GRANT(PI & MEMBERS)
43
PUBLICATIONS
83
INDEXED PUBLICATION
51
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
INDUSTRY GRANTS
4
NATIONAL GRANTS
4
UNIVERSITY FUND
3
TOTAL
Publications
INDEXED PUBLICATION
51
NON-INDEXED PUBLICATION
9
OTHERS PUBLICATION
23
TOTAL
Supervisions
MASTER
6
PHD
12
TOTAL
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
F4+ 3.1: 3D Modeling and Real-Time Interactive Interface for Human Digital Twin RUG OF UTM Geran Penyelidikan Hi-Tech(F4) |
2024 |
SAFEUHUB CLOUD RESEARCH ON SYSTEM MIGRATION AND PREVENTIVE MAINTENANCE FRAMEWORK UMW CORPORATION SDN. BHD. Contract Research DTD |
2022 |
Occluded Face Detection with Context Awareness Using Machine Learning RUG OF UTM Industry-International Incentive Grant |
2021 |
HSSE Scheduled Waste e-Tracking System (SWeT) UMW CORPORATION SDN BHD Contract Research DTD |
2020 |
Tjap Go Meh - Introduction of Acculturation as Mutual Respect for Society TELKOM UNIVERSITY International Grant |
2020 |
STUDY AND DEVELOPMENT OF HIGH-LEVEL INTEGRATION BETWEEN PHYSICAL SECURITY INFORMATION SYSTEM (PSIM) VMS, PIDS, ACS, PA SYSTEM, VIDEO ANALYTICS AND BMS DEVICES.(UIP-UNIFIED INTELLIGENT PLATFORM) VENTIONEX INTERNATIONAL SDN BHD Contract Research DTD |
2020 |
RPG GAME APPROACH FOR TJAP GO MEH - ACCULTURATION AS MUTUAL RESPECT FOR SOCIETY RUG OF UTM Matching Grant |
2020 |
UTM FACE SHIELD DAN INTUBATION BOX: PENYEDIAAN PERLIDUNGAN UNTUK PETUGAS KESIHATAN MENANGANI COVID-19 RUG OF UTM UTM R&D Fund |
2020 |
THE DEVELOPMENT OF UMW HEALTH, SAFETY AND ENVIRONMENT SOFTWARE FOR INDUSTRIAL 4.0 TRANSFORMATION UMW CORPORATION SDN BHD Contract Research DTD |
2019 |
MRUN 5.2 : GAMIFICATION PLATFORM USER DATA AND CONTENT SECURITY USING BLOCKCHAIN TECHNOLOGY FOR UNIVERSITY 4.0 MINISTRY OF EDUCATION MALAYSIA RESEARCH UNIVERSITY NETWORK |
2018 |
MRUN 5.0 - VIRTUAL REALITY AND GAMIFICATION PLATFORM FOR ENGINEERING AND TVET ENGINEERING IN UNIVERSITY 4.0 MINISTRY OF EDUCATION MALAYSIA RESEARCH UNIVERSITY NETWORK |
2018 |
Study of Sharia Compliant Digital Coin OK BLOCKCHAIN CENTRE SDN BHD Contract Research DTD |
2018 |
Feasibility Study and The Development of HSE Software Prototype UMW CORPORATION SDN BHD Contract Research DTD |
2018 |
HYBRID CRYPTO-TOKEN BLOCKCHAIN: A NEW ARCHITECTURE OF DIGITAL MARKETPLACES RUG OF UTM COE Research Grant |
2018 |
PROGRAM USAHAWAN DIGITAL 2017 PERBADANAN USAHAWAN JOHOR SDN. BHD Networking Grant |
2017 |
PEMUPUKAN MINAT REMAJA TERHADAP PEMBANGUNAN APPS BERASASKAN PEMBELAJARAN RUG OF UTM Business Entity |
2016 |
PANGKALAN DATA PROFIL BAKAT BELIA JOHOR RUG OF UTM Institut Inovasi Strategik Johor |
2016 |
PENGLIBATAN BELIA DI DALAM PEMBANGUNAN APPS BERKAITAN STEM RUG OF UTM Institut Inovasi Strategik Johor |
2016 |
Security and Privacy Enhancement with Middleware Device for Securing a Heterogeneous Internet of Things on Air Quality Monitoring UNIVERSITAS SRIWIJAYA Networking Grant |
2016 |
Hemodialysis Data Loss Mitigation and Patient Tracking During Flood Disaster MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2015 |
Interactive Data Visualization RUG OF UTM Flagship |
2014 |
Hybrid Virtual Learning Platform For English Education RUG OF UTM Flagship-COE |
2014 |
ENHANCED DYNAMIC SKIN COLOUR DETECTION METHOD FOR STILL IMAGE BASED ON ONLINE SAMPLING APPROACH RUG OF UTM Encouragement Grant |
2014 |
REAL-TIME TEXT LOCALIZATION IN HIGH SIMILARITY BACKGROUND AND DISTORTION IMAGES ON WEARABLE MOBILE COMPUTER MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2013 |
URBAN WORKBENCH : GESTURE-BASED INTERACTION WITH 3D OBJECT TRACKING ON TABLETOP AUGMENTED REALITY MINISTRY OF EDUCATION Exploratory Research Grant Scheme |
2013 |
AN ARCHITECTURE OF INTELLIGENT TRANSPORTATION SYSTEMS BASED ON WIRELESS SENSOR NETWORKS RUG OF UTM Tier 1 |
2012 |
Early detection algorithm for volume-based network intrusion detection MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2009 |
A Study on Advanced Statistical Analysis for Network Anomaly Detection Short Term |
2000 |
The Design and Development of Artificial Immune System Architecture for Intrusion Detection System MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
1999 |
A Metodologi Pembangunan Aplikasi Web (RMM & OOHM): Pendekatan baru bagi tujuan Kemudahan Pembangunan dan Penyelengaraaan MINISTRY OF EDUCATION Short Term |
1998 |
Design and Development of an Intelligent Security Layer for Web-Based Applications Sciencefund |
1998 |
A Authentification Technique on Electronic Performance Support System (EPSS) Security in a Web-Based Environmennt MINISTRY OF EDUCATION Short Term |
1998 |
The Development of Attack Response Mechanism for Intrusion Detection System MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
1998 |
Software Engineering Methodoligies for Modelling Complex Real-Time Systems Short Term |
1995 |
Sistem Pakar Rawatan Tradisional yang Tidak Bercanggah dengan Al-Quran dan Al-Sunnah Short Term |
1990 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
Effective And Efficient Approach In Iot Botnet Detection
SINERGI (INDONESIA) Publication In Scopus UTM FIRST AUTHOR |
2024 |
An Improved Lstm-Pca Ensemble Classifier For Sql Injection And Xss Attack Detection
COMPUTER SYSTEMS SCIENCE AND ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2023 |
The Development Of An Internet Of Things (Iot) Network Traffic Dataset With Simulated Attack Data
JOURNAL OF INTERNET TECHNOLOGY Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
Iot Botnet Attack Detection Using Deep Autoencoder And Artificial Neural Networks
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
Dimensional Reduction With Fast Ica For Iot Botnet Detection
JOURNAL OF APPLIED SECURITY RESEARCH Publication In Web Of Science UTM FIRST AUTHOR |
2023 |
Cyberattack Feature Selection Using Correlation-Based Feature Selection Method In An Intrusion Detection System
INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI) Publication In Scopus UTM FIRST AUTHOR |
2022 |
Feature Selection Using Chi Square To Improve Attack Detection Classification In Iot Network: Work In Progress
INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI) Publication In Scopus UTM FIRST AUTHOR |
2022 |
Blockchain-Based Distributed File System Security And Privacy: A Systematic Mapping Study
2022 4TH INTERNATIONAL CONFERENCE ON SMART SENSORS AND APPLICATION (ICSSA) Publication In Scopus UTM FIRST AUTHOR |
2022 |
Time Efficiency On Computational Performance Of Pca, Fa And Tsvd On Ransomware Detection
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATICS Publication In Scopus UTM FIRST AUTHOR |
2022 |
Improvement Of Attack Detection Performance On The Internet Of Things With Pso-Search And Random Forest
JOURNAL OF COMPUTATIONAL SCIENCE Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
An Improved Robust Misbehavior Detection Scheme For Vehicular Ad Hoc Network
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2022 |
Impact Of Dimensionality Reduction On Performance Of Iot Intrusion Detection System
INTERNET OF THINGS FRAMEWORKS FOR ENABLING AND EMERGING TECHNOLOGIES Book Chapter UTM FIRST AUTHOR |
2022 |
An Approach For Optimizing Ensemble Intrusion Detection Systems
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Ransomware Detection Based On Opcode Behaviour Using K-Nearest Neighbours Algorithm
INFORMATION TECHNOLOGY AND CONTROL Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Ping Flood Attack Pattern Recognition Using A K-Means Algorithm In An Internet Of Things (Iot) Network
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2021 |
Designing Consensus Algorithm For Collaborative Signature-Based Intrusion Detection System
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2021 |
The Trend Malware Source Of Iot Network
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2021 |
Intrusion Detection With Deep Learning On Internet Of Things
Heterogeneous Network
IAES INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE Publication In Scopus UTM FIRST AUTHOR |
2021 |
The Trends Of Supervisory Control And Data Acquisition Security Challenges In Heterogeneous Networks
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2021 |
Enhanced Deep Learning Intrusion Detection In Iot Heterogeneous Network With Feature Extraction
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATICS (IJEEI) Publication In Scopus UTM FIRST AUTHOR |
2021 |
The Future Of Office
UTM NEXUS Publication In Academic And Profesional Magazine CORRESPONDING AUTHOR |
2021 |
Agile Software Development Using Cloud Computing: A Case Study
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2020 |
Iot Botnet Malware Classification Using Weka Tool And Scikit-Learn Machine Learning
2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCES AND INFORMATICS (EECSI) Publication In Scopus UTM FIRST AUTHOR |
2020 |
Optimal Parameters For Modified Butterfly Interpolation Scheme Inspired Configurations As Hole-Filling Method In 3d Volume Reconstruction
2020 IEEE GRAPHICS AND MULTIMEDIA (GAME) Publication In Scopus CO-AUTHOR |
2020 |
Poas: Enhanced Consensus Algorithm For Collaborative Blockchain Intrusion Detection System
2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICOIACT) Publication In Scopus UTM FIRST AUTHOR |
2020 |
Improving The Anomaly Detection By Combining Pso Search Methods And J48 Algorithm
2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCES AND INFORMATICS (EECSI) Publication In Scopus UTM FIRST AUTHOR |
2020 |
Cicids-2017 Dataset Feature Analysis With Information Gain For Anomaly Detection
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2020 |
Features Extraction On Iot Intrusion Detection System Using Principal Components Analysis (Pca)
2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCES AND INFORMATICS (EECSI) Publication In Scopus UTM FIRST AUTHOR |
2020 |
Review Of Some Existing Shariah-Compliant Cryptocurrency
JOURNAL OF CONTEMPORARY ISLAMIC STUDIES Journal Article Non Citation-Indexed CO-AUTHOR |
2020 |
A Taxonomy And Survey Of Data Partitioning Algorithms For Big Data Distributed Systems
MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING Book Chapter CO-AUTHOR |
2020 |
Enhancing Trust Model Of Information Vehicular Ad-Hoc Networks Through Blockchain Consensus Algorithm
2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICOIACT) Publication In Scopus UTM FIRST AUTHOR |
2020 |
The State Of The Art On Secure Software Engineering: A Systematic Mapping Study
ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES Publication In Scopus UTM FIRST AUTHOR |
2020 |
Behavior Pattern Recognition Of Game Dragon Nest Using Bloom Filter Method
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY Publication In Scopus UTM FIRST AUTHOR |
2019 |
Investigating Brute Force Attack Patterns In Iot Network
JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
An Evaluation Framework For Communication And Coordination Processes In Offshore Software Development Outsourcing Relationship: Using Fuzzy Methods
IEEE ACCESS Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
Tcp Fin Flood Attack Pattern Recognition On Internet Of Things With Rule Based Signature Analysis
INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING (IJOE) Publication In Web Of Science UTM FIRST AUTHOR |
2019 |
A Comparative Analysis Of Blockchain Consensus Algorithms
From Shariah Perspective
4TH INTERNATIONAL HALAL CONFERENCE (INHAC) 2019 Conference Paper CO-AUTHOR |
2019 |
Review Of Existing Shariah-Compliant Cryptocurrency
4TH INTERNATIONAL HALAL CONFERENCE (INHAC) 2019 Conference Paper CO-AUTHOR |
2019 |
Frame Extraction In Wearable Vision
ADVANCES IN HUMAN INTERACTION TECHNOLOGY Book Chapter CORRESPONDING AUTHOR |
2018 |
Localizing Text In High Color Similarity Images
ADVANCES IN HUMAN INTERACTION TECHNOLOGY Book Chapter CORRESPONDING AUTHOR |
2018 |
Systematic Mapping Study Protocol For Secure Software Engineering
2ND ASIA INTERNATIONAL MULTIDISCIPLINARY CONFERENCE Conference Paper UTM FIRST AUTHOR |
2018 |
Iot Blockchain For Smart City: A Survey
7TH INTERNATIONAL GRADUATE CONFERENCE ON ENGINEERING, SCIENCE AND HUMANITIES Conference Paper CORRESPONDING AUTHOR |
2018 |
Iot Smart Device For E-Learning Content Sharing On Hybrid Cloud Environment
4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS Proceedings CORRESPONDING AUTHOR |
2017 |
Cyber-Attack Penetration Test And Vulnerability Analysis
INTERNATIONAL JOURNAL OF ONLINE ENGINEERING Publication In Web Of Science CORRESPONDING AUTHOR |
2017 |
Payload Recognition And Detection Of Cross Site
Scripting Attack
2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC 2017). Publication In Scopus UTM FIRST AUTHOR |
2017 |
Real Traffic-Data Based Evaluation Of Vehicular Traffic Environment And Stateof-
The-Art With Future Issues In Location-Centric Data Dissemination For
Vanets
DIGITAL COMMUNICATIONS AND NETWORK Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Flood Disaster Management Approachfor Tracking Hemodialysis Patient In Kelantan
PERSIDANGAN KAJIAN BENCANA BANJIR Conference Paper CORRESPONDING AUTHOR |
2016 |
An Exploratory Study Of Communication And Coordination
Challenges In Offshore Software Development Outsourcing:
Results Of Systematic Literature Review And Empirical Study
SCIENCE INTERNATIONAL Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2016 |
Google Glass Translator
INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings CORRESPONDING AUTHOR |
2016 |
An Exploratory Study Of Communication And Coordination
Challenges In Offshore Software Development Outsourcing:
Results Of Systematic Literature Review And Empirical Study
SCIENCE INTERNATIONAL Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2016 |
Anomaly Detection And Monitoring In Internet Of Things Communication
PROCEEDINGS OF 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING: EMPOWERING TECHNOLOGY FOR BETTER FUTURE, ICITEE 2016 Publication In Scopus UTM FIRST AUTHOR |
2016 |
Penetration Testing And Mitigation Of Vulnerabilities Windows Server
INTERNATIONAL JOURNAL OF NETWORK SECURITY Publication In Scopus UTM FIRST AUTHOR |
2016 |
Location Based Challenges In Vehicular Communication: Privacy,
Verification And Accuracy
THE 11TH ASIA PACIFIC INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY Conference Paper UTM FIRST AUTHOR |
2016 |
Penetration Testing And Network Auditing: Linux
JOURNAL OF INFORMATION PROCESSING SYSTEMS Publication In Web Of Science UTM FIRST AUTHOR |
2015 |
Text Localization In Images Using Reverse Thresholds Algorithm
JURNAL TEKNOLOGI Publication In Web Of Science CORRESPONDING AUTHOR |
2015 |
Atlas: Adaptive Text Localization Algorithm In High Color Similarity Background
TELKOMNIKA (TELECOMMUNICATION COMPUTING ELECTRONICS AND CONTROL) Publication In Scopus UTM FIRST AUTHOR |
2015 |
Threat And Vulnerability Penetration Testing: Linux
JOURNAL OF INTERNET TECHNOLOGY Publication In Web Of Science CORRESPONDING AUTHOR |
2014 |
Attribute Normalization Techniques And Performance Of Intrusion Classifiers: A Comparative Analysis
LIFE SCIENCE JOURNAL Publication In Scopus UTM FIRST AUTHOR |
2013 |
Attack And Vulnerability Penetration Testing: Freebsd
TELKOMNIKA Publication In Scopus UTM FIRST AUTHOR |
2013 |
Intrusion Threat Detection From Insider Attack Using Learning Behavior-Based
INTERNATIONAL JOURNAL OF THE PHYSICAL SCIENCES Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2012 |
Intrusion Prevention System: A Survey
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2012 |
Intrinsic Authentication Of Multimedia Objects Using Biometric Data Manipulation
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY Publication In Web Of Science CO-AUTHOR |
2012 |
Protocol Share Based Traffic Rate Analysis (Psbtra) For Udp Bandwidth Attack
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE Publication In Scopus CORRESPONDING AUTHOR |
2011 |
Pitcher Flow: Unified Integration For Intrusion Prevention System
PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND MANAGEMENT Proceedings CO-AUTHOR |
2011 |
Heteregeneous Parameters For Accuracy Threat
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2011 |
Characterizing Network Intrusion Prevention System
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS Journal Article Non Citation-Indexed CO-AUTHOR |
2011 |
Research On Heteregeneous Data For Recognizing Threat
ICSOFT 2011 - PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATABASE TECHNOLOGIES Publication In Scopus CO-AUTHOR |
2011 |
Survey On Heterogeneous Data For Recognizing Threat
JOURNAL OF COMPUTATIONAL INFORMATION SYSTEMS Publication In Scopus CO-AUTHOR |
2011 |
Classification Of Habitual Activities In Behavior-Based Network Detection
JOURNAL OF COMPUTING Journal Article Non Citation-Indexed CO-AUTHOR |
2010 |
Enhanced Technique For Secure Wireless Sensor Routing With Respect To Energy Conservation
LECTURE NOTES IN COMPUTER SCIENCE Publication In Scopus CO-AUTHOR |
2010 |
Reliability Measurement Of Internet Services
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND THE SECOND AUN/SEED-NET REGIONAL CONFERENCE ON ICT, ICGC-RCICT 2010 Proceedings CO-AUTHOR |
2010 |
The Prevention Threat Of Behavior-Based Signature Using
Pitcher Flow Architecture
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY Journal Article Non Citation-Indexed CO-AUTHOR |
2010 |
The Trends Of Intrusion Prevention System Network
ICETC 2010 - 2010 2ND INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTER Publication In Scopus CO-AUTHOR |
2010 |
Volume-Based Network Intrusion Attacks Detection
Advanced computer network & security Book Chapter INDIVIDUAL AUTHOR |
2008 |
Fast Optimization Method: The Window Size And Hurst Parameter Estimator On Self-Similar Network Traffic
Journal of Information and Optimization Sciences Journal Article Non Citation-Indexed INDIVIDUAL AUTHOR |
2007 |
Qos Based Anomaly Detection Based On Self-Similar Network Traffic
4TH INTERNATIONAL WORKSHOP ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2006) Conference Paper CORRESPONDING AUTHOR |
2006 |
Network Anomaly Detection On Self-Similar Network Traffic Using The Optimization And Sliding Window Methods
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (ICIS2005) Conference Paper CORRESPONDING AUTHOR |
2005 |
Self-Boundary Analyzing Method In Self- Similar Network Traffic For Anomaly Detection
1ST INTERNATIONAL SYMPOSIUM ON BIO-INSPIRED COMPUTING (BIC'05) Conference Paper CORRESPONDING AUTHOR |
2005 |
Normal And Anomalous Network Traffic Modeling: A Synthetic Data Generator Tool
BRUNEI INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (BICET 2005) Conference Paper CORRESPONDING AUTHOR |
2005 |
Iterative Window Size Estimation On Self-Similarity Measurement For Network Traffic Anomaly Detection
INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATION SCIENCES Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2004 |
An Iterative Estimation Of Data Window Size For Anomaly Detection Using Self-Similar Feature In Network Traffic
1ST CONFERENCE ON TELEMATICS SYSTEM, SERVICES, AND APPLICATION 2004 (TSSA2004) Conference Paper CORRESPONDING AUTHOR |
2004 |
File Access Permission Change Detection Using Immunological Negative Selection Approach
INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY 2002 Conference Paper CORRESPONDING AUTHOR |
2002 |
KEJURUTERAAN PERISIAN Book (Text) CO-AUTHOR |
1999 |
Legend : IP CATEGORY IP LEVEL
Intellectual Property Name | Grant Register No. | IP Level | IP Category |
---|---|---|---|
VITAL | 2016069518 Class 9 | NATIONAL | TRADEMARK |
A SYSTEM FOR ELECTRONIC CARD COMPOSITION | MY-174981-A | NATIONAL | PATENT |
ART MOBILE PERSONALIZED VIDEO NAVIGATION SYSTEM | NATIONAL | PATENT | |
MULTIPLE VIDEO STREAMING COMPOSITION AND SYNCHRONIZATION METHOD | NATIONAL | PATENT | |
WEBGL BASIC COURSE FOR VIRTUAL LAB | NATIONAL | COPYRIGHT | |
TVETXR CLASS AND PROFILE | NATIONAL | COPYRIGHT | |
WEB AND MOBILE APPLICATION FOR AR & VR | NATIONAL | COPYRIGHT | |
USER MANUAL TVETXR | NATIONAL | COPYRIGHT | |
VIDEO UTM IHUMEN: 2020 IN REVIEW | FM2021E03335 | NATIONAL | COPYRIGHT |
ON-LINE AND OFF-LINE CONTENT ACCESS CONTROL MECHANISM FOR VIRTUAL TEACHING AND LEARNING SYSTEM | NATIONAL | COPYRIGHT | |
PROTECTED CONTENT DISTRIBUTION AND ACCESS FOR VIRTUAL TEACHING AND LEARNING SYSTEM | NATIONAL | COPYRIGHT |
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
MAQSOOD MAHMUD A NEW IRIS PROTECTION METHOD USING BIO-CHAOTIC ALGORITHM AND BIO-GAUSSIAN CIPHER PHD GRADUATED CO-SUPERVISOR 2013 |
DERIS STIAWAN ACTIVE RESPONSE INTRUSION PREVENTION SYSTEM USING DYNAMIC PARAMETERS SELECTION PHD GRADUATED CO-SUPERVISOR 2013 |
NORZIANA BINTI YAHYA SERVICE INTERFACE MEDIATOR MODEL FOR INTEROPERABILITY OF HETEROGENEOUS OPERATION CENTER SYSTEMS PHD GRADUATED CO-SUPERVISOR 2018 |
WONG LIH FONG ENHANCED EDGE DETECTION AND RESTORATION METHODS FOR STROKE WIDTH TRANSFORM ALGORITHM PHD GRADUATED SUPERVISOR 2018 |
MOHAMMED ABDULLAH R ALZAHRANI COLLUDING-RESISTANCE CONTEXT-AWARE MISBEHAVIOUR DETECTION MODEL FOR VEHICULAR AD HOC NETWORK USING MACHINE LEARNING TECHNIQUES PHD GRADUATED SUPERVISOR 2024 |
AFRIZAL NEHEMIA TOSCANY A HYBRID MODEL INTEGRATION PLANT SEGMENTATION TRANFORMERS AND U-NET FOR PHENOTYPIC TRAIT EXTRACTION IN DURIAN PLANTS PHD ON GOING SUPERVISOR |
ALZAHRANI, FAWAZ MOHAMMAD A HYPERLEDGER FABRIC CONFLICT TRANSACTIONS DETECTION AND CORRECTION ALGORITHM FOR BANKING OPERATIONS. PHD ON GOING SUPERVISOR |
EKO ARIP WINANTO PHD ON GOING SUPERVISOR |
YOVI PRATAMA PROPOSE VISUAL ANOMALY DETECTION FOR OIL PALM DISEASE CLASSIFICATION USING IMPROVED VISION TRANSFORMERS   PHD ON GOING SUPERVISOR |
AGUS LAKSONO ENHANCED MACHINE LEARNING ALGORITHM TO MORE PRECISE A SOPHISTICATED TELECOMMUNICATION CHURN PREDICTION AND RECOMMENDATION MODEL   PHD ON GOING SUPERVISOR |
ADITYA PUTRA PERDANA PRASETYO AN OPTIMIZED EDGE INTELLIGENCE ALGORITHM IN INDUSTRIAL INTERNET OF THINGS (IIOT) FOR WASTEWATER QUALITY CONTROL PHD ON GOING SUPERVISOR |
ARITH AMAMI BIN MISLAN MASTER GRADUATED SUPERVISOR 2015 |
MOHD ASRAF BIN ABU BAKAR MASTER GRADUATED SUPERVISOR 2015 |
MUHAMMAD SULKHAN NURFATIH ENHANCED BLOCKCHAIN CONSENSUS TECHNIQUE FOR TRUST MODEL IN VEHICLE AD HOC NETWORK MASTER GRADUATED SUPERVISOR 2021 |
EKO ARIP WINANTO EXTENSION PROOF OF ATTACK SIGNATURE IN COLLABORATIVE INSTRUSION DETECTION SYSTEM USING BLOCKCHAIN CONSENSUS ALGORITHM MASTER GRADUATED SUPERVISOR 2021 |
MASSOLIHEN BIN DASUKI ENHANCED INTERNET OF THINGS LOAD BALANCING ALGORITHM WITH AWARENESS IN RESOURCES AVAILABILITY MASTER GRADUATED SUPERVISOR 2021 |
ZULWAQAR ZAIN BIN MOHTAR SMART CONTRACT ATTRIBUTE ORIENTED ACCESS CONTROL METHOD IN BLOCKCHAIN-BASED DISTRIBUTED FILE SYSTEM MASTER GRADUATED SUPERVISOR 2024 |