GRANT(PI & MEMBERS)

39

PUBLICATIONS

86

INDEXED PUBLICATION

56

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

NATIONAL GRANTS
3
UNIVERSITY FUND
6
TOTAL

Publications

INDEXED PUBLICATION
56
NON-INDEXED PUBLICATION
14
OTHERS PUBLICATION
16
TOTAL

Supervisions

MASTER
11
PHD
11
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
STUDY ON THE IMPACT OF MOBILE APPLICATIONS IN QUIT SMOKING PROGRAM
RUG OF UTM Tier 1
2016
Development of flash flood detection using distributed radio sensor network for urban areas
MINISTRY OF EDUCATION Prototype Development Research Grant Scheme
2016
GPU-BASED SEGMENTATION FOR MEDICAL IMAGES.
RUG OF UTM Tier 2
2016
Prototype of Android 6.0 Indoor Tracking Systems based on Intelligent Fusion WiFi/IMU Signals
RUG OF UTM Tier 1
2016
Crowdfunding Platform as a Tool to Enable Public and Industry Engagement in Academia Research
RUG OF UTM UTMShine
2016
New Access Control Mechanism Based on Palm Biometrics Authentication for Users Cardio Information
MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme
2016
Reliable Data Transmission of De-noised Wavelet Cardio Data over Wireless Mesh Network
MINISTRY OF EDUCATION Transdiscplinary Research Grant Scheme
2016
INTEGRATED SENSOR NETWORK AND ACTIVE RFIDS FOR DYNAMIC BUILDING EVACUATION
RUG OF UTM Tier 1
2015
Energy-aware reliable inferencing algorithm for localisation in wireless sensor networks inspired by human brain connectome
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
Identification of True Identity of Online Users based on Human Intrinsic Characteristics for Cyber crime Investigation
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
EXPLORATORY ON THE SUITABILITY AND EFFICIENCY OF FRIENDSHIP MECHANISM IN MINIMIZING THE IMPACT OF FAKE BROADCAST MESSAGES IN CIVILIANS NETWORKS
RUG OF UTM Tier 1
2015
Fundamental Study of Enhancing the Accuracy of Signal Analysis in Electrocardiogram(ECG)
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2014
SECURE INFORMATION DISSEMINATION AND NOTIFICATION SYSTEM FOR DIGITAL CAMPUS
RUG OF UTM Flagship-Research Group
2014
UNATTENDED BUILDING INHABITANTS CONTROL USING WIRELESS SENSOR NETWORKS IN DISASTER MONITORING
RUG OF UTM Encouragement Grant
2014
Hybridizing Rabin-Shamir Secret Sharing for Data Confidentiality and Integrity in Cloud Computing
MINISTRY OF EDUCATION Exploratory Research Grant Scheme
2013
FRIENDSHIP MECHANISM DISASTER ALERT SYSTEM ON MULTI MEDIUM SOCIAL NETWORK
RUG OF UTM Flagship
2013
A New Technique for Maximizing Key Space of Elliptic Curve Cryptography
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2013
Secure Symbologies Labeling for Health Care Services
RUG OF UTM Tier 2
2011
MEASURING AND ASSESSING LEVELS OF PUBLIC SECURITY AWARENESS
RUG OF UTM Tier 2
2011
Software Ownership Verification Using Watermarking
RUG OF UTM Tier 2
2011
Printed Document Integrity Verification System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2008
Provider Independent Crytographic Tools
MINISTRY OF EDUCATION Short Term
1998
Information Hiding Using Steganography
MINISTRY OF EDUCATION Short Term
1998
The Development of Attack Response Mechanism for Intrusion Detection System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1998
Parallel Compression System for Digital Non-Text Information (PCS)
MINISTRY OF EDUCATION Short Term
1996
Optimization of Computer Labs Usage in Schools : A Case Study of Smart -School
MINISTRY OF EDUCATION Short Term
1996
A Secure Transaction Framework For Client-Server Based E-Commerce
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1996
Cryptography Techniques for Securing Non-Text Documents
Short Term
1996
Risk Analysis On Cyber Campus Modules
Short Term
1995
Extranet Dynamic Virtual Private Network (EDVPN)
Short Term
1995
Security Issues in Electronic Voting System (EVS)
Short Term
1995
An Internet Application Sistem Based On Internet Technology Using Netscape Suite Spot And Communitior Software
Short Term
1993
CD - Rom on Introduction to Computer
Short Term
1992
Perisian Bantuan Komputer.
Short Term
1990
The construction of technological computer-aided multi media software course
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1986
The construction of year one computer-aided software system course.
Short Term
1985

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Polychronicity Tendency-Based Online Behavioral Signature
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS
Publication In Web Of Science CO-AUTHOR
2019
Data Integrity Schemes For Outsourced Data On Untrusted Cloud Storage: A Review
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2018
Two-Stage Motion Artefact Reduction Algorithm For Electrocardiogram Using Weighted Adaptive Noise Cancelling And Recursive Hampel Filter
PLOS ONE
Publication In Web Of Science CO-AUTHOR
2018
Adaptive Resampling For Emergency Rescue Location: An Initial Concept
LECTURE NOTES IN ELECTRICAL ENGINEERING
Publication In Scopus CO-AUTHOR
2018
Fairness Of Channel Assignment Algorithm Based On Weighted Links Ranking Scheme For Wireless Mesh Network
PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING & MIS 2018
Publication In Scopus CO-AUTHOR
2018
Rmeer: Reliable Multi-Path Energy Efficient Routing Protocol For Underwater Wireless Sensor Network
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (IJECE)
Publication In Scopus UTM FIRST AUTHOR
2018
Cbe2r: Clustered-Based Energy Efficient Routing Protocol For Underwater Wireless Sensor Network
INTERNATIONAL JOURNAL OF ELECTRONICS
Publication In Scopus UTM FIRST AUTHOR
2018
A Proposal Of Location Aware Shopping Assistance Using Memory-Based Resampling
LECTURE NOTES IN ELECTRICAL ENGINEERING
Publication In Scopus CO-AUTHOR
2018
Secure Authentication For Internet Environment Using Biometric And One-Time Password
INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATIONS
Proceedings UTM FIRST AUTHOR
2017
Individual Difference For Hci Systems: Examining The Probability Of Thinking Style Signature In Online Interaction
PROCEEDINGS - 2016 4TH INTERNATIONAL CONFERENCE ON USER SCIENCE AND ENGINEERING, I-USER 2016
Publication In Scopus CO-AUTHOR
2017
Itru: Ntru-Based Cryptosystem Using Ring Of Integers
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2017
Enhancing Eap-Tls Authentication Protocol For Ieee 802.11i
WIRELESS NETWORKS
Publication In Web Of Science UTM FIRST AUTHOR
2017
Routing Protocols For Underwater Wireless Sensor Networks Based On Data Forwarding: A Review
TELECOMMUNICATION SYSTEMS
Publication In Web Of Science UTM FIRST AUTHOR
2017
Routing Protocols Based On Node Mobility For Underwater Wireless Sensor Network (Uwsn): A Survey
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2017
Routing Protocols For Underwater Wireless Sensor Network Based On Location: A Survey
AD HOC & SENSOR WIRELESS NETWORKS
Publication In Web Of Science UTM FIRST AUTHOR
2017
Adaptive Memory Size Based Fuzzy Control For Mobile Pedestrian Navigation
LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES
Book Chapter CO-AUTHOR
2017
Ntru Binary Polynomials Parameters Selection For Reduction Of Decryption Failure
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING
Publication In Scopus UTM FIRST AUTHOR
2017
Leveraging Human Thinking Style For User Attribution In Digital Forensic Process
INTERNATIONAL JOURNAL ON ADVANCED SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2017
Energy Efficient Routing Protocols For Uwsn: A Review
TELKOMNIKA
Publication In Scopus UTM FIRST AUTHOR
2017
Review On Localization Based Routing Protocols For Underwater Wireless Sensor Network
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2017
Identification Of Influential Parameters For Ntru Decryption Failure And Recommendation Of Extended Parameter Selection Criteria For Elimination Of Decryption Failure
IAENG INTERNATIONAL JOURNAL OF COMPUTER SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2017
Mini N-Th Degree Truncated Polynomial Ring (Mini-Ntru): A Simplified Implementation Using Binary Polynomials
IEEE 8TH INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION (ICEED)
Publication In Scopus UTM FIRST AUTHOR
2017
Adaptive Special Strategies Resampling For Inertial-Based Mobile Indoor Positioning Systems: An Initial Proposal
INTERNATIONAL JOURNAL OF CONTROL AND AUTOMATION
Publication In Scopus CO-AUTHOR
2017
Adaptive Memory-Based Single Distribution Resampling For Particle Filter
JOURNAL OF BIG DATA
Publication In Scopus CO-AUTHOR
2017
High-Level Online User Attribution Model Based On Human Polychronic-Monochronic Tendency
2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING, BIGCOMP 2017
Publication In Scopus CO-AUTHOR
2017
Motion Artifact Reduction Algorithm Using Sequential Adaptive Noise Filters And Estimation Methods For Mobile Ecg
2ND INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY (IRICT 2017)
Conference Paper CO-AUTHOR
2017
Utm E-Bookstore
UTM COMPUTING PROCEEDING: INNOVATIONS IN COMPUTING TECHNOLOGY AND APPLICATION
Proceedings UTM FIRST AUTHOR
2016
Secret Sharing Scheme Security And Performance Analysis
PROCEEDINGS - 2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING, ICCNEEE 2015
Publication In Scopus UTM FIRST AUTHOR
2016
Localization Schemes In Underwater Sensor Network (Uwsn): A Survey
TELKOMNIKA INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2016
State-Of-The-Art In Privacy Preserved K-Anonymity Revisited
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2016
Observing Consistency In Online Communication Patterns For User Re-Identification
PLOS ONE
Publication In Web Of Science CO-AUTHOR
2016
An Innovative Privacy Preserving Technique For Incremental Datasets On Cloud Computing
JOURNAL OF BIOMEDICAL INFORMATICS
Publication In Web Of Science UTM FIRST AUTHOR
2016
Feature Selection For Phishing Detection: A Review Of Research
INT. J. INTELLIGENT SYSTEMS TECHNOLOGIES AND APPLICATIONS, VOL. 15, NO. 2, 2016
Publication In Scopus CO-AUTHOR
2016
A Comprehensive Literature Review Of Asymmetric Key Cryptography Algorithms For Establishment Of The Existing Gap
2015 9TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE, MYSEC 2015
Publication In Scopus CO-AUTHOR
2016
New Hybrid Features For Phish Website Prediction
INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING AND ITS APPLICATIONS
Publication In Scopus CO-AUTHOR
2016
Wavelet-Based Performance In Denoising Ecg Signal
ACM INTERNATIONAL CONFERENCE PROCEEDING SERIES
Publication In Scopus CO-AUTHOR
2016
Critical Analysis Of Data Forwarding Routing Protocols Based On Single Path For Uwsn
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2016
Appropriate Lightweight Cryptosystems For Wireless Sensor Networks
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus UTM FIRST AUTHOR
2016
Hybrid Features - Based Prediction For Novel Phish Websites
JOURNAL TEKNOLOGI UTM
Publication In Scopus CO-AUTHOR
2016
Review On Non-Cross-Layer Mobility And Time Delaying Routing Protocols For Underwater Wireless Sensor Network
INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2016
Feature Selection For Phishing Detection: A Review Of Research
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS TECHNOLOGIES AND APPLICATIONS
Publication In Scopus CO-AUTHOR
2016
Understanding Online Behavior: Exploring The Probability Of Online Personality Trait Using Supervised Machine-Learning Approach
FRONTIERS IN ICT
Journal Article Non Citation-Indexed CO-AUTHOR
2016
Medical Image Dispersal Using Enhanced Secret Sharing Threshold Scheme
INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS AND MEDICAL SYSTEMS (HIMS2015)
Conference Paper UTM FIRST AUTHOR
2015
A Comprehensive Review On Privacy Preserving Data Mining
SPRINGERPLUS
Publication In Scopus UTM FIRST AUTHOR
2015
Deploying Cloud Computing Technology In E-Learning For Malaysian Polytechnic
JOURNAL OF NETWORK AND INNOVATIVE COMPUTING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2015
Towards The Security Issues In Mobile Ad Hoc Networks
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN INFORMATION SECURITY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2015
Certificateless Public Key Cryptosystems For Mobile Ad Hoc Networks
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN SCIENCE, ENGINEERING AND TECHNOLOGY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2015

DIGITAL LOGIC LABORATORY MANUAL
Modules / Manual CO-AUTHOR
2015

DIGITAL LOGIC TEACHING MODULE
Modules / Manual CO-AUTHOR
2015
The Effect Of Feature Selection On Phish Website Detection An Empirical Study On Robust Feature Subset Selection For Effective Classification
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
Publication In Web Of Science CO-AUTHOR
2015
Secure Identity-Based Cryptographic Schemes
SECURITY IN COMPUTING AND NETWORKING. PART II
Book Chapter UTM FIRST AUTHOR
2015
Ec Encryption Cbc Method Of Operation
SECURITY IN COMPUTING AND NETWORKING - PART I
Book Chapter CO-AUTHOR
2015
An Enhanced Certificateless Cryptosystem For Mobile Ad Hoc Networks
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus UTM FIRST AUTHOR
2015
Jpeg Image Encryption With Elliptic Curve Cryptography
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus CO-AUTHOR
2015
Analysis And Comparison The Security And Performance Of Secret Sharing Schemes
ASIAN JOURNAL OF INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
State Of The Art Survey On Security Issue In Cloud Computing Architectures, Approaches And Methods
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
A Technique Of Data Privacy Preservation In Deploying Third Party Mining Tools Over The Cloud Using Svd And Lsa
RESEARCH JOURNAL OF APPLIED SCIENCES
Publication In Scopus UTM FIRST AUTHOR
2015
A General User’S Perception And Security Awareness In Malaysian Polytechnic
PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING VOLUME
Publication In Scopus UTM FIRST AUTHOR
2015
On The Use Of Optimum Curves In Elliptic Curve Cryptography For Wireless Sensor Networks
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2015
An Improved Certificateless Public Key Authentication Scheme For Mobile Ad Hoc Networks Over Elliptic Curves
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING
Publication In Scopus UTM FIRST AUTHOR
2015
Selection Of Robust Feature Subsets For Phish Webpage Prediction Using Maximum Relevance And Minimum Redundancy Criterion
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2015
A Survey Paper On Privacy Issue In Cloud Computing
RESEARCH JOURNAL OF APPLIED SCIENCES, ENGINEERING AND TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
Cloud Computing: A General Userã¢Â€Â™S Perception And Security Awareness In Malaysian Polytechnic
ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING VOLUME
Publication In Scopus UTM FIRST AUTHOR
2015
A Novel Authentication Scheme For Mobile Environments In The Context Of Elliptic Curve Cryptography
I4CT 2015 - 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY, ART PROCEEDING
Publication In Scopus UTM FIRST AUTHOR
2015
Preventing Collusion Attack In Android
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2015
A Review On Security Primitives In The Basis Of Identity-Based Cryptosystems
INTERNATIONAL RESEARCH JOURNAL OF COMPUTER SCIENCE
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2015
Overview On Clouds@Home: Virtualization Mechanism For Volunteer Computing
INTERNATIONAL CONFERENCE PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS,PDCS 2014
Proceedings UTM FIRST AUTHOR
2014
Performance And Security Analysis For Proactive And Reactive Protocols In Mobile Ad-Hoc Network
1ST INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY (IRICT 2014)
Proceedings UTM FIRST AUTHOR
2014
A Survey On Security Issue And Its Proposed Solutions In Cloud Environment
1ST INTERNATIONAL CONFERENCE OF RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES
Proceedings CO-AUTHOR
2014
Efficient Underwater Rss Value To Distance Inversion Using The Lambert Function
MATHEMATICAL PROBLEMS IN ENGINEERING
Publication In Web Of Science CO-AUTHOR
2014
A Conceptual Model For Holistic Classification Of Insider
ASIAN JOURNAL OF APPLIED SCIENCES
Publication In Scopus CO-AUTHOR
2014
The Cost Of Virtualization Implementation In Volunteer Computing
I4CT 2014 - 1ST INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2014
Survey Of Anti-Phishing Tools With Detection Capabilities
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus CO-AUTHOR
2014
Biometric Encryption To Enhance Confidentiality In Cloud Computing
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST)
Publication In Scopus UTM FIRST AUTHOR
2014
Prime Order Elliptic Curve Generation Methods: A Review
INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA
Publication In Scopus CO-AUTHOR
2014
Pixel-Based Dispersal Scheme For Medical Image Survivability And Confidentiality
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST)
Publication In Scopus UTM FIRST AUTHOR
2014
A Psychographic Framework For Online User Identification
PROCEEDINGS - 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, ISBAST 2014
Publication In Scopus CO-AUTHOR
2014
A Survey On Mitigating Attacks Related To Shortcomings Of Android Permission Framework
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2013
The Impact Of E-Learning In Workplace: Focus On Organizations And Healthcare Environments
INTERNATIONAL ARAB JOURNAL OF E-TECHNOLOGY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2012
Knowledge Sharing In Workplace: Motivators And Demotivators
INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2011
Challenges Of E-Learing In Nigerian University Education Based On The Experience Of Developed Countries
INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2011
Spatial Resource Analysis Of Two Dimensional Barcodes
5th Inter. Conference on Innovations in Information Technology
Conference Paper INDIVIDUAL AUTHOR
2008
Uncovering Anomaly Traffic Based On Traffic Features
Postgraduate Annual Research Seminar (PARS¿ 07).
Conference Paper INDIVIDUAL AUTHOR
2007
The Sign Tale Of Hurst Parameter: A Revisit
Proceedings of International Conference on Convergence Information Technology
Conference Paper INDIVIDUAL AUTHOR
2007
The Sign Tale Of Hurst Parameter: A Revisit
Proceedings of International Conference on Convergence Information Technology
Conference Paper INDIVIDUAL AUTHOR
2007
Image Encryption Algorithm Based On Chaotic Mapping
JURNAL TEKNOLOGI
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2003

Legend : IP CATEGORY IP LEVEL

Intellectual Property Name Grant Register No. IP Level IP Category
MICROWAVE HAIRPIN FILTER WITH REDUCED HARMONIC NATIONAL PATENT
METHOD OF MINIATURISING AND DUAL-BANDING A RADIATING DEVICE NATIONAL PATENT
COMPACT DUAL-BAND PERTURBED PRINTED LOW-PROFILE ANTENNA NATIONAL PATENT
MINIATURIZED TWO-WAY CENTRAL-SLIT MEANDER-COUPLED WILKINSON POWER DIVIDER OPERATING AT 3 GHZ NATIONAL PATENT
IMPROVED NTRU INVERSE ALGORITHM USING PSEUDO-INVERSE FOR LEAST SQUARES SOLUTION LY2018006178 NATIONAL COPYRIGHT
MODULAR PROVABLE DATA POSSESSION (MPDP) BASED ON ALGEBRAIC SIGNATURE AND LINKED LIST FOR DYNAMIC DATA ON CLOUD LY2018006177 NATIONAL COPYRIGHT
UTFCBE INSTRUMENT FOR CALCULATING TRUST FACTORS OF CLOUD-BASED E-LEARNING LY2018006163 NATIONAL COPYRIGHT
LINK QUALITY MULTIPATH BASED ON ROUTING SCHEME FOR UNDERWATER WIRELESS SENSOR NETWORK LQMBR LY2018002035 NATIONAL COPYRIGHT
INCREMENTAL ANONYMIZATION TECHNIQUE LY2017005577 NATIONAL COPYRIGHT
HYBRID K-ANONYMITY DATA RELOCATION TECHNIQUE LY2017005576 NATIONAL COPYRIGHT
HEURISTIC K-ANONYMITY TECHNIQUE LY2017004324 NATIONAL COPYRIGHT
A LIGHTWEIGHT AUTHENTICATION SCHEME WITHOUT CERTIFICATES FOR MOBILE AD-HOC NETWORKS NATIONAL COPYRIGHT
AN IMPROVED PUBLIC KEY AUTHENTICATION PROTOCOL FOR MOBILE AD HOC NETWORKS NATIONAL COPYRIGHT
A PROVABLY SECURE CRYTOGRAPHIC SCHEME WITHOUT CERTIFICATES FOR RESOURCE CONSTRAINED ENVIRONMENTS NATIONAL COPYRIGHT
SALTED AND UNSALTED PIXEL-BASED DISPERSAL SCHEME FOR MEDICAL IMAGE NATIONAL COPYRIGHT
DISASTER ALERT SYSTEM-MALAYSIA (DAS-MALAYSIA) NATIONAL COPYRIGHT
WORKLOAD MANAGEMENT METHOD IN VIRTUALIZED GRID ENVIRONMENT NATIONAL COPYRIGHT
A SYSTEM VIRTUAL MACHINE IN GRID ENVIRONMENT NATIONAL COPYRIGHT
DS-VBF: DUAL SINK VECTOR-BASED ROUTING PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORK NATIONAL COPYRIGHT
TOWARD A VOLUNTEER CLOUD: PROPOSING CLOUDS@HOME ARCHITECTURE NATIONAL COPYRIGHT
CIRCULAR SENSOR NODE ARRAY (CSA) ALGORITHM FOR COORDINATING SENSOR NODE IN WIRELESS SENSOR NETWORKS (WSNS) : SOURCE CODE FOR GENERATING RADIATION BEAMPATTERN FOR UNIFORM CIRCULAR ANTENNA ARRAY (UCA) AND CIRCULAR SENSOR NODE ARRAY ( CSA) ( MATLAB CODE) NATIONAL COPYRIGHT
CIRCULAR SENSOR NODE ARRAY (CSA) ALGORITHM FOR COODINATING SENSOR NODE IN WIRELESS SENSOR NETWORK (WSNS): SOURCE CODE FOR CONSTRUCTING UNIFORM CIRCULAR ANTENNA ARRAY (UCA) AND CIRCULAR SENSOR NODE ARRAY (CSA) (MATLAB CODE) NATIONAL COPYRIGHT
LINE-FITTING LINEAR SENSOR NODE ARRAY (LFA) ALGORITHM FOR COORDINATING SENSOR NODE IN WIRELESS SENSOR NETWORKS (WSNS): SOURCE CODE FOR CONSTRUCTING LINE FITTING LINEAR SENSOR NODE ARRAY (LFA) (MATLAB CODE) NATIONAL COPYRIGHT
LINE FITTING LINEAR SENSOR NODE ARRAY(LFA) ALGORITHM FOR COORDINATING SENSOR NODE IN WIRELESS SENSOR NETWORKS (WSNS) : SOURCE CODE FOR CONSTRUCTING LEAST SQUARE LINE FITTING AND UNIFORM LINEAR ARRAY NATIONAL COPYRIGHT
SPEEDY PARTICLE SWARM OPTIMIZATION (SPSO) ALGORITHM ON MULTI-OBJECTIVE LINEAR ANTENNA ARRAY (LAA): SOURCE CODE FOR GLOBAL CONSTRAINT BOUNDARIES VARIABLES (MATLAB CODE) NATIONAL COPYRIGHT
SPEEDY PARTICLE SWARM OPTIMIZATION (SPSO) ALGORITHM ON MULTI-OBJECTIVE LINEAR ANTENNA ARRAY (LAA): SOURCE CODE FOR PARTICLE'S POSITION AND VELOCITY REINITIALIZATION (MATLAB CODE) NATIONAL COPYRIGHT

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
IKUESAN RICHARD ADEYEMI
ONLINE PSYCHOGRAPHIC MODEL FOR INSIDER IDENTIFICATION
PHD GRADUATED CO-SUPERVISOR 2015
YOUSRA ABDUL ALSAHIB S.ALDEEN
HEURISTIC BASED PRIVACY PRESERVATION TECHNIQUE FOR DATA PUBLICATION IN CLOUD COMPUTING ENVIRONMENT
PHD GRADUATED SUPERVISOR 2016
HIBA ZUHAIR ZEYDAN
PHISH WEBSITE DETECTION MODEL USING HYBRID MACHINE LEARNING AND RECURSIVE FEATURE SUBSET SELECTION ALGORITHMS
PHD GRADUATED CO-SUPERVISOR 2016
MUKHTIAR AHMED
LINK QUALITY MULTIPATH BASED ROUTING SCHEME FOR UNDERWATER WIRELESS SENSOR NETWORK
PHD GRADUATED SUPERVISOR 2017
JULIET NYOKABI GAITHURU
ENHANCEMENT OF NTH DEGREE TRUNCATED POLYNOMIAL RING FOR IMPROVING DECRYPTION FAILURE
PHD GRADUATED SUPERVISOR 2018
CHONG SAU WEI

MASTER ON GOING SUPERVISOR
MOJTABA ALIZADEH
A SECURE AND ANONYMOUS AUTHENTICATION SCHEME FOR SEAMLESS HANDOVER IN PROXY MOBILE IPV6 NETWORKS
MASTER GRADUATED SUPERVISOR 2012
NURUL BADRIAH BINTI ABU BAKAR
ROBUST RECURSIVE WATERMARKING TECHNIQUE IN DISCRETE WAVELET TRANSFORM
MASTER GRADUATED SUPERVISOR 2013
MOHAMMADFAZEL ANJOMSHOA

MASTER GRADUATED SUPERVISOR 2013
SOGAND GHORBANI

MASTER GRADUATED SUPERVISOR 2013
NELMIAWATI

MASTER GRADUATED SUPERVISOR 2014
MALEK NAJIB ABDULKAREM OMAR

MASTER GRADUATED SUPERVISOR 2014
SHABNAM KASRA KERMANSHAHI
A NOVEL PAIRING-FREE CERTIFICATELESS CRYPTOSYSTEM FOR MOBILE ADHOC NETWORKS
MASTER GRADUATED SUPERVISOR 2014
YASIR ALI PANHWER

MASTER GRADUATED SUPERVISOR 2018