GRANT(PI & MEMBERS)

PUBLICATIONS

INDEXED PUBLICATION

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

NATIONAL GRANTS
2
UNIVERSITY FUND
4
TOTAL

Publications

INDEXED PUBLICATION
8
NON-INDEXED PUBLICATION
3
OTHERS PUBLICATION
4
TOTAL

Supervisions

MASTER
5
PHD
11
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
COPYRIGHT PROTECTION OF DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
COMPREHENSIVE PRIVACY-PRESERVING DATA MINING MODEL IN DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
Hybridizing Rabin-Shamir Secret Sharing for Data Confidentiality and Integrity in Cloud Computing
Exploratory Research Grant Scheme
2013
A New Technique for Maximizing Key Space of Elliptic Curve Cryptography
Fundamental Research Grant Scheme
2013
FRIENDSHIP MECHANISM DISASTER ALERT SYSTEM ON MULTI MEDIUM SOCIAL NETWORK
RUG OF UTM Flagship
2013
INTELLIGENT DETECTION FOR SIM BOX BYPASS FRAUD DETECTION
RUG OF UTM Tier 2
2012
Software Ownership Verification Using Watermarking
RUG OF UTM Tier 2
2011
Chaos-based cryptography on securing digital medical images
RUG OF UTM Tier 2
2011
Secure Symbologies Labeling for Health Care Services
RUG OF UTM Tier 2
2011
Authentication System of Printed Document Using Watermaking Technique
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2008
The Development of Cryptographic Infrastructure Using Artificial Immune System
Sciencefund
2000
The Design and Development of Artificial Immune System Architecture for Intrusion Detection System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1999
Provider Independent Crytographic Tools
Short Term
1998
Information Hiding Using Steganography
Short Term
1998
The Development of Attack Response Mechanism for Intrusion Detection System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1998
A Secure Transaction Framework For Client-Server Based E-Commerce
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1996
Cryptography Techniques for Securing Non-Text Documents
Short Term
1996
Risk Analysis On Cyber Campus Modules
Short Term
1995
Security Issues in Electronic Voting System (EVS)
Short Term
1995
Extranet Dynamic Virtual Private Network (EDVPN)
Short Term
1995

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Medical Image Dispersal Using Enhanced Secret Sharing Threshold Scheme
INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS AND MEDICAL SYSTEMS (HIMS2015)
Conference Paper CO-AUTHOR
2015
On The Use Of Optimum Curves In Elliptic Curve Cryptography For Wireless Sensor Networks
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
Detecting Sim Box Fraud By Using Support Vector Machine And Artificial Neural Network
JURNAL TEKNOLOGI, UTM
Publication In Scopus CO-AUTHOR
2015
Jpeg Image Encryption With Elliptic Curve Cryptography
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus UTM FIRST AUTHOR
2015
Ec Encryption Cbc Method Of Operation
SECURITY IN COMPUTING AND NETWORKING - PART I
Book Chapter UTM FIRST AUTHOR
2015
Mp3 Steganalysis Based On Neural Networks
INTERNATIONAL JOURNAL OF MECHANICAL AND MECHATRONICS ENGINEERING
Publication In Scopus CO-AUTHOR
2015
Exploring The Challenges Of Mp3 Audio Steganography
2013 International Conference on Advanced Computer Science Applications and Technologies
Publication In Scopus UTM FIRST AUTHOR
2014
A Novel Dynamic Data Blocking Mechanism For Symmetric Cryptosystems
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY
Publication In Scopus CO-AUTHOR
2014
An Enhanced Fuzzy C-Means Medical Segmentation Algorithm
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus UTM FIRST AUTHOR
2014
Classification Of Sim Box Fraud Detection Using Support Vector Machine And Artificial Neural Network
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING (IJIC)
Journal Article Non Citation-Indexed CO-AUTHOR
2014
Prime Order Elliptic Curve Generation Methods: A Review
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA
Publication In Scopus UTM FIRST AUTHOR
2014
A New Method For Audio Steganography Using Message Integrity
JOURNAL OF CONVERGENCE INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
Spatial Resource Analysis Of Two Dimensional Barcodes
5th Inter. Conference on Innovations in Information Technology
Conference Paper INDIVIDUAL AUTHOR
2008
Design Of Extended Feistel Network -Maximum Distance Separable Structure
Advanced computer network & security
Book Chapter INDIVIDUAL AUTHOR
2008
Image Encryption Algorithm Based On Chaotic Mapping
JURNAL TEKNOLOGI
Journal Article Non Citation-Indexed CO-AUTHOR
2003

Legend : IP CATEGORY IP LEVEL

Intellectual Property Name Grant Register No. IP Level IP Category

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
MAHBOUBEH SHAMSI
ELLIPSE GAMMA SPECTRUM IRIS RECOGNITION BASED ON AVERAGE SQUARE SHRINKING SEGMENTATION AND TRAPEZIUM NORMALIZATION
PHD GRADUATED CO-SUPERVISOR 2010
MOHAMMED SALEM MOHAMMED ATOUM
MP3 AUDIO STEGANOGRAPHY TECHNIQUE USING EXTENDED LEAST SIGNIFICANT BIT
PHD GRADUATED SUPERVISOR 2014
SAEID BAKHTIARI
ENHANCED BASE POINT SELECTION ALGORITHM AND KOBLITZ MESSAGE MAPPING FOR ELLIPTIC CURVE CRYPTOGRAPHY
PHD GRADUATED SUPERVISOR 2015
IJAZ ALI SHOUKAT
MULTI-OPERATION DATA ENCRYPTION MECHANISM USING DYNAMIC DATA BLOCKING AND RANDOMIZED SUBSTITUTION
PHD GRADUATED CO-SUPERVISOR 2015
ALA' ABDULSALAM SULEIMAN ALAROOD
IMPROVED STEGANALYSIS TECHNIQUE BASED ON LEAST SIGNIFICANT BIT USING ARTIFICIAL NEURAL NETWORK FOR MP3 FILES
PHD GRADUATED CO-SUPERVISOR 2017
ANSER GHAZZAAL ALI MIAN MUZAFFER
LIGHTWEIGHT IDENTITY BASED ONLINE/OFFLINE SIGNATURE SCHEME FOR WIRELESS SENSOR NETWORKS
PHD GRADUATED CO-SUPERVISOR 2022
ZUWINA BINTI MASAAT

MASTER ON GOING SUPERVISOR
MD NAZRI BIN AHMAD

MASTER ON GOING SUPERVISOR
SIM HIEW MOI
IMPROVING IRIS RECOGNITION PERFORMANCE USING REED SOLOMON CODES AND DISTANCE MATCHING METRIC
MASTER GRADUATED CO-SUPERVISOR 2011
HAZHAR MOHAMMED AHMED
MASTER OF COMPUTER SCIENCE ( INFORMATION SECURITY
MASTER GRADUATED SUPERVISOR 2013
AFFANDI BIN HUSAIN

MASTER GRADUATED SUPERVISOR 2014