GRANT(PI & MEMBERS)
PUBLICATIONS
INDEXED PUBLICATION
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
NATIONAL GRANTS
2
UNIVERSITY FUND
3
TOTAL
Publications
INDEXED PUBLICATION
14
NON-INDEXED PUBLICATION
0
OTHERS PUBLICATION
4
TOTAL
Supervisions
MASTER
3
PHD
4
TOTAL
Legend : SPONSOR TYPE OF GRANT
| Grant Name | Year |
|---|---|
| DEVELOPMENT OF HARDWARE SENSOR FOR NETWORK MONITORING AND DETECTION OF INTERNET-OF-THINGS MALWARE THREATS Prototype Development Research Grant Scheme |
2019 |
| UTM-TDR 5.4 (T1) Unstructured Data Analytics for Threat Intelligence RUG OF UTM UTM Transdiciplinary Research Grant |
2018 |
| Autonomous Drone Surveillance System (Jaga.Drone) GUP GRANT Prototype Development Fund |
2018 |
| EYENOON SWITCH: INTERNET FILTERING AND MONITORING SYSTEM RUG OF UTM Prototype Development Fund |
2018 |
| Fraudulent Websites Detection System RUG OF UTM High Impact Research Grant |
2018 |
| TEXT STEMMER WITH NORMALIZATION TECHNIQUES FOR NOISY TEXTS IN MALAY LANGUAGE RUG OF UTM Tier 1 |
2018 |
| Strategy Cyber Threat Intelligence CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency |
2017 |
| Exploiting Ad-Banner for the Detection of Malvertising RUG OF UTM Tier 1 |
2017 |
| Development of flash flood detection using distributed radio sensor network for urban areas Prototype Development Research Grant Scheme |
2016 |
| Automated Prediction system for Detecting Business Scams and Frauds Websites CYBERSECURITY MALAYSIA AN AGENCY UNDER MOSTI Non Goverment Agency |
2016 |
| Energy-aware reliable inferencing algorithm for localisation in wireless sensor networks inspired by human brain connectome Fundamental Research Grant Scheme |
2015 |
| Trustworthiness Assessment Algorithm based on Temporal and Spatial Properties of Mobility Data in Ephemeral Network Fundamental Research Grant Scheme |
2015 |
| The Development of Switch-Based Web Content Filtering System and Usage Trend Analysis Dashboard Prototype Development Research Grant Scheme |
2015 |
| Disaster relief and preparedness : Aerial Disaster Site Surveying System through the use of a middleware for integrating web interface, mobile app, and air drones. Prototype Development Research Grant Scheme |
2015 |
| Early Flood Detection: Developing Long-range, Auto Rechargeable Radio Sensor Network Prototype Development Research Grant Scheme |
2015 |
| Multi-platform Framework and Middleware for Data Aggregation RUG OF UTM Flagship |
2014 |
| A STEALTHY TECHNIQUE FOR CAPTURING MALWARE'S USER MODE API CALL SEQUENCE RUG OF UTM Geran Penyelidik Baharu |
2014 |
| SECURE INFORMATION DISSEMINATION AND NOTIFICATION SYSTEM FOR DIGITAL CAMPUS RUG OF UTM Flagship-Research Group |
2014 |
| Integrated backup and Recovery System RUG OF UTM Flagship-Research Group |
2014 |
| ENHANCED MALAY WORD STEMMING ALGORITHMS AND COMMON WORD REMOVAL FOR SLANG WORDS IN MALAY ILLICIT WEB CONTENTS RUG OF UTM Tier 1 |
2014 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
| Publication Name | Year |
|---|---|
|
Redundancy Coefficient Gradual Up-Weighting-Based Mutual Information Feature Selection Technique For Crypto-Ransomware Early Detection
FUTURE GENERATION COMPUTER SYSTEMS Publication In Web Of Science CO-AUTHOR |
2021 |
|
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme For Vehicular Ad Hoc Network: A Context-Aware Approach
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2020 |
|
A Pseudo Feedback-Based Annotated Tf-Idf Technique For Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation And Features Extraction
IEEE ACCESS Publication In Web Of Science CO-AUTHOR |
2020 |
|
An Optimized Skin Texture Model Using Gray-Level Co-Occurrence Matrix
NEURAL COMPUTING AND APPLICATIONS Publication In Web Of Science CO-AUTHOR |
2019 |
|
Crypto-Ransomware Early Detection Model Using Novel Incremental Bagging With Enhanced Semi-Random Subspace Selection
FUTURE GENERATION COMPUTER SYSTEMS Publication In Web Of Science CO-AUTHOR |
2019 |
|
Ransomware Threat Success Factors, Taxonomy, And Countermeasures: A Survey And Research Directions
COMPUTERS & SECURITY Publication In Web Of Science CO-AUTHOR |
2018 |
|
Zero-Day Aware Decision Fusion-Based Model For Crypto-Ransomware Early Detection
INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING (IJIE) Publication In Scopus CO-AUTHOR |
2018 |
|
The Approaches To Quantify Web Application Security Scanners Quality: A Review
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER RESEARCH Publication In Scopus CO-AUTHOR |
2018 |
|
A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework
2ND INTERNATIONAL CONFERENCE OF RELIABLE INFORMATION AND COMMUNICATION TECHNOLOGY (IRICT 2017) Conference Paper CO-AUTHOR |
2017 |
|
A Hybrid Color Space For Skin Recognition For Real-Time Applications
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE Publication In Scopus CO-AUTHOR |
2017 |
|
ACADEMIC HANDBOOK UNDERGRADUATE 2016/2017 Modules / Manual CO-AUTHOR |
2016 |
|
A Subset Feature Elimination Mechanism For Intrusion Detection System
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS Publication In Web Of Science UTM FIRST AUTHOR |
2016 |
|
In Memory Detection Of Windows Api Call Hooking Technique
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015 Publication In Scopus CORRESPONDING AUTHOR |
2015 |
|
Virus Lesap Wang
DEWAN MASYARAKAT Article In Mass Media CORRESPONDING AUTHOR |
2015 |
|
Review On Sql Injection Protection Methods And Tools
JURNAL TEKNOLOGI Publication In Scopus CO-AUTHOR |
2015 |
|
Malware Behaviour Visualization
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING) Publication In Scopus CORRESPONDING AUTHOR |
2014 |
|
Malware Behavior Image For
Malware Variant Identification
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST) Publication In Scopus CORRESPONDING AUTHOR |
2014 |
|
Introduction To Malware Reverse Engineering
Issues in Computer Security & Networking, Part 1 Book Chapter INDIVIDUAL AUTHOR |
2012 |
Legend : IP CATEGORY IP LEVEL
| Intellectual Property Name | Grant Register No. | IP Level | IP Category |
|---|---|---|---|
| METHOD FOR DETECTING BLURRED REGION IN HIGHLY TEXTURES IMAGE | MY- 149940-A | NATIONAL | UTILITY INNOVATION |
| NKABOT | 2018065829 Class 42 | NATIONAL | TRADEMARK |
| SZPROTECT : AN HYBIRD TECHNIQUE FOR SOFTWARE PROTECTION | NATIONAL | PATENT | |
| IOT THREAT SENSOR | NATIONAL | COPYRIGHT | |
| RESOURCE HIDING METHOD FOR PREVENTING SOFTWARE REVERSE ENGINEERING | NATIONAL | COPYRIGHT | |
| ANTI DEBUGGING METHOD FOR PREVENTING SOFTWARE REVERSE ENGINEERING | NATIONAL | COPYRIGHT | |
| IMPORT TABLE HIDING METHOD FOR PREVENTING SOFTWARE REVERSE ENGINEERING | NATIONAL | COPYRIGHT |
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
| Supervision List |
|---|
|
BANDER ALI SALEH AL-RIMY AN ENSEMBLE-BASED ANOMALY-BEHAVIOURAL CRYPTO-RANSOMWARE PRE-ENCRYPTION DETECTION MODEL PHD GRADUATED CO-SUPERVISOR 2019 |
|
LIM KAH SENG ENHANCEMENT OF AUTOMATED BLACK-BOX WEB APPLICATION VULNERABILITY ASSESSMENT ALGORITHMS PHD GRADUATED CO-SUPERVISOR 2019 |
|
UMARA UROOJ A WEIGHTED DEEP FEATURE-BASED ENSEMBLE MODEL FOR BEHAVIOURAL DRIFTING RANSOMWARE ATTACK EARLY DETECTION PHD GRADUATED CO-SUPERVISOR 2024 |
|
NOR HAMIDAH BINTI SAMAT MASTER GRADUATED SUPERVISOR 2015 |
|
NKIAMA LOKOTO-LE-WANGA HERVE MASTER GRADUATED SUPERVISOR 2015 |
|
KIRIT SHASHANK DHURANDHAR MASTER GRADUATED CO-SUPERVISOR 2020 |