GRANT(PI & MEMBERS)

27

PUBLICATIONS

47

INDEXED PUBLICATION

25

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

UNIVERSITY FUND
2
TOTAL

Publications

INDEXED PUBLICATION
25
NON-INDEXED PUBLICATION
6
OTHERS PUBLICATION
16
TOTAL

Supervisions

DEGREE
0
MASTER
27
PHD
22
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
IMAGE SEGMENTATION ON MULTI MODAL OF MEDICAL IMAGES USING ACTIVE CONTOUR MODEL
RUG OF UTM Tier 2
2019
Heart Failure Patient Readmission Prediction System using Data Mining Technique in Malaysian Healthcare Environment
RUG OF UTM Tier 2
2019
BITCOIN FRAUD DETECTION AND CONTROL MODEL USING NEAREST NEIGHBOR TECHNIQUE FOR FINANCIAL INSTITUTIONS
RUG OF UTM Tier 2
2019
DETECTION MODEL USING MULTIDIMENSIONAL FACTORS FOR INSIDER THREAT IN ORGANIZATION
RUG OF UTM Tier 2
2019
FORMULATION OF HYBRID SIDE MATCH VECTOR QUANTIZATION-GENETIC ALGORITHM (SMVQ-GA) FOR INCREASING PAYLOAD CAPACITY IN DATA HIDING
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2019
Criminal Network Search Model using Social Network Analytics for the Internet of Things (IoT) Crime Investigation.
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2019
FORMULATION OF INTERNET OF THINGS(IOT) MONITORING SENSOR FRAMEWORK FOR PANDEMIC PREDICTION AND CONTROL
RUG OF UTM Tier 2
2018
DEVELOPMENT OF AN ADAPTIVE SYSTEM FOR VISUALIZING NETWORK DATA
RUG OF UTM Potential Academic Staff
2017
Membekal dan Memasang Sistem Maklumat Pengurusan Dokumen Fatwa (SMPDF) Fasa 1
JABATAN KEMAJUAN ISLAM MALAYSIA Business Entity
2017
SECURE AND INTELLIGENT AUTHENTICATION WATERMARKING SCHEME FOR DIGITAL MEDICAL IMAGES AT MALAYSIAN HOSPITALS
RUG OF UTM Tier 1
2016
INFORMATION SECURITY RISK ASSESSMENT FRAMEWORK FOR CLOUD COMPUTING ENVIRONMENT USING SURVIVAL ANALYSIS METHOD
RUG OF UTM Tier 1
2016
MULTILAYER REVERSIBLE WATERMARKING IN MEDICAL IMAGES USING NON-UNDERFLOW DIFFERENCE EXPANSION
RUG OF UTM Tier 1
2015
ENTERPRISE ARCHITECTURE(EA) READINESS MEASUREMENT INSTRUMENT TO SUSTAIN EA INITIATIVES IN PUBLIC SECTORS
RUG OF UTM Tier 1
2015
Cryptography Technology For National Defense Industry
QUESTRANS SDN. BHD Business Entity
2015
Novel Computer Forensic Approach for Cloud Computing Environment
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
A ROBUST TECHNIQUE AGAINST GEOMETRIC ATTACKS FOR DIGITAL VIDEO WATERMARKING
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2014
A NOVEL MODEL TO ENHANCE THE CLOUD AUTHENTICATION SECURITY BY USING WATERMARKING METHODS
RUG OF UTM Tier 1
2014
AN WATERMARKING TOOL FOR E-PASSPORT PROTECTION
SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor
2012
Efficient Digital Image Authentication and Tamper Localization Technique Using Lsb Watermarking
MINISTRY OF EDUCATION Exploratory Research Grant Scheme
2012
A Secure Copyright Protection Algorithm Based On Watermarking Using SOM and PSO
RUG OF UTM Tier 2
2011

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Tamper Detection And Localization For Quranic Text Watermarking Scheme Based On Hybrid Technique
COMPUTERS, MATERIALS AND CONTINUA
Publication In Web Of Science CO-AUTHOR
2021
Payload Capacity Scheme For Quran Text Watermarking Based On Vowels With Kashida
COMPUTERS
Publication In Web Of Science CO-AUTHOR
2021
Recent Analysis Of Forged Request Headers Constitued By Http Ddos
SENSORS
Publication In Web Of Science CO-AUTHOR
2020
Enhanced Detection Algorithms To Detect Http Ddos
INTERNATIONAL JOURNAL OF ADVANCED TRENDS IN COMPUTER SCIENCE AND ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2019
Review Of Recent Detection Methods For Http Ddos Attack
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2019
A Review Of Technique To Self-Generate Ddos Dataset
INTERNATIONAL JOURNAL OF ADVANCED TRENDS IN COMPUTER SCIENCE AND ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2019
Biometric Solution To Prevent Credit Card Fraud In Malaysia
POSTGRADUATE ANNUAL RESEARCH INFORMATICS SEMINAR
Conference Paper CO-AUTHOR
2018
Digital Forensic Investigation Challenges Based On Cloud Computing Characteristics
INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY(UAE)
Publication In Scopus CO-AUTHOR
2018
A Review And Open Issues Of Diverse Text Watermarking Techniques In Spatial Domain
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2018
Towards Designing An Ea Readiness Instrument: A Systematic Review
4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY, CIST 2016
Publication In Scopus CO-AUTHOR
2017
Understanding User Participation In Information Security Risk Management
OPEN INTERNATIONAL JOURNAL OF INFORMATICS
Journal Article Non Citation-Indexed CO-AUTHOR
2017

COPPA DOCUMENT FOR MSC(INFORMATICS)
Clasified/Technical Report CO-AUTHOR
2016
Temperature-Based Estimation Of Global Solar Radiation Using Soft Computing Methodologies
THEORETICAL AND APPLIED CLIMATOLOGY
Publication In Web Of Science UTM FIRST AUTHOR
2016
A Robust Video Watermarking Technique For The Tamper Detection Of Surveillance Systems
MULTIMEDIA TOOLS AND APPLICATIONS
Publication In Web Of Science UTM FIRST AUTHOR
2016
A Novel Wlan Client Puzzle Against Dos Attack On Pattern Matching
MATHEMATICAL PROBLEMS IN ENGINEERING
Publication In Web Of Science CO-AUTHOR
2015
Pattern Recognition Techniques: Studies On Appropriate Classifications
LECTURE NOTES IN ELECTRICAL ENGINEERING
Publication In Scopus UTM FIRST AUTHOR
2015
An Overview Of Objectionable Image Detection
INTERNATIONAL SYMPOSIUM ON TECHNOLOGY MANAGEMENT AND EMERGING TECHNOLOGIES (ISTMET)
Publication In Scopus UTM FIRST AUTHOR
2015
A Novel Wlan Client Puzzle Against Dos Attack On Pattern Matching
MATHEMATICAL PROBLEMS IN ENGINEERING
Publication In Web Of Science CO-AUTHOR
2015
Pattern Recognition Techniques: Studies On Appropriate Classifications
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus UTM FIRST AUTHOR
2014
Secure Openid Authentication Model By Using Trusted Computing
ABSTRACT AND APPLIED ANALYSIS
Publication In Scopus CO-AUTHOR
2014
A Secure Model For Prevention Of Black Hole Attack In Wireless Mobile Ad Hoc Networks
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE
Proceedings CO-AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Ad Hoc Networks Using Ids Agents
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13)
Proceedings CO-AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13)
Proceedings CO-AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13)
Proceedings CO-AUTHOR
2013
Review Of Digital Watermarking Techniques
1ST TECHNOLOGY, EDUCATION, AND SCIENCE INTERNATIONAL CONFERENCE (TESIC) 2013
Proceedings CORRESPONDING AUTHOR
2013
A Taxonomy Of Sql Injection Attacks
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013)
Publication In Scopus CO-AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Ids Agents
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE
Proceedings CO-AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE
Proceedings CO-AUTHOR
2013
An Overview Of Principal Component Analysis
JOURNAL OF SIGNAL AND INFORMATION PROCESSING
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Cryptographic Techniques
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE
Proceedings CO-AUTHOR
2013
An Overview Of Principal Component Analysis
JOURNAL OF SIGNAL AND INFORMATION PROCESSING
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
A Secure Model For Prevention Of Black Hole Attack In Wireless Mobile Ad Hoc Networks
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13)
Conference Paper CO-AUTHOR
2013
An Overview Of Holistic Face Recognition
JOURNAL OF RESEARCH COMMUNICATION TECHNOLOGY
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
Efficient Embedding For Audio Steganography
PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON ENVIRONMENTAL, ECONOMICS,ENERGY, DEVICES, SYSTEMS, COMMUNICATION, COMPUTER AND MATHEMATICS (EDSCM 12)
Conference Paper CO-AUTHOR
2012
Mazdak Technique For Psnr Estimation In Audio Steganography
4TH INTERNATIONAL CONFERENCE ON MECHANICAL AND ELECTRICAL TECHNOLOGY, ICMET 2012
Publication In Scopus CO-AUTHOR
2012
An Overview On Audio Steganography Techniques
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS
Publication In Scopus CO-AUTHOR
2012
Mazdak Technique For Psnr Estimation In Audio Steganography
APPLIED MECHANICS AND MATERIALS
Publication In Scopus CORRESPONDING AUTHOR
2012
The Effect Of Dct And Dwt Domains On The Robustness Of Genetic Watermarking
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
Publication In Web Of Science UTM FIRST AUTHOR
2011
Study Of The Effect Dct And Dwt Domains On The Imperceptibility And Robustness Of Genetic Watermarking
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ISSUES
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2011
Data Hiding Method Based On Dna Basic Characteristics
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
Publication In Scopus CO-AUTHOR
2011
Data Hiding Method Based On Dna Basic Characteristics
DIGITAL ENTERPRISE AND INFORMATION SYSTEMS
Book Chapter CO-AUTHOR
2011
Comparative Study Of Different Steganographic Techniques
11TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS '11)
Conference Paper CO-AUTHOR
2011
Multiple Layer Reversible Images Watermarking Using Enhancement Of Difference Expansion Techniques
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2010
Capacity And Quality Improvement In Reversible Image Watermarking Approach
PROCEEDING - 6TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, NCM 2010
Publication In Scopus CORRESPONDING AUTHOR
2010
A Genetic-Algorithm-Based Approach For Audio Steganography
World Academy of Science, Engineering and Technology
Journal Article Non Citation-Indexed CO-AUTHOR
2009
An Overview Of Video Watermarking Techniques
PARS 07 FSKSM UTM
Conference Paper CORRESPONDING AUTHOR
2007
Modul Penyediaan Teks Khutbah Bermultimedia
SEMINAR TEKNOLOGI MAKLUMAT KE EMPAT AKADEMI TENTERA MALAYSIA (ATMA)
Conference Paper CO-AUTHOR
2005

Legend : IP CATEGORY IP LEVEL

Intellectual Property Name Grant Register No. IP Level IP Category

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
FARNAZ ARAB
A ROBUST VIDEO WATERMARKING USING SIMULATED BLOCK BASED SPATIAL DOMAIN TECHNIQUE
PHD GRADUATED SUPERVISOR 2014
REZA AGHABABAEYAN
A ROBUST AGAINST ROTATION ATTACK WATERMARKING TECHNIQUE BASED ON WAVELET TRANSFORM
PHD GRADUATED SUPERVISOR 2015
SASAN KARAMIZADEH
ENHANCED ILLUMINATION SCHEME FOR FACE RECOGNITION
PHD GRADUATED SUPERVISOR 2016
SANAZ KAVIANPOUR
ENHANCING PRIVACY ON SOCIAL NETWORK SITES USING CLASSIFICATION AND ANONYMISATION
PHD GRADUATED CO-SUPERVISOR 2017
HAITHAM AMEEN NOMAN ALANI
AN AUTOMATED MECHANISM TO DETECT AND MITIGATE DEAUTHENTICATION AND DISASSOCIATION DOS ATTACKS IN WIRELESS 802.11 NETWORKS
PHD GRADUATED SUPERVISOR 2017
AMIN DASTANPOUR
IMPROVED FUZZY NEURAL NETWORK FOR INTRUSION DETECTION SYSTEM
PHD GRADUATED SUPERVISOR 2018
MOHAMMAD JAVAD RAJABI
ROBUST DISCRETE CONSINE TRANSFORM BASED TECHNIQUE FOR IMAGE WATERMARKING AGAINST CROPPING ATTACKS
PHD GRADUATED SUPERVISOR 2018
AIDA SHAFIABADY
OBJECT-ORIENTED SOFTWARE MAINTAINABILITY PREDICTION MODEL BASED ON ARTIFICIAL NEURAL NETWORKS
PHD GRADUATED SUPERVISOR 2020
AMIR HESAM YARIBAKHT
ROBUST COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND CAT FACE TRANSFORM
PHD GRADUATED SUPERVISOR 2020
ALI ABDULRAHEEM ALWAN AL-KHAFAJI
TAMPER DETECTION OF QURANIC TEXT WATERMARKING SCHEME BASED ON VOWEL LETTERS WITH KASHIDA USING EXCLUSIVE-OR AND QUEUEING TECHNIQUE
PHD GRADUATED SUPERVISOR 2020
ABDUL GHAFAR BIN JAAFAR
ENHANCED HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE DETECTION SCHEME WITH GET HEADERS ADOPTION
PHD GRADUATED SUPERVISOR 2020
SASHI KUMAR A/L TERMARINGGAM
INFORMATION TECHNOLOGY SERVICE MANAGEMENT FRAMEWORK FOR FINANCIAL REGULATORY BODY IN MALAYSIA
PHD GRADUATED CO-SUPERVISOR 2023
RATNA DEWI BINTI IBRAHIM

MASTER GRADUATED SUPERVISOR 2014
ABDULLAH ALI HASSAN GHADAWI

MASTER GRADUATED SUPERVISOR 2014
NAJIHAH BINTI YAAKOB

MASTER GRADUATED SUPERVISOR 2014
FADZRINA BINTI RAMLI

MASTER GRADUATED SUPERVISOR 2014
MABRUK ALI MOSBAH ELSEID

MASTER GRADUATED SUPERVISOR 2014
AIN'NATUL MARDHIAH BINTI MOHAMAD HASBULLAH

MASTER GRADUATED SUPERVISOR 2014
KHALIL, MOAAD ABDULRAHMAN M

MASTER GRADUATED SUPERVISOR 2014
KHAIRUL AZLAN BIN MUHAMAD

MASTER GRADUATED SUPERVISOR 2014
SULTAN FAYDULLAH M AL IDRISS

MASTER GRADUATED SUPERVISOR 2014
EMILIA BINTI MD NOAH

MASTER GRADUATED SUPERVISOR 2014
BABAK HOSSEINNEJADNEDAEI

MASTER GRADUATED SUPERVISOR 2014
TAQI MOHAMMED ALI AL-HADHRAMI

MASTER GRADUATED SUPERVISOR 2015
FADZILAWATI BINTI KAINI
MIDDLEWARE FRAMEWORK FOR ANTI-TERRORISM CAPABILITIES IN CYBER WARFARE  
MASTER GRADUATED SUPERVISOR 2015
SURENTHIRAN A/L KRISHNAN
ENHANCED RECURRENT NEURAL NETWORK (RNN) WITH GATED RECURRENT UNIT (GRU) FOR HEART DISEASE PREDICTION.
MASTER GRADUATED SUPERVISOR 2015
MOHAMED GHAZALI BIN KHAIRUZZAMAN

MASTER GRADUATED SUPERVISOR 2015
NURUL AFIFAH BTE ROSLE

MASTER GRADUATED SUPERVISOR 2016
FILISIA ANAK BEDDIE

MASTER GRADUATED SUPERVISOR 2016
KHALED SALEH AHMED ALLABANI

MASTER GRADUATED SUPERVISOR 2017
KHALED GUBRAN YAHYA AL-HASHEDI
FRAUD DETECTION MODEL USING COMMITTEE SEMI-SUPERVISED LEARNING FOR BITCOIN TRANSACTION
MASTER GRADUATED SUPERVISOR 2017
JARIN FATHIMA BINTI M.A AHMAD
N/A
MASTER GRADUATED SUPERVISOR 2017
ASMADI BIN ABU BAKAR

MASTER GRADUATED SUPERVISOR 2018
ROZITA BINTI AHAMMAD

MASTER GRADUATED SUPERVISOR 2018
MOHD FAIZAL BIN AHMAD

MASTER GRADUATED SUPERVISOR 2018
HURAIZAH BINTI ZAKARIA
WORKING TITLE : SKILLSET FRAMEWORK FOR IT AUDITORS FROM PUBLIC SECTOR
MASTER GRADUATED SUPERVISOR 2019