GRANT(PI & MEMBERS)
127
PUBLICATIONS
120
INDEXED PUBLICATION
92
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
Publications
Supervisions
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
QUICK WIN RESEARCH GRANT |
2024 |
FOG-BASED RANSOMWARE DETECTION FOR THE INTERNET OF MEDICAL THINGS USING LIGHTWEIGHT MACHINE LEARNING ALGORITHMS MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2022 |
A New Irregular Non-Gaussian Adaptive Dempster-Shafer-Based Kalman Filter Algorithm for Fake News Detection MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2021 |
Redundancy and Latency Reduction in Content Centric Network Using Popularity and Maturity Techniques RUG OF UTM Industry-International Incentive Grant |
2021 |
KKP_SATELIT_5: Research Excellence Consortium in IoT Security MINISTRY OF EDUCATION Konsortium Kecemerlangan Penyelidikan |
2021 |
Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talent Development Research Programme (MyCS Programme) MALAYSIA DIGITAL ECONOMY CORPORATION SDN. BHD. (MDEC) Contract |
2020 |
"R.J130000.7613.4C438" : Malaysian Institute of Higher Learning Cyber Security Awareness Assessment and Talet Development Research Programme (MyCS Research Programme) RUG OF UTM Matching Grant |
2020 |
Best Practice for Mass and Remote Worker Registration and Management MANFORCE RESOURCES (M) SDN BHD Contract Research DTD |
2020 |
DreamEDGE online and integrated portfolios with IoT real-time monitoring and enhanced AR feature via mobile and web applications DREAMEDGE SDN. BHD. Contract Research DTD |
2020 |
Knowledge Transfer and Supplier Engagement Study for Mobile Ordering System (IMOS) at Malaysian Marine and Heavy Engineering company (MMHE) RUG OF UTM Industry-International Incentive Grant |
2020 |
UTMIcon 4.1: Development of Security Brain Intelligence (SBI) for Cyber Threat Behavioural Analysis RUG OF UTM UTM RA ICONIC GRANT |
2020 |
A Study of Intelligent Dashboard for Project Management and Tracking MOTOBINA SDN. BHD. Contract Research DTD |
2020 |
Study of Features and Functions for Community Based Courier Services Application RUG OF UTM Industry-International Incentive Grant |
2020 |
Tjap Go Meh - Introduction of Acculturation as Mutual Respect for Society TELKOM UNIVERSITY International Grant |
2020 |
STUDI ALGORITMA DETEKSI ARITMIA NON-MALIGNA BERBASIS SINYAL PHOTOPLETHYSMOGRAM TELKOM UNIVERSITY International Grant |
2020 |
Sensitive Patient Data Anonymity Using Biometric Signals RUG OF UTM Matching Grant |
2020 |
RMC DASHBOARD AND ANALYTICS DAN RESEARCHMANAGEMENT MOBILE APPS GUP GRANT UTM R&D Fund |
2020 |
RPG GAME APPROACH FOR TJAP GO MEH - ACCULTURATION AS MUTUAL RESPECT FOR SOCIETY RUG OF UTM Matching Grant |
2020 |
UTM RESEARCHERS EXPERT PROFILE DASHBOARD ON RESEARCH PROJECTS, SUPERVISION AND PUBLICATIONS RUG OF UTM UTM R&D Fund |
2020 |
A development of Communication for Behavioural Impact (COMBI) mobile-based application based on Behavioural Change model for persuading dengue surveillance RUG OF UTM UTM Prototype Research |
2020 |
Modeling Information Security Policy Field RUG OF UTM Professional Development Research University |
2019 |
A STUDY OF CUSTOMER'S FRONT END APPLICATION QSR BRANDS (M) HOLDINGS BHD Contract Research DTD |
2019 |
A Crowdsourcing platform for on demand childcare services WONDER TOTS RESOURCES Contract Research DTD |
2019 |
A STUDY OF GENERIC AND FUNCTIONAL FEATURES OF MOBILE APPLICATIONS AND RESPONSIVE WEB DEVELOPMENT RUG OF UTM Tier 1 |
2019 |
DEVELOPMENT OF DEMAND DRIVEN BULK PURCHASE E-COMMERCE PLATFORM FOR SOCIETY-MERCHANT DEAL RUG OF UTM Industry-International Incentive Grant |
2019 |
UTM-TDR 34.1(T2): MyDNAmark Database Visualisation RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
MRUN 5.2 : GAMIFICATION PLATFORM USER DATA AND CONTENT SECURITY USING BLOCKCHAIN TECHNOLOGY FOR UNIVERSITY 4.0 MINISTRY OF EDUCATION MALAYSIA RESEARCH UNIVERSITY NETWORK |
2018 |
UTM-TDR 34.2 (T2):MyDNAmark mobile app and website RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
UTM QSR Digital Store 2.0 RUG OF UTM Industry-International Incentive Grant |
2018 |
AN ENHANCED ADAPTIVE ENERGY-AWARE MECHANISM FOR EXTENDED WIRELESS SENSOR NETWORK LIFETIME RUG OF UTM Tier 1 |
2018 |
A Study on Critical Success Factor of Crowdfunding Platform for Corporate Social Responsibility QSR BRANDS (M) HOLDINGS BHD Contract Research DTD |
2018 |
A STUDY OF EMERGING TRENDS AND DEVELOPMENT OF IT SOLUTIONS IN RESTAURANT INDUSTRIES - THE 4TH IR CHALLENGES QSR BRANDS (M) HOLDINGS BHD Contract Research DTD |
2018 |
Randomness Evaluation of Heart Beat Inter-Pulse Interval as Entity Identifier for Implants Key Agreement RUG OF UTM Tier 1 |
2018 |
HYBRID CRYPTO-TOKEN BLOCKCHAIN: A NEW ARCHITECTURE OF DIGITAL MARKETPLACES RUG OF UTM COE Research Grant |
2018 |
Research and Development of Mobile Application to Improve Material Procurement Process for Malaysia Marine and Heavy Engineering Sdn Bhd (MMHE) MALAYSIA MARINE AND HEAVY ENGINEERING SDN. BHD. Contract Research DTD |
2018 |
STRUCTURING AND MANAGING DATABASE FORENSICINVESTIGATION KNOWLEGDE THROUGH A METAMODELLINGAPPROACH RUG OF UTM Tier 1 |
2017 |
IOT-ENABLED SMART HEART MONITORING DEVICE PROTOTYPE ENHANCEMENT AND MINIATURIZATION FOR ARRHYTHMIA SCREENING IN CONNECTED HEART CARE SYSTEM RUG OF UTM Tier 1 |
2017 |
A PERSONAL DASHBOARD BASED RESEARCH PROJECT MANAGEMENT FRAMEWORK RUG OF UTM UTM R&D Fund |
2017 |
STUDY ON THE IMPACT OF MOBILE APPLICATIONS IN QUIT SMOKING PROGRAM RUG OF UTM Tier 1 |
2016 |
Development of flash flood detection using distributed radio sensor network for urban areas MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2016 |
COMPUTER-ASSISTED EMERGENCY RESPONSE FOR MISSING PERSON INCIDENTS WITHIN INDOOR ENVIRONMENT BASED ON STRATEGIC INFORMATIONS DISSEMINATION AND CROWDSOURCING RUG OF UTM Tier 2 |
2016 |
A NEW PROFESSION-BASED CASE STUDY BUILDING METHODOLOGY FOR COMPUTER FORENSICS COURSE IN INSTITUTES OF HIGHER LEARNING DANA PEMBANGUNAN PENGAJARAN CTL Dana Pembangunan Pengajaran |
2016 |
A COMMUNICATION FOR BEHAVIOURAL IMPACT (COMBI) BEHAVIOURAL CHANGE MODEL FOR DENGUE SURVEILLANCE IN MALAYSIA RUG OF UTM Tier 1 |
2016 |
MATCHING GRANT RESEARCH AND DEVELOPMENT ON VIRTUAL INTERACTIVE SOFTWARE FOR HEALTH, SAFETY AND ENVIRONMENT (HSE) ACADEMY, INSTITUT TEKNOLOGI PETROLIUM PETRONAS (INSTEP) RUG OF UTM Matching Grant |
2016 |
Crowdfunding Platform as a Tool to Enable Public and Industry Engagement in Academia Research RUG OF UTM UTMShine |
2016 |
New Access Control Mechanism Based on Palm Biometrics Authentication for Users Cardio Information MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme |
2016 |
Framework for Telecardiology Readiness in Malaysia MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme |
2016 |
A Novel and Smart Arrhythmia Analyzer Design based on Enhanced Artificial Intelligence Algorithm for Cardiac Home Monitoring MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme |
2016 |
Quality Elements for ST- Elevation Myocardial Infarction Clinical Pathway Conceptual Framework to Enhance Reperfusion Access MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme |
2016 |
Kajian Halatuju dan Impak Sistem MyGrants MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2016 |
Reliable Data Transmission of De-noised Wavelet Cardio Data over Wireless Mesh Network MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme |
2016 |
INTEGRATED SENSOR NETWORK AND ACTIVE RFIDS FOR DYNAMIC BUILDING EVACUATION RUG OF UTM Tier 1 |
2015 |
Identification of True Identity of Online Users based on Human Intrinsic Characteristics for Cyber crime Investigation MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2015 |
RESEARCH AND DEVELOPMENT ON VIRTUAL INTERACTIVE SOFTWARE FOR HEALTH, SAFETY, AND ENVIRONMENT (HSE) ACADEMY , INSTITUT TEKNOLOGI PETROLEUM PETRONAS (INSTEP) PETRONAS Contract |
2015 |
EXPLORATORY ON THE SUITABILITY AND EFFICIENCY OF FRIENDSHIP MECHANISM IN MINIMIZING THE IMPACT OF FAKE BROADCAST MESSAGES IN CIVILIANS NETWORKS RUG OF UTM Tier 1 |
2015 |
MY-TELECARDIOLOGY: A WEB-BASED TELECARDIOLOGY FRAMEWORK FOR CARDIAC DISEASE PREVENTION AND MONITORING IN MALAYSIA COMMUNITY RUG OF UTM Tier 1 |
2015 |
Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones. MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
STRATEGIC PREDICTION OF RESEARCH AND PUBLICATION PERFORMANCE IN MONITORING KAI TARGETS RUG OF UTM Flagship |
2014 |
Cloud Based Environment for Interactive English Teaching and Learning RUG OF UTM Flagship-COE |
2014 |
SECURE INFORMATION DISSEMINATION AND NOTIFICATION SYSTEM FOR DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
Traffic Adaptive Medium Access Control for Wireless Networks RUG OF UTM Professional Development Research University |
2014 |
A RELIABLE COMPUTERIZED VOTING MECHANISM - MALAYSIA ELECTION CASE STUDY RUG OF UTM Tier 1 |
2014 |
UNATTENDED BUILDING INHABITANTS CONTROL USING WIRELESS SENSOR NETWORKS IN DISASTER MONITORING RUG OF UTM Encouragement Grant |
2014 |
A framework for standardising practices at National Cardiothoracic Registry (NCTR) using user-centred design approach MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2013 |
New Fragmented Image File Identification and Recovery Mechanisms Using Error Level Analysis and Data Compression Features for Digital Forensic Investigation MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2013 |
An energy-efficient routing approach for extending wireless sensor network lifetime MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2013 |
FRIENDSHIP MECHANISM DISASTER ALERT SYSTEM ON MULTI MEDIUM SOCIAL NETWORK RUG OF UTM Flagship |
2013 |
Integrated RFID-Wireless Sensor Networks Design for Disaster Monitoring in Large Landscape Environment SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Potential Academic Staff |
2013 |
Identification of Attacks/Misuse Associated with Email through Email Header Forensic RUG OF UTM Tier 2 |
2012 |
A Lightweight Anomaly Detection for Wireless Sensor Networks RUG OF UTM Tier 2 |
2012 |
Simplifying technologies for the disadvantage groups RUG OF UTM Tier 2 |
2012 |
AN ARCHITECTURE OF INTELLIGENT TRANSPORTATION SYSTEMS BASED ON WIRELESS SENSOR NETWORKS RUG OF UTM Tier 1 |
2012 |
An Alternative File Signature Analysis Technique for Computer Forensic Investigation RUG OF UTM Tier 2 |
2011 |
A New mechanism for Energy-Efficient Wireless Sensor Network Design MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2009 |
Secure Server Monitoring Using Covert Channel Technique Sciencefund |
2008 |
Secure Server Monitoring Using Covert Channel Technique MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2008 |
The Development of Spatial Data Indexing Technique for Spatial Database Management System in Mobile Geographical Information System (GIS) Applications MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2008 |
The Development of Spatial Data Indexing Technique For Spatial Database Management System In Mobile Geographical Information Systems (GIS) Applications MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2008 |
Mobile Ad Hoc Network Hop Routing Algorithm MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2007 |
Friend-Assisted Secure Autonomous Mobile Ad Hoc Networks MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2007 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
Cyber Security Maturity Assessment Framework For Technology Startups: A Systematic Literature Review
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2023 |
Resource Exhaustion Attack Detection Scheme For Wlan Using Artificial Neural Network
CMC-COMPUTERS MATERIALS & CONTINUA Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm (Ai) For Optimal Task Scheduling
SENSORS Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
Validating Mobile Forensic Metamodel Using Tracing Method
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES Book Chapter UTM FIRST AUTHOR |
2022 |
Validating Mobile Forensic Metamodel Using Tracing Method
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
Financial Fraud Detection Based On Machine Learning: A Systematic Literature Review
APPLIED SCIENCES, MDPI Publication In Web Of Science CORRESPONDING AUTHOR |
2022 |
A Unified Forensic Model Applicable To The Database
Forensics Field
ELECTRONICS , MDPI Publication In Web Of Science CO-AUTHOR |
2022 |
Towards Development Of A High Abstract Model For Drone
Forensic Domain
ELECTRONICS, MDPI Publication In Web Of Science CO-AUTHOR |
2022 |
Involvement Of Surveillance Drones In Smart Cities: A Systematic Review
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2022 |
Cocp: Coupling Parameters Content Placement Strategy For In-Network Caching-Based Content-Centric Networking
COMPUTERS, MATERIALS & CONTINUA Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique For Node Starvation Problem In Wireless Mesh Networks
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE Publication In Web Of Science CO-AUTHOR |
2021 |
Anomaly Intrusion Detection Systems In Iot Using Deep Learning Techniques: A Survey
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES Publication In Scopus CORRESPONDING AUTHOR |
2021 |
Current Perspective Of Symbiotic Organisms Search Technique In Cloud Computing Environment: A Review
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
An Adaptive Protection Of Flooding Attacks Model For Complex Network Environments
SECURITY AND COMMUNICATION NETWORKS Publication In Web Of Science CO-AUTHOR |
2021 |
Digital Forensics Subdomains: The State Of The Art And Future Directions
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2021 |
Research Challenges And Opportunities In Drone Forensics Models
ELECTRONICS Publication In Web Of Science CO-AUTHOR |
2021 |
Face Validation Of Database Forensic Investigation Metamodel
INFRASTRUCTURES Publication In Web Of Science CO-AUTHOR |
2021 |
Anomaly-Based Intrusion Detection Systems In Iot Using Deep Learning: A Systematic Literature Review
APPLIED SCIENCES-BASEL Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Ethical Leadership Amongst Utm Non-Academic Administrator
PROCEEDING OF LEADERSHIP SYMPOSIUM 2020 Proceedings CO-AUTHOR |
2020 |
Control Messages Overhead Impact On Destination Oriented
Directed Acyclic Graph - A Wireless Sensor Networks Objective
Functions Performance Comparison
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2020 |
IMOS - OVERALL PROCESS FLOW & USERS' GUIDE Modules / Manual CO-AUTHOR |
2020 |
SOFTWARE DESIGN DOCUMENT IMOS Modules / Manual CO-AUTHOR |
2020 |
Categorization And Organization Of Database Forensic Investigation Processes
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2020 |
Database Forensic Investigation Process Models: A Review
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2020 |
Data Anonymization Using Pseudonym System To Preserve Data Privacy
IEEE ACCESS Publication In Web Of Science CORRESPONDING AUTHOR |
2020 |
Towards The Development Of An Integrated Incident Response Model For Database Forensic Investigation Field
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2020 |
Biometrics Authentication Techniques: A Comparative Study
INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES Publication In Web Of Science CORRESPONDING AUTHOR |
2020 |
A Review Of Mobile Forensic Investigation Process Models
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2020 |
Optimized Backoff Scheme For Prioritized Data In Wireless Sensor Networks: A Class Of Service Approach
PLOS ONE Publication In Web Of Science UTM FIRST AUTHOR |
2020 |
Deauthentication And Disassociation Detection And Mitigation Scheme Using Artificial Neural Network
2020 ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus UTM FIRST AUTHOR |
2020 |
Convergence-Based Task Scheduling Techniques In Cloud Computing: A Review
4TH INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY, IRICT 2019 Publication In Scopus UTM FIRST AUTHOR |
2020 |
A User Mobility-Aware Fair Channel Assignment Scheme For Wireless Mesh Network
LECTURE NOTES IN ELECTRICAL ENGINEERING Publication In Scopus CO-AUTHOR |
2020 |
A User Mobility-Aware Fair Channel Assignment Scheme For Wireless Mesh Network
Additional Paper(S)
THE 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND TECHNOLOGY Conference Paper CO-AUTHOR |
2019 |
Palm Vein Pseudonym For Anonymous Database Record
2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY, AINS 2018 Publication In Scopus UTM FIRST AUTHOR |
2019 |
Region Of Interest Extraction For Biometric Cryptosystem
2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY, AINS 2018 Publication In Scopus UTM FIRST AUTHOR |
2019 |
Polychronicity Tendency-Based Online Behavioral Signature
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
Two-Stage Motion Artefact Reduction Algorithm For Electrocardiogram Using Weighted Adaptive Noise Cancelling And Recursive Hampel Filter
PLOS ONE Publication In Web Of Science CO-AUTHOR |
2018 |
An Overview Of The Smartphones Digital Forensics
ADVANCES IN DATA MINING AND BUSINESS INTELLIGENCE (SERIES 1) Book Chapter UTM FIRST AUTHOR |
2018 |
Fairness Of Channel Assignment Algorithm Based On Weighted Links Ranking Scheme For Wireless Mesh Network
PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING & MIS 2018 Publication In Scopus CO-AUTHOR |
2018 |
Master And Child Key Generation From Palm Vein
2017 IEEE CONFERENCE ON APPLICATIONS, INFORMATION AND NETWORK SECURITY, AINS 2017 Publication In Scopus UTM FIRST AUTHOR |
2018 |
Computer Forensic Problem Of Sample Size In File Type Analysis
INTERNATIONAL JOURNAL OF ADVANCED INTELLIGENCE PARADIGMS Publication In Scopus UTM FIRST AUTHOR |
2018 |
A Metamodel For Mobile Forensics Investigation Domain
PLOS ONE Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Development And Validation Of A Database Forensic Metamodel (Dbfm)
PLOS ONE Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Cdbfip: Common Database Forensic Investigation Processes For Internet Of Things
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
A Secure Identity-Based Key Agreement Protocol Without Key-Escrow
JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2017 |
Online Crowdfunding As Academic Grants: A Systematic Literature Review
JOURNAL OF TELECOMMUNICATION, ELECTRONIC AND COMPUTER ENGINEERING (JTEC) Publication In Scopus CO-AUTHOR |
2017 |
High-Level Online User Attribution Model Based On Human Polychronic-Monochronic Tendency
2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING, BIGCOMP 2017 Publication In Scopus UTM FIRST AUTHOR |
2017 |
Individual Difference For Hci Systems: Examining The Probability Of Thinking Style Signature In Online Interaction
PROCEEDINGS - 2016 4TH INTERNATIONAL CONFERENCE ON USER SCIENCE AND ENGINEERING, I-USER 2016 Publication In Scopus UTM FIRST AUTHOR |
2017 |
Leveraging Human Thinking Style For User Attribution In Digital Forensic Process
INTERNATIONAL JOURNAL ON ADVANCED SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2017 |
Understanding Online Behavior: Exploring The Probability Of Online Personality Trait Using Supervised Machine-Learning Approach
FRONTIERS IN ICT Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2016 |
A Generic Database Forensic Investigation Process Model
JURNAL TEKNOLOGI Publication In Scopus UTM FIRST AUTHOR |
2016 |
Two Secure Non-Symmetric Role Key-Agreement Protocols
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2016 |
Observing Consistency In Online Communication Patterns For User Re-Identification
PLOS ONE Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
Towards Adapting Metamodeling Approach For The Mobile Forensics Investigation Domain
1ST ICRIL-INTERNATIONAL CONFERENCE ON INNOVATION IN SCIENCE AND TECHNOLOGY (IICIST 2015) Proceedings UTM FIRST AUTHOR |
2015 |
A Lightweight One-Pass Authentication Mechanism For Agent Communication In Multi-Agent System Based Applications
JURNAL TEKNOLOGI Publication In Scopus CORRESPONDING AUTHOR |
2015 |
Location Server Selection Techniques In Vehicular Ad-Hoc Network
IJCSI INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES Journal Article Non Citation-Indexed CO-AUTHOR |
2015 |
Dicsa: Distributed And Concurrent Link Scheduling Algorithm For Data Gathering In Wireless Sensor Networks
AD HOC NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2015 |
Modeling Low-Power Wireless Communications
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2015 |
Linkord: Link Ordering-Based Data Gathering Protocol For Wireless Sensor Networks
COMPUTING Publication In Web Of Science CO-AUTHOR |
2015 |
Secure And Authenticated Key Agreement Protocol With Minimal Complexity Of Operations In The Context Of Identity-Based Cryptosystems
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT) Publication In Web Of Science CO-AUTHOR |
2015 |
A Performance Improved Certificateless Key Agreement Scheme Over Elliptic Curve Based Algebraic Groups
JURNAL TEKNOLOGI Publication In Web Of Science CO-AUTHOR |
2015 |
An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves
PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS Book Chapter CO-AUTHOR |
2015 |
A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS Book Chapter CO-AUTHOR |
2015 |
A Review Of Jpeg Fragment Classification Methods In File Carving
SECURITY IN COMPUTING AND NETWORKING PART 2 Book Chapter UTM FIRST AUTHOR |
2015 |
A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus CO-AUTHOR |
2015 |
An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus CO-AUTHOR |
2015 |
Detection And Prevention Of Denial Of Service Attacks (Dos) In Wlans Infrastructure
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
Attacks And Security Solutions For Agent Communication In Multi-Agent Systems
INTERNATIONAL JOURNAL OF SOFT COMPUTING Publication In Scopus CORRESPONDING AUTHOR |
2015 |
Analysis Of Security And Privacy In Public Cloud Environment
2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, ICCC 2015 Publication In Scopus UTM FIRST AUTHOR |
2015 |
Inter-Confidentiality Protection Of Agent Communication In Multi-Agent System Based Applications
JURNAL TEKNOLOGI Publication In Scopus CORRESPONDING AUTHOR |
2015 |
A Threshold-Based Controller For Multi-Agent Systems
JURNAL TEKNOLOGI Publication In Scopus CORRESPONDING AUTHOR |
2015 |
Common Investigation Process Model For Database Forensic Investigation Discipline
1ST ICRIL-INTERNATIONAL CONFERENCE ON INNOVATION IN SCIENCE AND TECHNOLOGY (IICIST 2015) Proceedings UTM FIRST AUTHOR |
2015 |
Bsm: Broadcasting Of Safety Messages In Vehicular Ad Hoc Networks
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING Publication In Web Of Science CO-AUTHOR |
2014 |
A Mechanism For Privacy Preserving In Healthcare Organizations
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus UTM FIRST AUTHOR |
2014 |
Improving Broadcast Reliability For Neighbor Discovery, Link Estimation And Collection Tree Construction In Wireless Sensor Networks
COMPUTER NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Location Service Protocol For Highly Mobile Ad Hoc Network
ARABIAN JOURNAL OF SCIENCE AND ENGINEERING Publication In Web Of Science CO-AUTHOR |
2014 |
Network Initialization In Low-Power Wireless Networks: A Comprehensive Study
COMPUTER JOURNAL Publication In Web Of Science CO-AUTHOR |
2014 |
Local Coverage Measurement Algorithm In Gps-Free Wireless Sensor Networks
AD HOC NETWORKS Publication In Web Of Science CO-AUTHOR |
2014 |
Rushing Attack Against Routing Protocols In Mobile Ad-Hoc Networks
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Security Evaluation Over Lightweight Cryptographic Protocols
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
New Secure Identity-Based And Certificateless Authenticated Key Agreement Protocols Without Pairings
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Cama: Efficient Modeling Of The Capture Effect For Low-Power Wireless Networks
ACM TRANSACTIONS ON SENSOR NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Broadcasting In Connected And Fragmented Vehicular Ad Hoc Networks
INTERNATIONAL JOURNAL OF VEHICULAR TECHNOLOGY Publication In Scopus CO-AUTHOR |
2014 |
A Conceptual Model For Holistic Classification Of Insider
ASIAN JOURNAL OF APPLIED SCIENCES Publication In Scopus UTM FIRST AUTHOR |
2014 |
Towards Adapting Metamodelling Technique For Database Forensics Investigation Domain
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CO-AUTHOR |
2014 |
A Psychographic Framework For Online User Identification
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus UTM FIRST AUTHOR |
2014 |
Integration And Analysis Of Neighbor Discovery And Link Quality Estimation In Wireless Sensor Networks
THE SCIENTIFIC WORLD JOURNAL Publication In Web Of Science CO-AUTHOR |
2014 |
Edr: Efficient Data Routing In Wireless Sensor Networks
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING Publication In Web Of Science CO-AUTHOR |
2013 |
Classification Of Energy-Efficient Routing Protocols For Wireless Sensor Networks
AD-HOC AND SENSOR WIRELESS NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
Analysing Wireless Sensor Network Deployment Performance Using Connectivity
SCIENCEASIA Publication In Web Of Science UTM FIRST AUTHOR |
2013 |
A Digital Forensic Investigation Model For Insider Misuse
PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY (CCSEIT-2013) Publication In Scopus UTM FIRST AUTHOR |
2013 |
Quorum-Based Location Service Protocol For Vehicular Ad Hoc Networks In Urban Environment
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING Publication In Web Of Science CO-AUTHOR |
2013 |
Agent-Based Approach For Modeling Evacuee Uncertainty Behavior Using Game Theory Model
LIFE SCIENCE JOURNAL Publication In Scopus CO-AUTHOR |
2013 |
Research On Security Protocol For Collaborating Mobile Agents In Network Intrusion Detection Systems
AMERICAN JOURNAL OF APPLIED SCIENCES Publication In Scopus UTM FIRST AUTHOR |
2013 |
Trust-Based Routing Mechanism In Manet: Design And Implementation
MOBILE NETWORKS AND APPLICATIONS Publication In Web Of Science CORRESPONDING AUTHOR |
2013 |
Identifying Critical Features For Network Forensics Investigation Perspectives
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION SECURITY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2012 |
A Novel Lightweight Authentication Scheme For Mobile Ad Hoc Networks
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING Publication In Web Of Science UTM FIRST AUTHOR |
2012 |
Eedars: An Energy-Efficient Dual-Sink Algorithm With Role Switching Mechanism For Event-Driven Wireless Sensor Networks
KSII, TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Publication In Web Of Science UTM FIRST AUTHOR |
2012 |
Fundamental Lifetime Mechanisms In Routing Protocols For Wireless Sensor Networks: A Survey And Open Issues
SENSORS Publication In Web Of Science UTM FIRST AUTHOR |
2012 |
Location Service Management Protocol For Vehicular Ad Hoc Network Urban Environment
LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL-INFORMATICS AND TELECOMMUNICATIONS ENGINEERING, LNICST Publication In Scopus CO-AUTHOR |
2012 |
An Overview Of Data Routing Approaches For Wireless Sensor Networks
SENSORS Publication In Web Of Science CO-AUTHOR |
2012 |
A Location Based Prediction Service Protocol For Vanet City Environment
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL Publication In Web Of Science CO-AUTHOR |
2012 |
Towards Deploying Vehicular Ad Hoc Networks On Aerodromes To Mitigate Incursions
ADVANCED MATERIALS RESEARCH Publication In Web Of Science CO-AUTHOR |
2012 |
Ef-Mpr, A New Energy Efficient Multi-Point Relay Selection Algorithm For Manet
JOURNAL OF SUPERCOMPUTING Publication In Web Of Science CO-AUTHOR |
2012 |
Towards Providing A New Lightweight Authentication And Encryption Scheme For Manet
WIRELESS NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2011 |
-
Enhancing MANET Security Using Secret Public Keys Conference Paper CORRESPONDING AUTHOR |
2009 |
-
Underwater Wireless Sensor Network Localization Conference Paper CORRESPONDING AUTHOR |
2009 |
-
Multi Point Relay Selection Using GA Conference Paper CORRESPONDING AUTHOR |
2009 |
-
Lightweight Authentication Scheme for Mobile Ad Hoc Networks Conference Paper CORRESPONDING AUTHOR |
2009 |
Enhancing Manet Security Using Secret Public Keys
INTERNATIONAL CONFERENCE ON FUTURE NETWORKS (ICFN 2009) Publication In Web Of Science UTM FIRST AUTHOR |
2009 |
Issr Cs Letters
A Review of Delay Aware Routing Protocols in MANET Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2009 |
-
CSC PSM Handbook Modules / Manual CORRESPONDING AUTHOR |
2009 |
-
CSC PSM Handbook Modules / Manual CORRESPONDING AUTHOR |
2009 |
Journal Of Information Assurance And Security
A Friends Mechanism for Mobile Ad Hoc Networks Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2009 |
Toward Achieving Cooperation In A Trusted Manet Community: A Friendships Mechanism Approach
Proceedings Of 4th Postgraduate Annual Research Seminar PARS 08 Conference Paper CORRESPONDING AUTHOR |
2008 |
Social Trust: From Real World To Mobile Ad Hoc Network
Advanced computer network & security Publication In Scopus CORRESPONDING AUTHOR |
2008 |
A Friend Mechanism For Mobile Ad Hoc Networks
Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008 Conference Paper CORRESPONDING AUTHOR |
2008 |
Buiding A Trusted Community For Ad Hoc Networks Using Freindes Recommendation
Ad-Hoc, Mobile and Wireless Network AdHoc-NOW 2007 Conference Conference Paper CORRESPONDING AUTHOR |
2007 |
Building A Trusted Community For Mobile Ad Hoc Networks Using Friend Recommendation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Conference Paper CORRESPONDING AUTHOR |
2007 |
Buiding A Trusted Community For Mobile Ad Hoc Networks Using Freindes Recommendation
Ad-Hoc, Mobile and Wireless Network AdHoc-NOW 2007 Conference Conference Paper CORRESPONDING AUTHOR |
2007 |
Legend : IP CATEGORY IP LEVEL
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
TAMEEM EISSA A LIGHTWEIGHT IDENTITY-BASED RIVERST-SHAMIR-ADLEMAN AUTHENTICATION SCHEME FOR MOBILE AD HOC NETWORKS PHD GRADUATED CO-SUPERVISOR 2011 |
HASSAN CHIZARI DELAUNAY TRIANGULATION-BASED GLOBAL AND LOCAL COVERAGE MEASUREMENT FOR WIRELESS SENSOR NETWORKS PHD GRADUATED CO-SUPERVISOR 2011 |
SALIM M. ZAKI INTELLIGENT QUORUM-BASED LOCATION SERVICE PROTOCOL FOR VEHICULAR AD-HOC NETWORKS IN URBAN ENVIRONMENT PHD GRADUATED CO-SUPERVISOR 2012 |
MOHAMMADREZA ESLAMINEJAD ENERGY-EFFICIENT DUAL-SINK ALGORITHMS FOR SINK MOBILITY IN EVENT-DRIVEN WIRELESSS SENSOR NETWORKS PHD GRADUATED SUPERVISOR 2013 |
SARA NAJAFZADEH A NEIGHBOR-AWARE BROADCASTING PROTOCOL FOR SAFETY MESSAGES ON HETEROGENEOUS COMMUNICATION RANGE VEHICULAR AD HOC NETWORKS PHD GRADUATED CO-SUPERVISOR 2013 |
RAMIN KARIMI IMPROVED CONNECTIVITY IN GEOGRAPHIC ROUTING PROTOCOLS USING DELAY-TOLERANT NETWORKS SCHEME IN VEHICULAR AD HOC NETWORKS PHD GRADUATED CO-SUPERVISOR 2013 |
BEHNAM DEZFOULI ENHANCED COLLISION AVOIDANCE MECHANISMS FOR WIRELESS SENSOR NETWORKS THROUGH HIGH ACCURACY COLLISION MODELING PHD GRADUATED SUPERVISOR 2013 |
HASSAN ASADOLLAHI MATHEMATICAL MODELS FOR MITIGATING ENERGY HOLES IN CORONA-BASED WIRELESS SENSOR NETWORK PHD GRADUATED CO-SUPERVISOR 2014 |
YA'U ABDULSALAM GITAL ENHANCED TRANSMISSION CONTROL PROTOCOL-DRIVEN CLOUD-BASED ARCHITECTURE TO IMPROVE COLLABORATIVE VIRTUAL ENVIRONMENT UPDATES AND RESOURCE SHARING PHD GRADUATED CO-SUPERVISOR 2014 |
IKUESAN RICHARD ADEYEMI ONLINE PSYCHOGRAPHIC MODEL FOR INSIDER IDENTIFICATION PHD GRADUATED SUPERVISOR 2015 |
OLUMIDE SIMEON OGUNNUSI A FRAMEWORK FOR IMPROVING PERFORMANCE OF SECURED MOBILE AGENT COMMUNICATION IN MULTI-AGENT SYSTEMS PHD GRADUATED SUPERVISOR 2016 |
KAMAL JADIDY AVAL AN ENHANCED EVOLUTIONARY ALGORITHM FOR REQUESTED COVERAGE IN WIRELESS SENSOR NETWORKS PHD GRADUATED SUPERVISOR 2016 |
ARAFAT MOHAMMED RASHAD ALDHAQM SIMPLIFIED DATABASE FORENSIC INVESTIGATION USING METAMODELING APPROACH PHD GRADUATED SUPERVISOR 2018 |
SEYEDMOHSEN GHOREISHI SECURE PAIRING-FREE TWO-PARTY CERTIFICATELESS AUTHENTICATED KEY AGREEMENT PROTOCOL WITH MINIMAL COMPUTATIONAL COMPLEXITY PHD GRADUATED CO-SUPERVISOR 2019 |
ABDALLAH ELHIGAZI ABDALLAH ELHIGAZI WIRELESS LOCAL AREA NETWORK MANAGEMENT FRAME DENIAL-OF-SERVICE ATTACK DETECTION AND MITIGATION SCHEMES PHD GRADUATED SUPERVISOR 2020 |
ONWUEGBUZIE INNOCENT UZOUGBO ENHANCED PRIORITY-BASED ADAPTIVE ENERGY-AWARE MECHANISMS FOR WIRELESS SENSOR NETWORKS PHD GRADUATED SUPERVISOR 2021 |
ABDULALEM ALI MOHAMMED SALEH STRUCTING MOBILE FORENSIC DOMAIN KNOWLEDGE USING METAMODELING APPROACH PHD GRADUATED SUPERVISOR 2022 |
SALMAN RASHID POPULARITY AND MATURITY-AWARE DYNAMIC CACHING PLACEMENT AND REPLACEMENT TECHNIQUE FOR CONTENT-CENTRIC NETWORK PHD GRADUATED SUPERVISOR 2022 |
AJOZE ABDULRAHEEM ZUBAIR ENHANCED MULTI-OBJECTIVE TASK SCHEDULING OPTIMIZATION SCHEME FOR QUALITY OF SERVICE IN CLOUD COMPUTING PHD GRADUATED SUPERVISOR 2023 |
SHILAN SAMEEN HAMEED ALJAF LIGHTWEIGHT ENSEMBLE METHODS FOR ATTACK CLASSIFICATION IN FOG INTERNET OF MEDICAL THINGS PHD GRADUATED CO-SUPERVISOR 2023 |
MOHAMED NOORDIN YUSUFF MARICAN CYBER SECURITY QUANTIFICATION FRAMEWORK TO MEASURE THE RETURN OF SECURITY INVESTMENTS FOR TECHNOLOGY STARTUPS PHD GRADUATED CO-SUPERVISOR 2024 |
MOHAMMED IBRAHEM ABDELRAHMAN ALATRASH COLLABORATIVE DISTRIBUTED-IDS FOR IIOT BASED ON HETEROGENEOUS DATA     PHD ON GOING CO-SUPERVISOR |
ZABID BASHAR AHMED KHALAF PHD ON GOING CO-SUPERVISOR |
SALIM M. ZAKI MASTER GRADUATED CO-SUPERVISOR 2008 |
MAJID HOSSEINI RECEIVED SIGNAL STRENGTH INDICATION BASED DISTANCE MEASUREMENT USING LAMBERT FUNCTION FOR UNDERWATER WIRELESS SENSOR NET MASTER GRADUATED CO-SUPERVISOR 2009 |
NORMALIA BINTI SAMIAN EFFICIENT SECURITY MECHANISMS FOR DISTANCE VECTOR ROUTING PROTOCOL MASTER GRADUATED CO-SUPERVISOR 2010 |
AZIAH BINTI ASMAWI DATABASE SECURITY MASTER GRADUATED CO-SUPERVISOR 2010 |
AHMAD FAUZI BIN AHMAD PUAD MASTER GRADUATED SUPERVISOR 2013 |
MUHAMMAD SYAFIQ BIN SAMSI MASTER GRADUATED SUPERVISOR 2014 |
AHMAD FAHRULRAZIE BIN MOHAMAD MASTER GRADUATED SUPERVISOR 2014 |
KEKERE TEMITOPE JOSIAH MASTER GRADUATED SUPERVISOR 2014 |
NUR FASIHAH BINTI ABDUL KADIR MASTER GRADUATED SUPERVISOR 2014 |
KAM KUI LIN TELECARDIOLOGY SYSTEM WITH ELECTROCARDIOGRAM DELINEATION BASED ON WAVELET TRANSFORM MASTER GRADUATED CO-SUPERVISOR 2018 |
NOOR ALYANIS FARHAIDA BINTI MOHD ZAINON ENHANCED FUZZY VAULT SCHEME ON PALM VEIN BIOMETRIC TEMPLATE PROTECTION USING FAST WALSH HADAMARD TRANSFORMATION MASTER GRADUATED SUPERVISOR 2022 |
WAN MUHAMMAD ARIF AMRIN BIN WAN ROSLEE INTERNET OF THINGS (IOT) SECURITY READINESS ASSESSTMENT FOR MALAYSIAN SMALL TO MEDIUM ENTERPRISES (SMES) MASTER ON GOING CO-SUPERVISOR |