
PREMYLLA JEREMIAH INFORMATION SECURITY COMPLIANCE MODEL USING EXTENDED DECOMPOSED THEORY OF PLANNED BEHAVIOUR AMONG EMPLOYEES OF MALAYSIAN PRIVATE HEALTHCARE PHD GRADUATED CO-SUPERVISOR 2024 |
MOHD IRZANI BIN WAHID MASTER GRADUATED SUPERVISOR 2014 |
MOHAMMAD HAGHGOODIL MASTER GRADUATED SUPERVISOR 2014 |