Click to Print This Page

 

CURRICULUM VITAE
PERSONAL DETAIL

Name
  Associate Prof. Dr. Miss Laiha Binti Mat Kiah
Designation
  Associate Professor
Department
  Department of Computer System & Technology
Faculty
  Faculty of Computer Science & Information Technology
Tel. No. (Office)
  03-79676354
Fax No.
  03-79579249/79676354
E-mail Address
  misslaiha@um.edu.my
ResearcherID Link
  http://www.researcherid.com/rid/B-2767-2010
Address(Office)
  Department of Computer System & Technology, Faculty of Computer Science & Information Technology Building, University of Malaya, 50603 Kuala Lumpur, MALAYSIA

ACADEMIC QUALIFICATION
(Qualification), (Institution).
PhD (London), ROYAL HOLLOWAY, UNIVERSITY OF LONDON, UNITED KINGD
MSc (London), ROYAL HOLLOWAY, UNIVERSITY OF LONDON, UNITED KINGD
B.Sc.COMP.SC.(HONS), UNIVERSITY OF MALAYA (UM)

PROFESSIONAL AFFILIATION/MEMBERSHIP
(Organisation), (Role), (Year), (Level).

ACM (ASSOCIATION FOR COMPUTING MACHINERY), Member, 2010, (International)

ADMINISTRATIVE DUTIES
(Role), (Level), (Start date),(End Date).


Ahli Panel Penemuduga, University Malaya, 14-Nov-13 - 13-Nov-14

Acting Dean, Department Of Computer System & Technology, Faculty Of Computer Science & Information Technology, 05-Jul-13 - 09-Jul-13

Ahli JKIT FSKTM, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 01-Jul-13 - 30-Jun-14

AJK Penilaian Slim Geran FRGS & ERGS Peringkat UM, University Malaya, 21-May-13 - 31-Dec-14

Chairman, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 07-Feb-13 - 31-Dec-13

Acting Director, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 10-Jan-13 - 11-Jan-13

Acting Director, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 29-Nov-12 - 30-Nov-12

Ahli Panel Penemuduga, University Malaya, 31-Oct-12 - 30-Oct-13

Acting Director, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 26-Sep-12 - 28-Sep-12

Acting Director, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 22-Sep-12 - 25-Sep-12

Acting Director, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 28-Aug-12 - 13-Sep-12

Jawatankuasa Kerja Audit Program Ijazah Tinggi (JKAPIT), University Malaya, 06-Aug-12

AJK Bright Spark FSKTM, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 01-Jul-12 - 30-Jun-14

Acting Director, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 17-Jun-12 - 22-Jun-12

Chairman, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 22-Feb-12 - 31-Dec-12

Wakil Tetap Fakulti Ke JawatanKuasa Penasihat Akademik, IPS, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 26-Aug-11

Timbalan Pengerusi NADI, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 22-Aug-11 - 21-Aug-13

PENGERUSI - JK Ijazah Tinggi (JKIT), Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 01-Jul-11 - 30-Jun-14

PENGERUSI - JK Kurikulum FSKTM (Ijazah Tinggi), Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 01-Jul-11 - 30-Jun-14

Deputy Dean Of Higher Degree, Faculty Of Computer Science And Information Technology Dean's Office, Faculty Of Computer Science & Information Technology, 01-Jul-11 - 30-Jun-14

Head Of Department, Department Of Computer System & Technology, Faculty Of Computer Science & Information Technology, 12-May-08 - 31-Aug-09

CAREER HISTORY
(Post), (Organisation), (Period).


Juruanalisa Komputer, BANK SIMPANAN MALAYSIA, 01/06/1997 until 25/09/1997

AREAS OF EXPERTISE
(Area).

Security Protocols (Group Communication, Key Management, Wireless Mobile Environments)

Communication Protocols (Wireless Security, Ad-hoc Network Security, Mobile Communication Security)

Information Security (Applied Cryptography, Applied Steganography)

RECENT SELECTED PUBLICATIONS
(Publication).
 
Book
 
2002

Omar Zakaria and Miss Laiha Mat Kiah (2002), Pengenalan Kepada Keselamatan Komputer (An Introduction to Computer Security), Mc-Graw Hill (M) Sdn Bhd. 
 
Chapter In Book
 
2011

Liana K. Qabajeh, Miss Laiha Mat Kiah & Mohammad M. Qabajeh. 2011. A Survey of Position-Based Routing Protocols for Ad-Hoc Networks. (DOI: 10.1007/978-1- 84996-510-1_4). Book chapter in Application and Multidisciplinary Aspects of Wireless Sensor Networks: Concepts, Integration, and Case Studies, Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic and Roman Trobec (ISBN 976-1-84996-509-5), Part 1, pp. 47-83, Springer. 
 
Article In Academic Journals
 
2014

M.L.M. Kiah, B.B Zaidan, A.A.Zaidan, Mohamed Nabi & Rabiu Ibraheem. 2014. MIRASS: Medical Informatics Research Activity Support System using Information Mashup Network. Journal of Medical Systems. Springer, ISSN: 0148-5598. In press to publish. DOI:10.1007/s10916-014-0037-x [ACCEPTED] [Q2-ISI] (ISI-Cited Publication)

Dalibor Petkovi , Shahaboddin Shamshirband, Nenad T. Pavlovi , Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology. Optics and Spectroscopy. [Accepted] [Q3- ISI] (ISI-Cited Publication)

Babak Daghighi & Miss Laiha Mat Kiah. 2014. A Group Key Management Scheme in Wireless Mobile Environment. ScienceAsia Journal. [Accepted] [Q3-ISI] (ISI-Cited Publication)

Shamshirband, S., Petkovi , D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., Cojbasic, Z., Nikolic, V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management. 81, 520 526. DOI http://dx.doi.org/10.1016/j.enconman.2014.02.055 [Q1- ISI] (ISI-Cited Publication)

Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Al-Sakib Khan Pathan. 2014. Routing protocol design for secure WSN: Review and open research issues. Journal of Network and Computer Applications. http://dx.doi.org/10.1016/j.jnca.2014.02.008 [Q1-ISI] (ISI-Cited Publication)

Shamshirband,S., Petkovic, D., Amini, A., Anuar, N.B., Nikolic, V., Cojbasic, Z., Mat Kiah, M.L. & Gani, A. 2014. Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission. Energy 67, 623-630. DOI:http://dx.doi.org/10.1016/j.energy.2014.01.111 [Q1- ISI] (ISI-Cited Publication)

Shamshirband, S., Petkovi , D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., Cojbasic, Z., Nikolic, V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management. 81, 520 526. DOI http://dx.doi.org/10.1016/j.enconman.2014.02.055 [Q1- ISI] (ISI-Cited Publication)

Shamshirband S, Hessam S, Javidnia H, Amiribesheli M, Vahdat S, Petkovic D, Gani A, Kiah MLM. 2014. Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System. International Journal of Medical Science. 11(5):508-514. doi:10.7150/ijms.8249. http://www.medsci.org/v11p0508.htm [Q1-ISI] (ISI-Cited Publication)

Shahaboddin Shamshirband, Dalibor Petkovi , arko ojba i , Vlastimir Nikoli , Nor Badrul Anuar, Nor Liyana Mohd Shuib, Miss Laiha Mat Kiah & Shatirah Akib. 2014. Adaptive neuro-fuzzy optimization of wind farm project net profit. Energy Conversion and Management.http://dx.doi.org/10.1016/j.enconman.2014.01 .038 [Q1-ISI] [JCR2012] (ISI-Cited Publication)

Shamshirband, S., Petkovi , D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., ojba i , ., Nikoli , V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management. 81, 520 526. DOI http://dx.doi.org/10.1016/j.enconman.2014.02.055 [Q1- ISI] (ISI-Cited Publication)

Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ajith Abraham. 2014. Cooperative Game Theoretic Approach using Fuzzy Q-learning for Detecting and Preventing Intrusions in Wireless Sensor Networks. Engineering Applications of Artificial Intelligence. DOI:10.1016/j.engappai.2014.02.001 [Q1-ISI][JCR2012] (ISI-Cited Publication)

Dalibor Petkovic, Shahaboddin Shamshirband, Nenad D. Pavlovic, Abdullah Gani & Miss Laiha Mat Kiah. 2014. Kinetostatic analysis of passively adaptive robotic finger with distributed compliance. Advances in Mechanical Engineering. [Q2-ISI] (ISI-Cited Publication)
 
2013

Dalibor Petković, Nenad T. Pavlović, Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Mohd Yamani Idna Idris. 2013. Adaptive neuro-fuzzy estimation of optimal lens system parameters. Optics and Lasers in Engineering. (Impact Factor: 1.84). DOI:10.1016/j.optlaseng.2013.10.018, [Q2-ISI][JCR2012] (ISI-Cited Publication)

Dalibor Petkovi arko jba i Vlastimir Nikoli Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Ainuddin Wahid Abdul Wahab. 2013. Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission. Energy. (Impact Factor: 3.49). DOI:10.1016/j.energy.2013.10.094 [Q1-ISI] [JCR2012] (ISI-Cited Publication)

M.L Mat Kiah, Mohamed S.Nabi, B.B Zaidan & A.A Zaidan. 2013. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP-XML and SHA-1. Journal of Medical Systems. http://link.springer.com/article/10.1007%2Fs10916-013- 9971-2. [Q2-ISI] (ISI-Cited Publication)

Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2013. A review of dynamic and intelligent honeypot. ScienceAsia Journal. http://scienceasia.org/content/content.php?v=22 [Q3- ISI][JCR2011] (ISI-Cited Publication)

Abdul Nasir Khan , M. L. Mat Kiah, Sajjad A. Madani, Mazhar Ali, Atta ur Rehman Khan & Shahaboddin Shamshirband. 2013. Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment. Journal of Supercomputing. DOI http://www.springerlink.com/openurl.asp? genre=article&id=doi:10.1007/s11227-013-1055-z [Q2 - ISI] (ISI-Cited Publication)

Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ahmed Patel. 2013. An Appraisal and Design of Multi Agent Systems Based on Cooperative Wireless Intrusion Detection Computational Intelligence Techniques. Engineering Applications of Artificial Intelligence. DOI Information - http://dx.doi.org/10.1016/j.engappai.2013.04.010 [Q1- ISI][JCR2011] (ISI-Cited Publication)

Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani, Atta ur Rehman Khana & Mazhar Ali. 2013. Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing. Journal of Supercomputing. http://www.springerlink.com/openurl.asp? genre=article&id=doi:10.1007/s11227-013-0967-y [Q2- ISI] [JCR2012] (ISI-Cited Publication)
 
2012

Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan & Sajjad A. Madani. 2012. Towards Secure Mobile Cloud Computing: A Survey. Future Generation Computer Systems 29(5) : 1278-1299. DOI information: 10.1016/j.future.2012.08.003 [Q1-SCI][JCR2011] (ISI-Cited Publication)

Liana Khamis Qabajeh, Miss Laiha Mat Kiah, Mohammad Moustafa Qabajeh. 2012. A More Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. Security and Communication Networks. doi: 10.1002/sec.563 [Q4-SCI][JCR2011] (ISI-Cited Publication)
 
2011

M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan, A. Mohammed Ahmed & Sameer Hasan Al-bakri. 2011. A review of audio based steganography and digital watermarking. International Journal of the Physical Sciences 6(16):3837-3850.[Q2-SCI][JCR2010] (ISI-Cited Publication)

Qabajeh, L., Mat Kiah, M. L. & Qabajeh, M. 2011. Secure Unicast Position-Based Routing Protocols for Ad- Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences) 8(6):191-214.[ISI-Q3] (ISI-Cited Publication)
ACTAvol8no62011Q3pg2.pdf

B.B.Zaidan, A.A. Zaidan, M.L. Mat Kiah. 2011. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: Review, Participates Opinion and Expert Concerns. International Journal of Pharmacology 7(3):382-387.[Q4-SCI][JCR2010] (ISI-Cited Publication)
382-387-2011pg1.pdf

Sameer Hasan Al-Bakri, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan & Gazi Mahabubul Alam. 2011. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences 6(4):930-938.[Q2-SCI][JCR2010] (ISI-Cited Publication)
 
2010

Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B. Zaidan and A.A. Zaidan. 2010. A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. Journal of Applied Sciences 10(1): 59-64. (ISI/SCOPUS Cited Publication)

B. B. Zaidan, A. A. Zaidan, Alaa Taqa, Gazi Mahabubul Alam, M. L. Mat Kiah & Hamid Jalab. 2010. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. International Journal of the Physical Sciences 5(11):1796-1806. [Q2-SCI][JCR2010] (ISI-Cited Publication)

Gazi Mahabubul Alam, M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan and Hamdan O. Alanazi. 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Scientific Research and Essays 5(21):3254-3260.[Q3-SCI][JCR2010] (ISI-Cited Publication)

Hamdan O. Alanizi, M. L. Mat Kiah, A.A.Zaidan, B.B.Zaidan & G.M. Alam. 2010. Secure Topology for Electronic Medical Record Transmissions. International Journal of Pharmacology (IJP) 6(6):954-958.[Q4-SCI][JCR2010] (ISI-Cited Publication)

Mohamed S. A.Nabi, M.L. Mat Kiah, B.B. Zaidan, A.A. Zaidan & G.M. Alam. 2010. Suitability of SOAP Protocol in Securing Transmissions of EMR Database. International Journal of Pharmacology (IJP) 6(6):959- 964.[Q4-SCI][JCR2010] (ISI-Cited Publication)

Sameer Hasan Al-bakri & M. L. Mat Kiah. 2010. A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Scientific Research and Essays 5(22):3455-3466.[Q3-SCI][JCR2010] (ISI-Cited Publication)

Por Lip Yee & Miss Laiha Mat Kiah. 2010. Shoulder Surfing Resistance Using PENUP Event and Neighboring Connectivity Manipulation. Malaysian Journal of Computer Science 23(2):121-140.[Q4-SCI][JCR2010] (ISI-Cited Publication)

Saman Mirza Abdulalla, Laiha Mat Kiah & Omar Zakaria. 2010. A biological model to improve PE malware detection: Review. International Journal of the Physical Sciences 5(15): 2236-2247. [Q2-SCI][JCR2010] (ISI-Cited Publication)

Miss Laiha Mat Kiah, Liana Khamis Qabajeh, Mohammad Moustafa Qabajeh. 2010. Unicast Position-Based Routing Protocols for Ad-Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences, ISSN: 17858860)7(5):19-46.[Q3-SCI][JCR2010] (ISI-Cited Publication)
 
2009

Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks. International Journal of Computer Science and Network Security (IJCSNS) 9(2): 131-140. (Non-ISI/Non-SCOPUS Cited Publication)

Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Scalable and Secure Position- Based Routing Protocol for Ad-Hoc Networks. Malaysian Journal of Computer Science (ISSN 0127-9084) 22(2):99- 120. [Q4-SCI] (ISI-Cited Publication)
 
2008

Mat Kiah, M.L. & Martin, K.M. 2008. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and Its Applications (IJSIA) 2(1):39-52. (SCOPUS-Cited Publication)
 
Proceeding
 
2013

Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2013. Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning. Kaspersky s CyberSecurity for the Next Generation, National University of Singapore, Republic of Singapore, 21 - 23 March 2013. (ISI/SCOPUS Cited Publication)

Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani. 2013. A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments. IEEE Symposium on Wireless Technology and Applications (ISWTA 2013), September 22-25, 2013, at Pullman Kuching Hotel, Malaysia. (ISI/SCOPUS Cited Publication)
 
2012

S. M. Abdulla, M. L. Mat Kiah & O. Zakaria. 2012. Minimizing Errors in Identifying Malicious API to Detect PE Malwares Using Artificial Costimulation. International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE'2012), pg. 49-54. 
samanConfpg1.pdf

Hossein Javidnia,Shahaboddin Shamshirband & Miss Laiha Mat Kiah. 2012. Cooperative Multi-agent System Based on Fuzzy Quantum Cryptography. International Conference on Electrical, Computer, Electronics & Biomedical Engineering(ICECEBE 2012). Bangkok, Thailand. (Non-ISI/Non-SCOPUS Cited Publication)
FuzzyShahabconf2012.pdf

Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2012. A Review on Artificial Intelligence Techniques for Developing Intelligent Honeypot. International Conference on Next Generation Information Technology (ICNIT2012). Seoul, Korea. (Non-ISI/Non-SCOPUS Cited Publication)
IntelligentHoneypot_revised_16Mar2012Korea2012.pdf
 
2011

Mat Kiah, M.L., Daghighi, B.,& Albakri, S. 2011. An Implementation of Group Key Management in a Wireless Environment. International Conference on Electronics, Networks and Computer (ICENC 2011), Kuala Lumpur, Malaysia. (ISI/SCOPUS Cited Publication)
icenc2011pg1.pdf
 
2010

Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2010. A Scalable and Secure Position- Based Routing Protocol for MANETs. Proceedings of the Annual International Conference on Network Technologies & Communication (NTC 2010), 29-30th November, Phuket Beach Resort, Thailand, pp. N7-N12. 

Daghighi, B., Mat Kiah, M.L.& Afkhami, S. 2010. Group Key Management Using Public Key Exchange. International Conference on Intelligent network & Computing, Malaysia. (ISI/SCOPUS Cited Publication)
 
2009

Mohamed Elsadig Eltahir, Miss Laiha Mat Kiah, Bilal Bahaa Zaidan & Aos Alaa Zaidan. 2009. High Rate Video Streaming Steganography. International Conference on Future Computer and Communication, pp 550-553.(Indexed by EI Compendex, INSPEC, Thomson ISI, IEEE XploreTM,IEEE Computer Society digital libraries) 

L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable, Distributed and Secure Routing Protocol for MANETs. Proceedings of the International Conference on Computer Engineering and Applications (ICCEA 2009), pp. 51-56, 6-8 June 2009, Manila, Philippine. (Indexed by Ei Compendex and Thomson ISI) 

L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable Secure Routing Protocol for MANETs. Proceedings of The International Conference on Computer Technology and Development (ICCTD 2009), pp.143-147, 13-15 Nov, Kota Kinabalu, Malaysia. (Indexed by Ei Compendex and ISI) 

Nor Aniza Abdullah, Safinaz Mustapha, Miss Laiha Mat Kiah. 2009. A Requirement Framework For Livestock Farming Web Service Application. Proceeding of the 3rd International Conference on Informatics and Technology, 27 - 28th October, Kuala Lumpur Malaysia. 

Daghighi, B.,& Mat Kiah, M.L. 2009. Secure Group Communication Using Public Key Exchange. In the Proceeding of 3rd International Conference on Informatics and Technology, 27 - 28th Oct 2009 Kuala Lumpur, Malaysia. 
 
2007

Miss Laiha Mat Kiah & Keith Martin. 2007. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. Proceeding of International Conference on Future Generation Communication Networking,06-08 Dec 2007, Jeju Island South Korea, Vol. 1, pg 99-106. 

Miss L. Mat Kiah and Keith M. Martin. 2007. Secure Multicast: Investigating the Different Challenges between Internet and Mobile Environments. In Proceeding of M2USIC 2007, 19 & 20th Nov 2007, Hilton Hotel PJ, Malaysia. 
 
2006

MatKiah, M. L. and Martin, K. M. (2006). A generic group key management framework for group communication in wireless mobile environments. In Proceedings of the Sixth International Network Conference (INC2006), pp. 347-354. 
 
2005

MatKiah, M. L. and Martin, K. M. (2005). Group communication: Design challenges in the development of key management frameworks in wireless mobile environments. In Proceedings of International Conference on Security and Management (SAM'05), pp. 385-390. Las Vegas, USA. 

AREAS OF RESEARCH
(Project title), (Role), (From)-(Until), (Source), (Level).

Network Security

Security Systems

Information Security

Secure Group Communication for Critical National Information Infrastructure, Principal Investigator(PI), 2013-2016, ScienceFund

Implementation of Secure Framework for Electronic Medical Records (EMRs), Principal Investigator(PI), 2012-2015, HIR

Deployment of Virtual Honeypots, Principal Investigator(PI), 2011-2013, Geran Penyelidikan Universiti Malaya (UMRG), National

A SCALABLE, DISTRIBUTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, Principal Investigator(PI), 01/11/2010, Geran Penyelidikan Universiti Malaya (UMRG), 31/10/2011

Information and Communication Security, Principal Investigator(PI), 2010-2011, Special Fund, National

An Implemetation of Secure Group Communication, Principal Investigator(PI), 2009-2011, Geran Penyelidikan Universiti Malaya (UMRG), National

A SCALABLE, DISTRIBTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, Principal Investigator(PI), 20/04/2009, Geran Penyelidikan Universiti Malaya (UMRG), 19/10/2010

A SCALABLE, DISTRIBTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, Principal Investigator(PI), 20/04/2009, Geran Penyelidikan Universiti Malaya (UMRG), 19/10/2010

AN IMPLEMENTION OF SECURE GROUP COMMUNICATION, Principal Investigator(PI), 01/05/2009, Geran Penyelidikan Universiti Malaya (UMRG), 30/04/2011

PUBLIC KEY INFRASTRUCTURE FOR SECURE MOBILE MESSAGIN USING ELLIPTIC CURVE CRYPTOSYSTEM, Principal Investigator(PI), 15/12/2009, Postgraduate Research Grant (PPP) - Research, 14/12/2010

PUBLIC KEY INFRASTRUCTURE FOR SECURE MOBILE MESSAGIN USING ELLIPTIC CURVE CRYPTOSYSTEM, Principal Investigator(PI), 15/12/2009, Postgraduate Research Grant (PPP) - Research, 14/12/2010

Secure Routing Protocols for Large Mobile Ad-Hoc Networks, Principal Investigator(PI), 2008-2010, Short Term Research Fund (Vote F)(PJP), National

CONSULTATION PROJECT/CONSULTANCY
(Project title), (Role), (From)-(Until), (Organisation).

Cisco Competition 2009, 2009-2009, UniKL

Ahli Akademik sebagai Panel Penemuduga HLP Sessi 2012, Academic Reviewer, 2011-2011, JPA

Cisco Netriders Competition 2011, 2011-2011, TAR College

AWARDS AND RECOGNITIONS
(Name of Award), (Awarding Institution), (Year Awarded), (Level).

BEST SESSION PAPER AWARD, International Research and Innovations in Science, Engineering and Technology (IRISET), 2012

Excellence Award 2011, University of Malaya, 2011

Instructor Years of Service, Cisco Networking Academy, 2013

Sijil Perkhidmatan Cemerlang, University of Malaya, 2010

PRESENTATIONS
(Title), (Event), (Date Presented), (Organiser), (Level).
 
Presenter

Suitability of Adopting S/MIME and OpenPGP Email Messages Protocol to Secure Electronic Medical Records, Second International Conference on Future Generation Communication Technologies, 12 Dec 2013 to 14 Dec 2013, British Computer Society, (International)
 
Others

Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning, Kaspersky s CyberSecurity for the Next Generation, 26 Sep 2013 to 27 Dec 2013, FIRA, (International)

SUPERVISION

 
Role As Advisor At First Degree Level
(Academic Session), (No. of Candidates), (No. of Contact Hours Per Year)

2012/2013, 4, 2

2012/2013, 7, 4

2011/2012, 7, 4

2011/2012, 7, 4

2010/2011, 10, 2

2010/2011, 9, 2

2009/2010, 12, 3

2009/2010, 12, 3

2008/2009, 13, 3

2008/2009, 13, 2
 
Post Graduate Level
(Name of Degree), (Name of Candidates), (Title of Thesis), (Academic Session)

Completed

Masters Degree, Mohamed Shabbir Hamza Abdulnabi, Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, 2009/2010

Masters Degree, Alanazi, Hamdan Owaid R, Hybrid Techniques of NTRU and AES for Improving the Security of Electronic Medical Records, 2009/2010

Doctoral Degree (PhD), Saman Mirza Abdulla, An Artificial Co-stimulation Classifier of Malicious API calls classification in Portable Executable Malwares, 2008/2009

Doctoral Degree (PhD), Liana Khamis Qabajeh, A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, 2008/2009

Masters Degree, Samer Hasan Saif Qaid, An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, 2007/2008

Masters Degree, Hamsah Ahmed Ghaleb Al-Jbara, High Capacity Image Steganography Algorithm Based on Artificial Neural Network, 2007/2008

Masters Degree, Mohammad Yasin Arashpour, Implementation of Wireless Security on Virtual WIFI, 2007/2008

Masters Degree, Mohammed-A-Ahmed, Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-Bit Encoding Audio Steganography Technique, 2007/2008

Masters Degree, Anas Mageed Hamid, An Image Steganography Using Texture Analysis for High Rate Data Hiding, 2007/2008

Masters Degree, Babak Daghighi, The Implementation of Secure Group Communication in Wireless and Mobile Environment, 2006/2007

Masters Degree, Addy Majed Abdalkarem Alquraan, Implementation of End-to-End Secure SMS Using Elliptic Curve Cryptography, 2006/2007

Masters Degree, Mohamed El Sadiq El Tahir Ahmed, An Implementation of Video Steganography Using the LSB Method, 2006/2007

Ongoing

Doctoral Degree (PhD), Nordiana Binti Rahim, Computer Forensic, 2012/2013

Doctoral Degree (PhD), Salman Iqbal Malik, Network Security, 2012/2013

Doctoral Degree (PhD), Noor Hayani Binti Abd Rahim, Information Security, 2012/2013

Doctoral Degree (PhD), Mohamed Shabbir Hamza Abdulnabi, Computer Security, 2012/2013

Doctoral Degree (PhD), Abdul Nasir Khan, Network Security, 2011/2012

Doctoral Degree (PhD), Lim Shu Yun, Network Security, 2011/2012

Doctoral Degree (PhD), Shahaboddin Shamshirband, Network Security, 2011/2012

Doctoral Degree (PhD), Babak Daghighi, Secure Group Communication, 2011/2012

Doctoral Degree (PhD), Shazana Binti Md Zin, Wireless Security, 2011/2012

Masters Degree, Wira Zanoramy, A Case Based Reasoning Approach for Dynamic Honeypot, 2010/2011

Doctoral Degree (PhD), Abdul Mueed Khalid, Network Security, 2009/2010

Masters Degree, Raji Zuhair Raji, MMS Security, 2009/2010

Doctoral Degree (PhD), Fazidah Binti Othman, Secure Group Communication, 2008/2009

EXPERT/TECHNICAL CONTRIBUTIONS
(Activity), (Organisation), (Role), (From)-(Until), (Level).

Reviewers for ACTA Press Journal, ACTA Press Journal Canada, , 2010-Present, (International)

Panel Advisor for Competency Standards for Polytechnic Graduates, Jabatan Pengajian Politeknik dan Kolej Komuniti Kementerian Pengajian Tinggi Malaysia, Committee Member, 2008-2009, (National)

Panel for Viva Voce - Phd Degree Candidate, Faculty of Computer Science & Info. Tech., University of Malaya, Member of Board of Examiner, 2013-2013, (University)

Panel for Viva Voce - Phd Degree Candidate, Faculty of Information Science & Technology, UKM, Member of Board of Examiners, 2013-2013, (National)

TEACHING
(Course Title), (Academic Session), (No of Student), (No of Contact Hours).


First Degree

ADVANCE NETWORK TECHNOLOGY, 2009/2010(2), 45, 5

FUNDAMENTALS OF NETWORK TECHNOLOGY, 2010/2011(1), 97, 6

FUNDAMENTALS OF NETWORK TECHNOLOGY, 2011/2012(1), 25, 2

EVALUATION ACTIVITIES
(Description), (Evaluation Activity).

For paper publications of Malaysian Journal of Computer Science (MJCS), Article In Journal

Paper on BIOMETRIC ENCRYPTION THROUGH MODIFIED HILL CIPHER TECHNIQUE, Article In Journal

Paper on A NEW IDENTITY BASED GROUP SIGNATURE SCHEME, Article In Journal

Master Dissertation on Implementation of Elliptic Curve Cryptography Using Biometric Features to Enhance Security Services, Thesis

Master Dissertation on Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme, Thesis

Master Dissertation on Throughput Optimization of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), Thesis

Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique, Thesis

A Reservation‐Based Multiple Access Scheme with Adaptive Permission Probability for Wireless Systems Journal of King Saud University ‐ Computer and Information Sciences, Article In Journal

Designing a Low Cost Implementation of E‐Commerce Security by Optimizing the Parameters of NTRU Cryptosystem Algorithm for Inderscience Publishers Ltd., Article In Journal

An Approach The Implementation Of Access Control Policy And Identity Management In The Public Sector Agency, Thesis

A PROXY-ASSISTED ROUTING FOR EFFICIENT DATA TRANSMISSION IN MOBILE AD HOC NETWORKS, Thesis

M-XKMS: Adaptation of XKMS for Mobile Devices to Secure Short Message Service Using XML Key Management Specification, Article In Journal

Master Thesis on 'Kajian Perbandingan Model Gelombang Penyebaran Radio Terhadap Rangkaian 4G', Thesis

SECURITY ANALYSIS OF WATERMARKING PROTOCOLS AND SCHEMES BASED ON SINGULAR VALUE DECOMPOSITION, Thesis

Development of High Secure Data Hiding System Using Least Significant Bit Algorithm, Thesis

Research Project for MCS candidate - A Framework to Support Cross-Platform Application Development for Mobile Devices, Project

Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique - Re-Examination, Thesis

PhD Thesis on 'Enhancing Security in Mobile IPv6 with Private Key-based Binding Update Key Protocol', Thesis

Master Thesis on 'Parallel Chaotic Hash Function Based on the Shuffle-Exchange Network', Thesis

Phd Thesis on 'Infrastructure Based Management And Optimization For NEMO Correspondent Registration', Thesis

Master Thesis on 'Key Authentication in Closed Communities Using Images', Thesis

Research Project for MCS candidate - Improving DSR Routing Protocol Using TTL-Based in Mobile Ad Hoc Network (MANET), Project

A Generic Relation to Assess Interdependency of QoE and QoS, Thesis

CONTRIBUTION TO SOCIETY
(Contribution To Society), (Level), (Start Date), (End Date).

Executive Editor for Malaysian Journal of Computer Science, (University), 01-Aug-07 until 01-Aug-08

AJK Induk Pemilihan MPPUM Sesi 2012/2013, (University), 18-Sep-12