GRANT(PI & MEMBERS)
39
PUBLICATIONS
86
INDEXED PUBLICATION
56
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
NATIONAL GRANTS
3
UNIVERSITY FUND
6
TOTAL
Publications
INDEXED PUBLICATION
56
NON-INDEXED PUBLICATION
14
OTHERS PUBLICATION
16
TOTAL
Supervisions
MASTER
11
PHD
11
TOTAL
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
STUDY ON THE IMPACT OF MOBILE APPLICATIONS IN QUIT SMOKING PROGRAM RUG OF UTM Tier 1 |
2016 |
Development of flash flood detection using distributed radio sensor network for urban areas MINISTRY OF EDUCATION Prototype Development Research Grant Scheme |
2016 |
GPU-BASED SEGMENTATION FOR MEDICAL IMAGES. RUG OF UTM Tier 2 |
2016 |
Prototype of Android 6.0 Indoor Tracking Systems based on Intelligent Fusion WiFi/IMU Signals RUG OF UTM Tier 1 |
2016 |
Crowdfunding Platform as a Tool to Enable Public and Industry Engagement in Academia Research RUG OF UTM UTMShine |
2016 |
New Access Control Mechanism Based on Palm Biometrics Authentication for Users Cardio Information MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme |
2016 |
Reliable Data Transmission of De-noised Wavelet Cardio Data over Wireless Mesh Network MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme |
2016 |
INTEGRATED SENSOR NETWORK AND ACTIVE RFIDS FOR DYNAMIC BUILDING EVACUATION RUG OF UTM Tier 1 |
2015 |
Energy-aware reliable inferencing algorithm for localisation in wireless sensor networks inspired by human brain connectome MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2015 |
Identification of True Identity of Online Users based on Human Intrinsic Characteristics for Cyber crime Investigation MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2015 |
EXPLORATORY ON THE SUITABILITY AND EFFICIENCY OF FRIENDSHIP MECHANISM IN MINIMIZING THE IMPACT OF FAKE BROADCAST MESSAGES IN CIVILIANS NETWORKS RUG OF UTM Tier 1 |
2015 |
Fundamental Study of Enhancing the Accuracy of Signal Analysis in Electrocardiogram(ECG) MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2014 |
SECURE INFORMATION DISSEMINATION AND NOTIFICATION SYSTEM FOR DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
UNATTENDED BUILDING INHABITANTS CONTROL USING WIRELESS SENSOR NETWORKS IN DISASTER MONITORING RUG OF UTM Encouragement Grant |
2014 |
Hybridizing Rabin-Shamir Secret Sharing for Data Confidentiality and Integrity in Cloud Computing MINISTRY OF EDUCATION Exploratory Research Grant Scheme |
2013 |
FRIENDSHIP MECHANISM DISASTER ALERT SYSTEM ON MULTI MEDIUM SOCIAL NETWORK RUG OF UTM Flagship |
2013 |
A New Technique for Maximizing Key Space of Elliptic Curve Cryptography MINISTRY OF EDUCATION Fundamental Research Grant Scheme |
2013 |
Secure Symbologies Labeling for Health Care Services RUG OF UTM Tier 2 |
2011 |
MEASURING AND ASSESSING LEVELS OF PUBLIC SECURITY AWARENESS RUG OF UTM Tier 2 |
2011 |
Software Ownership Verification Using Watermarking RUG OF UTM Tier 2 |
2011 |
Printed Document Integrity Verification System MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
2008 |
Provider Independent Crytographic Tools MINISTRY OF EDUCATION Short Term |
1998 |
Information Hiding Using Steganography MINISTRY OF EDUCATION Short Term |
1998 |
The Development of Attack Response Mechanism for Intrusion Detection System MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
1998 |
Parallel Compression System for Digital Non-Text Information (PCS) MINISTRY OF EDUCATION Short Term |
1996 |
Optimization of Computer Labs Usage in Schools : A Case Study of Smart -School MINISTRY OF EDUCATION Short Term |
1996 |
A Secure Transaction Framework For Client-Server Based E-Commerce MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
1996 |
Cryptography Techniques for Securing Non-Text Documents Short Term |
1996 |
Risk Analysis On Cyber Campus Modules Short Term |
1995 |
Extranet Dynamic Virtual Private Network (EDVPN) Short Term |
1995 |
Security Issues in Electronic Voting System (EVS) Short Term |
1995 |
An Internet Application Sistem Based On Internet Technology Using Netscape Suite Spot And Communitior Software Short Term |
1993 |
CD - Rom on Introduction to Computer Short Term |
1992 |
Perisian Bantuan Komputer. Short Term |
1990 |
The construction of technological computer-aided multi media software course MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund |
1986 |
The construction of year one computer-aided software system course. Short Term |
1985 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
Polychronicity Tendency-Based Online Behavioral Signature
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS Publication In Web Of Science CO-AUTHOR |
2019 |
Data Integrity Schemes For Outsourced Data On Untrusted Cloud Storage: A Review
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2018 |
Two-Stage Motion Artefact Reduction Algorithm For Electrocardiogram Using Weighted Adaptive Noise Cancelling And Recursive Hampel Filter
PLOS ONE Publication In Web Of Science CO-AUTHOR |
2018 |
Adaptive Resampling For Emergency Rescue Location: An Initial Concept
LECTURE NOTES IN ELECTRICAL ENGINEERING Publication In Scopus CO-AUTHOR |
2018 |
Fairness Of Channel Assignment Algorithm Based On Weighted Links Ranking Scheme For Wireless Mesh Network
PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING & MIS 2018 Publication In Scopus CO-AUTHOR |
2018 |
Rmeer: Reliable Multi-Path Energy Efficient Routing Protocol For Underwater Wireless Sensor Network
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (IJECE) Publication In Scopus UTM FIRST AUTHOR |
2018 |
Cbe2r: Clustered-Based Energy Efficient Routing Protocol For Underwater Wireless Sensor Network
INTERNATIONAL JOURNAL OF ELECTRONICS Publication In Scopus UTM FIRST AUTHOR |
2018 |
A Proposal Of Location Aware Shopping Assistance Using Memory-Based Resampling
LECTURE NOTES IN ELECTRICAL ENGINEERING Publication In Scopus CO-AUTHOR |
2018 |
Secure Authentication For Internet Environment Using Biometric And One-Time Password
INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS Proceedings UTM FIRST AUTHOR |
2017 |
Individual Difference For Hci Systems: Examining The Probability Of Thinking Style Signature In Online Interaction
PROCEEDINGS - 2016 4TH INTERNATIONAL CONFERENCE ON USER SCIENCE AND ENGINEERING, I-USER 2016 Publication In Scopus CO-AUTHOR |
2017 |
Itru: Ntru-Based Cryptosystem Using Ring Of Integers
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2017 |
Enhancing Eap-Tls Authentication Protocol For Ieee 802.11i
WIRELESS NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Routing Protocols For Underwater Wireless Sensor Networks Based On Data Forwarding: A Review
TELECOMMUNICATION SYSTEMS Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Routing Protocols Based On Node Mobility For Underwater Wireless Sensor Network (Uwsn): A Survey
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Routing Protocols For Underwater Wireless Sensor Network Based On Location: A Survey
AD HOC & SENSOR WIRELESS NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2017 |
Adaptive Memory Size Based Fuzzy Control For Mobile Pedestrian Navigation
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES Book Chapter CO-AUTHOR |
2017 |
Ntru Binary Polynomials Parameters Selection For Reduction Of Decryption Failure
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus UTM FIRST AUTHOR |
2017 |
Leveraging Human Thinking Style For User Attribution In Digital Forensic Process
INTERNATIONAL JOURNAL ON ADVANCED SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2017 |
Energy Efficient Routing Protocols For Uwsn: A Review
TELKOMNIKA Publication In Scopus UTM FIRST AUTHOR |
2017 |
Review On Localization Based Routing Protocols For Underwater Wireless Sensor Network
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2017 |
Identification Of Influential Parameters For Ntru Decryption Failure And Recommendation Of Extended Parameter Selection Criteria For Elimination Of Decryption Failure
IAENG INTERNATIONAL JOURNAL OF COMPUTER SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2017 |
Mini N-Th Degree Truncated Polynomial Ring (Mini-Ntru): A Simplified
Implementation Using Binary Polynomials
IEEE 8TH INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION (ICEED) Publication In Scopus UTM FIRST AUTHOR |
2017 |
Adaptive Special Strategies Resampling For Inertial-Based Mobile Indoor Positioning Systems: An Initial Proposal
INTERNATIONAL JOURNAL OF CONTROL AND AUTOMATION Publication In Scopus CO-AUTHOR |
2017 |
Adaptive Memory-Based Single Distribution Resampling For Particle Filter
JOURNAL OF BIG DATA Publication In Scopus CO-AUTHOR |
2017 |
High-Level Online User Attribution Model Based On Human Polychronic-Monochronic Tendency
2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING, BIGCOMP 2017 Publication In Scopus CO-AUTHOR |
2017 |
Motion Artifact Reduction Algorithm Using Sequential Adaptive Noise Filters And Estimation Methods For Mobile Ecg
2ND INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY (IRICT 2017) Conference Paper CO-AUTHOR |
2017 |
Utm E-Bookstore
UTM COMPUTING PROCEEDING: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATION Proceedings UTM FIRST AUTHOR |
2016 |
Secret Sharing Scheme Security And Performance Analysis
PROCEEDINGS - 2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING, ICCNEEE 2015 Publication In Scopus UTM FIRST AUTHOR |
2016 |
Localization Schemes In Underwater Sensor Network (Uwsn): A Survey
TELKOMNIKA INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2016 |
State-Of-The-Art In Privacy Preserved K-Anonymity Revisited
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2016 |
Observing Consistency In Online Communication Patterns For User Re-Identification
PLOS ONE Publication In Web Of Science CO-AUTHOR |
2016 |
An Innovative Privacy Preserving Technique For Incremental Datasets On Cloud Computing
JOURNAL OF BIOMEDICAL INFORMATICS Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
Feature Selection For Phishing Detection: A Review Of
Research
INT. J. INTELLIGENT SYSTEMS TECHNOLOGIES AND APPLICATIONS, VOL. 15, NO. 2, 2016 Publication In Scopus CO-AUTHOR |
2016 |
A Comprehensive Literature Review Of Asymmetric Key Cryptography Algorithms For Establishment Of The Existing Gap
2015 9TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE, MYSEC 2015 Publication In Scopus CO-AUTHOR |
2016 |
New Hybrid Features For Phish Website Prediction
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS Publication In Scopus CO-AUTHOR |
2016 |
Wavelet-Based Performance In Denoising Ecg Signal
ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES Publication In Scopus CO-AUTHOR |
2016 |
Critical Analysis Of Data Forwarding Routing Protocols Based On Single Path For Uwsn
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING Publication In Scopus UTM FIRST AUTHOR |
2016 |
Appropriate Lightweight Cryptosystems For Wireless Sensor Networks
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus UTM FIRST AUTHOR |
2016 |
Hybrid Features - Based Prediction For Novel Phish Websites
JOURNAL TEKNOLOGI UTM Publication In Scopus CO-AUTHOR |
2016 |
Review On Non-Cross-Layer Mobility And Time Delaying Routing Protocols For Underwater
Wireless Sensor Network
INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2016 |
Feature Selection For Phishing Detection: A Review Of Research
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS TECHNOLOGIES AND APPLICATIONS Publication In Scopus CO-AUTHOR |
2016 |
Understanding Online Behavior: Exploring The Probability Of Online Personality Trait Using Supervised Machine-Learning Approach
FRONTIERS IN ICT Journal Article Non Citation-Indexed CO-AUTHOR |
2016 |
Medical Image Dispersal Using Enhanced Secret Sharing Threshold Scheme
INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS AND MEDICAL SYSTEMS (HIMS2015) Conference Paper UTM FIRST AUTHOR |
2015 |
A Comprehensive Review On Privacy Preserving Data Mining
SPRINGERPLUS Publication In Scopus UTM FIRST AUTHOR |
2015 |
Deploying Cloud Computing Technology In E-Learning For Malaysian Polytechnic
JOURNAL OF NETWORK AND INNOVATIVE COMPUTING Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2015 |
Towards The Security Issues In Mobile Ad Hoc Networks
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN INFORMATION SECURITY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2015 |
Certificateless Public Key Cryptosystems For Mobile Ad Hoc Networks
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN SCIENCE, ENGINEERING AND TECHNOLOGY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2015 |
DIGITAL LOGIC LABORATORY MANUAL Modules / Manual CO-AUTHOR |
2015 |
DIGITAL LOGIC TEACHING MODULE Modules / Manual CO-AUTHOR |
2015 |
The Effect Of Feature Selection On Phish Website Detection An Empirical Study On Robust Feature Subset Selection For Effective Classification
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS Publication In Web Of Science CO-AUTHOR |
2015 |
Secure Identity-Based Cryptographic Schemes
SECURITY IN COMPUTING AND NETWORKING. PART II Book Chapter UTM FIRST AUTHOR |
2015 |
Ec Encryption Cbc Method Of Operation
SECURITY IN COMPUTING AND NETWORKING - PART I Book Chapter CO-AUTHOR |
2015 |
An Enhanced Certificateless Cryptosystem For Mobile Ad Hoc Networks
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus UTM FIRST AUTHOR |
2015 |
Jpeg Image Encryption With Elliptic Curve Cryptography
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CO-AUTHOR |
2015 |
Analysis And Comparison The Security And Performance Of Secret Sharing Schemes
ASIAN JOURNAL OF INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
State Of The Art Survey On Security Issue In Cloud Computing Architectures, Approaches And Methods
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
A Technique Of Data Privacy Preservation In Deploying Third Party Mining Tools Over The Cloud Using Svd And Lsa
RESEARCH JOURNAL OF APPLIED SCIENCES Publication In Scopus UTM FIRST AUTHOR |
2015 |
A General UserâS Perception And Security Awareness In Malaysian Polytechnic
PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING VOLUME Publication In Scopus UTM FIRST AUTHOR |
2015 |
On The Use Of Optimum Curves In Elliptic Curve Cryptography For Wireless Sensor Networks
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2015 |
An Improved Certificateless Public Key Authentication Scheme For Mobile Ad Hoc Networks Over Elliptic Curves
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Publication In Scopus UTM FIRST AUTHOR |
2015 |
Selection Of Robust Feature Subsets For Phish Webpage Prediction Using Maximum Relevance And Minimum Redundancy Criterion
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2015 |
A Survey Paper On Privacy Issue In Cloud Computing
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
Cloud Computing: A General Userã¢ÂÂS Perception And Security Awareness In Malaysian Polytechnic
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING VOLUME Publication In Scopus UTM FIRST AUTHOR |
2015 |
A Novel Authentication Scheme For Mobile Environments In The Context Of Elliptic Curve Cryptography
I4CT 2015 - 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY, ART PROCEEDING Publication In Scopus UTM FIRST AUTHOR |
2015 |
Preventing Collusion Attack In Android
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2015 |
A Review On Security Primitives In The Basis Of
Identity-Based Cryptosystems
INTERNATIONAL RESEARCH JOURNAL OF COMPUTER SCIENCE Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2015 |
Overview On Clouds@Home: Virtualization Mechanism For
Volunteer Computing
INTERNATIONAL CONFERENCE PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS,PDCS 2014 Proceedings UTM FIRST AUTHOR |
2014 |
Performance And Security Analysis For Proactive And
Reactive Protocols In Mobile Ad-Hoc Network
1ST INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY (IRICT 2014) Proceedings UTM FIRST AUTHOR |
2014 |
A Survey On Security Issue And Its Proposed Solutions In Cloud
Environment
1ST INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES Proceedings CO-AUTHOR |
2014 |
Efficient Underwater Rss Value To Distance Inversion Using The Lambert Function
MATHEMATICAL PROBLEMS IN ENGINEERING Publication In Web Of Science CO-AUTHOR |
2014 |
A Conceptual Model For Holistic Classification Of Insider
ASIAN JOURNAL OF APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2014 |
The Cost Of Virtualization Implementation In Volunteer Computing
I4CT 2014 - 1ST INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2014 |
Survey Of Anti-Phishing Tools With Detection Capabilities
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CO-AUTHOR |
2014 |
Biometric Encryption To Enhance Confidentiality In Cloud Computing
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST) Publication In Scopus UTM FIRST AUTHOR |
2014 |
Prime Order Elliptic Curve Generation Methods: A Review
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA Publication In Scopus CO-AUTHOR |
2014 |
Pixel-Based Dispersal Scheme For Medical Image Survivability And Confidentiality
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST) Publication In Scopus UTM FIRST AUTHOR |
2014 |
A Psychographic Framework For Online User Identification
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014 Publication In Scopus CO-AUTHOR |
2014 |
A Survey On Mitigating Attacks Related To Shortcomings Of Android Permission Framework
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2013 |
The Impact Of E-Learning In Workplace: Focus On Organizations And Healthcare Environments
INTERNATIONAL ARAB JOURNAL OF E-TECHNOLOGY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2012 |
Knowledge Sharing In Workplace: Motivators And Demotivators
INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2011 |
Challenges Of E-Learing In Nigerian University Education Based On The Experience Of Developed Countries
INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2011 |
Spatial Resource Analysis Of Two Dimensional Barcodes
5th Inter. Conference on Innovations in Information Technology Conference Paper INDIVIDUAL AUTHOR |
2008 |
Uncovering Anomaly Traffic Based On Traffic Features
Postgraduate Annual Research Seminar (PARS¿ 07). Conference Paper INDIVIDUAL AUTHOR |
2007 |
The Sign Tale Of Hurst Parameter: A Revisit
Proceedings of International Conference on Convergence Information Technology Conference Paper INDIVIDUAL AUTHOR |
2007 |
The Sign Tale Of Hurst Parameter: A Revisit
Proceedings of International Conference on Convergence Information Technology Conference Paper INDIVIDUAL AUTHOR |
2007 |
Image Encryption Algorithm Based On Chaotic Mapping
JURNAL TEKNOLOGI Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2003 |
Legend : IP CATEGORY IP LEVEL
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
IKUESAN RICHARD ADEYEMI ONLINE PSYCHOGRAPHIC MODEL FOR INSIDER IDENTIFICATION PHD GRADUATED CO-SUPERVISOR 2015 |
YOUSRA ABDUL ALSAHIB S.ALDEEN HEURISTIC BASED PRIVACY PRESERVATION TECHNIQUE FOR DATA PUBLICATION IN CLOUD COMPUTING ENVIRONMENT PHD GRADUATED SUPERVISOR 2016 |
HIBA ZUHAIR ZEYDAN PHISH WEBSITE DETECTION MODEL USING HYBRID MACHINE LEARNING AND RECURSIVE FEATURE SUBSET SELECTION ALGORITHMS PHD GRADUATED CO-SUPERVISOR 2016 |
MUKHTIAR AHMED LINK QUALITY MULTIPATH BASED ROUTING SCHEME FOR UNDERWATER WIRELESS SENSOR NETWORK PHD GRADUATED SUPERVISOR 2017 |
JULIET NYOKABI GAITHURU ENHANCEMENT OF NTH DEGREE TRUNCATED POLYNOMIAL RING FOR IMPROVING DECRYPTION FAILURE PHD GRADUATED SUPERVISOR 2018 |
CHONG SAU WEI MASTER ON GOING SUPERVISOR |
MOJTABA ALIZADEH A SECURE AND ANONYMOUS AUTHENTICATION SCHEME FOR SEAMLESS HANDOVER IN PROXY MOBILE IPV6 NETWORKS MASTER GRADUATED SUPERVISOR 2012 |
NURUL BADRIAH BINTI ABU BAKAR ROBUST RECURSIVE WATERMARKING TECHNIQUE IN DISCRETE WAVELET TRANSFORM MASTER GRADUATED SUPERVISOR 2013 |
MOHAMMADFAZEL ANJOMSHOA MASTER GRADUATED SUPERVISOR 2013 |
SOGAND GHORBANI MASTER GRADUATED SUPERVISOR 2013 |
NELMIAWATI MASTER GRADUATED SUPERVISOR 2014 |
MALEK NAJIB ABDULKAREM OMAR MASTER GRADUATED SUPERVISOR 2014 |
SHABNAM KASRA KERMANSHAHI A NOVEL PAIRING-FREE CERTIFICATELESS CRYPTOSYSTEM FOR MOBILE ADHOC NETWORKS MASTER GRADUATED SUPERVISOR 2014 |
YASIR ALI PANHWER MASTER GRADUATED SUPERVISOR 2018 |