Curriculum Vitae

PROF. TS. DR. NOR BADRUL ANUAR BIN JUMA'AT

Professor
  • Department of Computer System & Technology
    Faculty of Computer Science and Information Technology
  • 0379676436

BIOGRAPHY


Nor Badrul Anuar is an accomplished academic leader with a wealth of experience in various leadership positions. He currently serves as the Associate Vice Chancellor for Infrastructure and Information Services and acts as the Chief Information Officer at Universiti Malaya, where he leads various university services, including ICT, physical infrastructure, sports, and library services. As a senate member, he also chairs many ICT and infrastructure development committees. In addition, he leads the Centre of Research for Cyber Security & Network (CSNET).

Nor Badrul Anuar began his academic journey at Universiti Malaya, earning his Bachelor's and Master's degrees in Computer Science in 2001 and 2003, respectively. He obtained his PhD at the Centre for Information Security & Network Research, University of Plymouth, UK 2012. After joining Universiti Malaya as a tutor in 2001, he was promoted to lecturer in 2003, senior lecturer in 2008, and associate professor in 2017. In 2022, he was promoted to full professor at the Faculty of Computer Science and Information Technology at Universiti Malaya, Kuala Lumpur. In addition, he is also serving as a visiting professor at the Institute of Informatics and Computing in Energy (IICE), Universiti Tenaga Nasional, Malaysia.

He has supervised numerous post-doctoral fellows and research students, including eighteen PhD and six master's research students, in the computer network security and applications domain between 2012 and 2022. He has published extensively on computer security and applications, with his work being featured in academic journals both domestically and internationally. As of January 2023, his 152 published papers have attracted 7,670 citations and obtained an H-index of 41, making him a highly cited scholar. He is recognised as an expert in several subject categories, including computer science, engineering, science & technology - other topics, telecommunications, and information science & library science, by Web of Science. In 2022, Stanford University recognised him as one of the world's top 2% scientists. Currently, he serves on the editorial board of two journals, including the Journal of Network and Computer Applications (JNCA), which has an impact factor of 7.574.

He has received numerous honours and recognitions throughout his illustrious career. He was honoured by Universiti Malaya for eight consecutive years, from 2012 to 2019, for his outstanding service. In 2015, he was recognised as an outstanding lecturer in science at Universiti Malaya and was awarded the university's highest honour, the Universiti Malaya Excellence Award (Anugerah Cemerlang Universiti Malaya).

His research interests are intrusion detection systems, high-speed networks, and management information systems. Specifically, he focuses on intrusion detection systems, intrusion response systems, security events and management, digital forensic and network security, switching, routing, IPv6, and multicast. His current research explores network traffic classification and its applications and the role of federated learning in enhancing network security.

 

 

AREAS OF EXPERTISE


  • MANAGEMENT INFORMATION SYSTEM
    E-thesis, Library Systems, Online Systems
  • HIGH SPEED NETWORK
    Switching, Routing, IPv6, Multicast
  • INTRUSION DETECTION SYSTEM
    Intrusion Detection Systems, Intrusion Response Systems, Security Event and Incident Management, Digital Forensic, Network Security

ACADEMIC QUALIFICATION


  • PhD, (Computing Communications and Electronics)
    University of Plymouth
  • M.Comp.Sc, (Sains Komputer)
    Universiti Malaya (UM)
  • B.Comp.Sc (Hons)(Management Information System), (Sains Komputer)
    Universiti Malaya (UM)

ADMINISTRATIVE DUTIES


  • Chief Digital Officer
    01 Feb 2024 - present (Office of The Chief Digital Officer, Deputy Vice-Chancellor (Development))
  • Associate Vice-Chancellor (Infrastructure & Information Services)
    15 Feb 2022 - 31 Jan 2024 (Associate Vice-Chancellor (Infrastructure and Information Services) Office, Associate Vice-Chancellor (Infrastructure and Information Services))
  • Associate Vice-Chancellor (Infrastructure & Information Services)
    15 Feb 2022 - 14 Feb 2025 (University Malaya)
  • Head of Security Research Group (SECREG)
    05 Mar 2012 - 31 Dec 2022 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Ahli Jawatankuasa Teknikal Projek Integrated Student Information System (PrInTIS)
    24 Aug 2017 - 31 Dec 2021 (University Malaya)
  • Pengerusi Jawatankuasa Kecil Perancangan Perolehan Komputer
    10 Sep 2021 - 31 Dec 2021 (University Malaya)
  • Ahli Jawatankuasa Pemandu Projek Integrated Student Information System (PrInTIS)
    01 Aug 2017 - 31 Dec 2021 (University Malaya)
  • Ahli Jawatankuasa Kerja Penambahbaikan Sistem UMEXPERT
    01 Feb 2020 - 31 Dec 2021 (University Malaya)
  • Ahli Majlis Pemandu ICT Universiti Malaya
    25 Apr 2019 - 31 Dec 2020 (Vice-Chancellor Office, Vice-Chancellor)
  • Deputy Dean of Research and Development
    01 Aug 2019 - 06 Oct 2019 (Dean Office, Faculty of Computer Science and Information Technology)
  • Deputy Dean of Research and Development
    01 Aug 2017 - 31 Jul 2019 (Dean Office, Faculty of Computer Science and Information Technology)
  • Pengerusi Jawatankuasa Pengguna ICT (JKPICT) Universiti Malaya
    03 May 2017 - 31 Dec 2018 (University Malaya)
  • Deputy Dean of Research and Development
    01 Aug 2016 - 31 Jul 2017 (Dean Office, Faculty of Computer Science and Information Technology)
  • Ahli Jawatankuasa Pemandu ICT UM
    01 Aug 2016 - 31 Jul 2017 (University Malaya)
  • Ketua Auditor Jaminan Kualiti FSKTM
    16 Apr 2015 - 31 Jul 2016 (Dean Office, Faculty of Computer Science and Information Technology)
  • Ketua Pasukan Petugas (Task Force)
    09 Jul 2014 - 31 Dec 2015 (Dean Office, Faculty of Computer Science and Information Technology)
  • Ahli Jawatankuasa Induk Projek Wireless Kolej Kediaman Universiti Malaya
    01 Dec 2014 - 01 Dec 2015 (University Malaya)
  • Penghulu Nadi
    09 Apr 2012 - 08 Apr 2014 (Faculty)
  • Panel for ICT and Computational Science Cluster
    01 May 2012 - 30 Apr 2013 (University Malaya)
  • Fellow/Treasurer Kolej Kediaman Bestari
    01 Feb 2006 - 31 Mar 2007 (Residental's College, Deputy Vice-Chancellor (Student Affairs))
  • Fellow/Treasurer Kolej Kediaman Tun Ahmad Zaidi
    17 Jan 2002 - 16 Jan 2006 (Residental's College, Deputy Vice-Chancellor (Student Affairs))

MEMBERSHIPS


  • PROFESSIONAL TECHNOLOGIST MALAYSIA BOARD OF TECHNOLOGISTS (MBOT), MEMBER
    Since 2021 (National)
  • GRADUATE TECHNOLOGIST MALAYSIA BOARD OF TECHNOLOGISTS (MBOT), MEMBER
    Since 2021 (National)
  • AKADEMIA KESELAMATAN SIBER MALAYSIA, COMMITTEE MEMBER
    2021 to 2022 (National)
  • IEEE COMPUTER SOCIETY, MEMBER
    2014 to 2021 (International)
  • IEEE YOUNG PROFESIONALS, MEMBER
    2014 to 2021 (International)
  • SENIOR MEMBER IEEE, MEMBER
    2013 to 2021 (International)
  • ASSOCIATION FOR COMPUTING MACHINERY, MEMBER
    2015 to 2019 (International)
  • IEEE COMMUNICATIONS SOCIETY, OTHERS
    2013 to 2018 (International)

AWARD AND STEWARDSHIP


  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2019 (University)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2018 (University)
  • EXCELLENCE SERVICE AWARD
    University of Malaya, 2017 (University)
  • (Ranked 4th) ScienceDirect Top 25 List of Most Downloaded Articles for Decision Sciences
    Elsevier ScienceDirect, 2016 (International)
  • (Ranked 12th) ScienceDirect Top 25 List of Most Downloaded Articles for Computer Science
    Elsevier ScienceDirect, 2016 (International)
  • (1st Runner) IEEE Young Professionals Technical Poster Competition 2016
    IEEE Young Professionals, 2016 (National)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2016 (University)
  • University of Malaya Excellence Award 2015 (Category: Excellent Lecturer (Sciences))
    Universiti Malaya, 2015 (University)
  • UM EXCELLENCE AWARD
    NAIB CANSELOR, 2015 (University)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2015 (University)
  • EXCELLENCE SERVICE AWARD
    University of Malaya, 2014 (University)
  • (Diamond) AUDiNQUIRE: Audio Source Identification Module with Ainuddin Wahid Abdul Wahab, Nor Badrul Anuar Jumaat, Mohd Yamani Idna Idris, Rosli Salleh and Zaidi Razak
    UiTM Pulau Pinang, 2014 (National)
  • (Gold Medal) AUDiNQUIRE: Audio Source Identification Module with Ainuddin Wahid Abdul Wahab, Nor Badrul Anuar Jumaat, Mohd Yamani Idna Idris, Rosli Salleh and Zaidi Razak
    UiTM Pulau Pinang, 2014 (National)
  • (Gold Medal) AUDiNQUIRE: Audio Source Identification Module with Ainuddin Wahid Abdul Wahab, Nor Badrul Anuar Jumaat, Mohd Yamani Idna Idris and Ahmad Fahmi Faiza
    Kementerian Sains,Teknology and Inovasi, 2014 (National)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2013 (University)
  • Best Poster Award, University of Malaya Researcher's Conference 2013
    Universiti Malaya, 2013 (University)
  • University of Malaya Excellence Award 2012 (Category: PhD Completion Period)
    Universiti Malaya, 2012 (University)
  • (Gold Medal) Malaysia Technology Expo (MTE) - Mobile Messaging Using Public Key Infrastructure: m-PKI
    Malaysian Association of Research Scientist (MARS), 2009 (National)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2008 (University)
  • (Gold Medal) S2MS: Secure Short Messaging System with Ainuddin Wahid Abdul Wahab, Dr. Omar Zakaria, Aliff Syazwan Othman and Lai Ngan Kuen
    19th International Invention Innovation Industrial Design & Technology Exhibition (ITEX), 2008 (National)
  • (Bronze Medal) Graphical Passwords Resistant To Shoulder Surfing with Omar Zakaria, Chandrakumar Sangapillai and Por Lip Yee.
    18th International Invention Innovation Industrial Design & Technology Exhibition (ITEX), 2007 (National)
  • (Gold Medal) Malaysia Technology Expo (MTE) - SANAsms - Secure Short Messaging System
    Malaysian Association of Research Scientist (MARS), 2007 (National)
  • (Gold Medal) SANAsms - Secure Short Messaging System
    British Invention Show (BIS), 2007 (International)

PUBLICATIONS


Article in Journal
WoS
  1. Alansari, Zainab; Anuar, Nor Badrul; Kamsin, Amirrudin; Belgaum, Mohammad Riyaz (2023). RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things, PEERJ COMPUTER SCIENCE. 9. doi:10.7717/peerj-cs.1309
  2. Altarturi, Hamza H. M.; Nor, Adibi Rahiman Md; Jaafar, Noor Ismawati; Anuar, Nor Badrul (2023). A bibliometric and content analysis of technological advancement applications in agricultural e-commerce, ELECTRONIC COMMERCE RESEARCH. . doi:10.1007/s10660-023-09670-z
  3. Altarturi, Hamza H. M.; Saadoon, Muntadher; Anuar, Nor Badrul (2023). Web content topic modeling using LDA and HTML tags, PEERJ COMPUTER SCIENCE. 9. doi:10.7717/peerj-cs.1459
  4. Aminuddin, Mohamad Amar Irsyad Mohd; Zaaba, Zarul Fitri; Samsudin, Azman; Zaki, Faiz; Anuar, Nor Badrul (2023). The rise of website fingerprinting on Tor: Analysis on techniques and assumptions, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 212. doi:10.1016/j.jnca.2023.103582
  5. Alansari, Zainab; Anuar, Nor Badrul; Kamsin, Amirrudin; Belgaum, Mohammad Riyaz (2022). A systematic review of routing attacks detection in wireless sensor networks, PEERJ COMPUTER SCIENCE. 8. doi:10.7717/peerj-cs.1135
  6. Daud, Nur Nasuha; Ab Hamid, Siti Hafizah; Saadoon, Muntadher; Seri, Chempaka; Hasan, Zati Hakim Azizul; Anuar, Nor Badrul (2022). Self-Configured Framework for scalable link prediction in twitter: Towards autonomous spark framework, KNOWLEDGE-BASED SYSTEMS. 255. doi:10.1016/j.knosys.2022.109713
  7. Elsersy, Wael F.; Anuar, Nor Badrul; Ab Razak, Mohd Faizal (2022). ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms, ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING. . doi:10.1007/s13369-022-06949-5
  8. Elsersy, Wael F.; Feizollah, Ali; Anuar, Nor Badrul (2022). The rise of obfuscated Android malware and impacts on detection methods, PEERJ COMPUTER SCIENCE. 8. doi:10.7717/peerj-cs.907
  9. Feizollah, Ali; Anuar, Nor Badrul; Mehdi, Riyadh; Firdaus, Ahmad; Sulaiman, Ainin (2022). Understanding COVID-19 Halal Vaccination Discourse on Facebook and Twitter Using Aspect-Based Sentiment Analysis and Text Emotion Analysis, INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH. 19(10). doi:10.3390/ijerph19106269
  10. Karnik, Tapan; Shivakumara, Palaiahnakote; Chowdhury, Pinaki Nath; Pal, Umapada; Lu, Tong; Anuar, Nor Badrul (2022). A new deep model for family and non-family photo identification, MULTIMEDIA TOOLS AND APPLICATIONS. . doi:10.1007/s11042-021-11631-3
  11. Mostafa, Mohamed M.; Feizollah, Ali; Anuar, Nor Badrul (2022). Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics, MULTIMEDIA TOOLS AND APPLICATIONS. . doi:10.1007/s11042-022-13908-7
  12. Onwuegbuzie, Innocent Uzougbo; Abd Razak, Shukor; Isnin, Ismail Fauzi; Al-dhaqm, Arafat; Anuar, Nor Badrul (2022). Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks, PLOS ONE. 17(3). doi:10.1371/journal.pone.0264683
  13. Zaki, Faiz; Afifi, Firdaus; Gani, Abdullah; Anuar, Nor Badrul (2022). GRANULAR NETWORK TRAFFIC CLASSIFICATION FOR STREAMING TRAFFIC USING INCREMENTAL LEARNING AND CLASSIFIER CHAIN, MALAYSIAN JOURNAL OF COMPUTER SCIENCE. 35(3), 264-280. doi:10.22452/mjcs.vol35no3.5
  14. Zaki, Faiz; Afifi, Firdaus; Razak, Shukor Abd; Gani, Abdullah; Anuar, Nor Badrul (2022). GRAIN: Granular multi-label encrypted traffic classification using classifier chain, COMPUTER NETWORKS. 213. doi:10.1016/j.comnet.2022.109084
  15. Hanif, H., Nasir, M., Ab Razak, M. F., Firdaus, A., & Anuar, N. B. (2021). The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches. Journal of Network and Computer Applications, 179, 24. doi: 10.1016/j.jnca.2021.103009
  16. Pour, A. K., Seng, W. C., Palaiahnakote, S., Tahaei, H., & Anuar, N. B. (2021). A survey on video content rating: taxonomy, challenges and open issues. Multimedia Tools and Applications, 80(16), 24121-24145. doi: 10.1007/s11042-021-10838-8
  17. Razak, C. S. A., Ab Hamid, S. H., Meon, H., Subramaniam, H. A. P., & Anuar, N. B. (2021). TWO-STEP MODEL FOR EMOTION DETECTION ON TWITTER USERS: A COVID-19 CASE STUDY IN MALAYSIA. Malaysian Journal of Computer Science, 34(4), 374-388. doi: 10.22452/mjcs.vol34no4.4
  18. Zaki, F., Gani, A., Tahaei, H., Furnell, S., & Anuar, N. B. (2021). Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic. Computer Networks, 184, 12. doi: 10.1016/j.comnet.2020.107617
  19. Ainin, S., Feizollah, A., Anuar, N. B., Abdullah, N. A. (2020). Sentiment analyses of multilingual tweets on halal tourism. Tourism Management Perspectives, 34, 8. doi: 10.1016/j.tmp.2020.100658
  20. Altarturi, H. H. M., Saadoon, M., & Anuar, N. B. (2020). Cyber parental control: A bibliometric study. Children and Youth Services Review, 116, 20. doi: 10.1016/j.childyouth.2020.105134
  21. Amalina, F., Hashem, I. A. T., Azizul, Z. H., Fong, A. T., Firdaus, A., Imran, M., & Anuar, N. B. (2020). Blending Big Data Analytics: Review on Challenges and a Recent Study. IEEE Access, 8, 3629-3645. doi: 10.1109/access.2019.2923270
  22. Daud, N. N., Hamid, S. H. A., Saadoon, M., Sahran, F., & Anuar, N. B. (2020). Applications of link prediction in social networks: A review. Journal of Network and Computer Applications, 166, 18. doi: 10.1016/j.jnca.2020.102716
  23. Hashem, I. A. T., Anuar, N. B., Marjani, M., Ahmed, E., Chiroma, H., Firdaus, A., . . . Gani, A. (2020). MapReduce scheduling algorithms: a review. Journal of Supercomputing, 76(7), 4915-4945. doi: 10.1007/s11227-018-2719-5
  24. Hashem, Ibrahim Abaker Targio; Anuar, Nor Badrul; Marjani, Mohsen; Ahmed, Ejaz; Chiroma, Haruna; Firdaus, Ahmad; Abdullah, Muhamad Taufik; Alotaibi, Faiz; Ali, Waleed Kamaleldin Mahmoud; Yaqoob, Ibrar; Gani, Abdullah (2020). MapReduce scheduling algorithms: a review, JOURNAL OF SUPERCOMPUTING. 76(7), 4915-4945. doi:10.1007/s11227-018-2719-5
  25. Sulaiman Ainin; Feizollah, Ali; Anuar, Nor Badrul; Abdullah, Nor Aniza (2020). Sentiment analyses of multilingual tweets on halal tourism, TOURISM MANAGEMENT PERSPECTIVES. 34. doi:10.1016/j.tmp.2020.100658
  26. Tahaei, H., Afifi, F., Asemi, A., Zaki, F., Anuar, N. B. (2020). The rise of traffic classification in IoT networks: A survey. Journal of Network and Computer Applications, 154, 20. doi: 10.1016/j.jnca.2020.102538
  27. Tahaei, Hamid; Afifi, Firdaus; Asemi, Adeleh; Zaki, Faiz; Anuar, Nor Badrul (2020). The rise of traffic classification in IoT networks: A survey, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 154. doi:10.1016/j.jnca.2020.102538
ESCI
  1. Ainin, Sulaiman; Feizollah, Ali; Anuar, Nor Badrul; Abdullah, Nor Aniza Binti; Sahran, Muhammad Nur Firdaus (2020). Examining what people tweet in relation to halal cosmetics-related topics, COGENT ARTS & HUMANITIES. 7(1). doi:10.1080/23311983.2020.1724593
Others
  1. Feizollah, A., Anuar, N. B., & Salleh, R. (2018). Evaluation of Network Traffic Analysis Using Fuzzy C-Means Clustering Algorithm in Mobile Malware Detection. Advanced Science Letters, 24(2), 929-932. doi:10.1166/asl.2018.10660
  2. Firdaus, A., Anuar, N. B., Ab Razak, M. F., Hashem, I. A. T., Bachok, S., & Sangaiah, A. K. (2018). Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management. Journal of Medical Systems, 42(6):112. doi:10.1007/s10916-018-0966-x
  3. Hanif, M. H. M., Adewole, K. S., Anuar, N. B., & Kamsin, A. (2018). Performance Evaluation of Machine Learning Algorithms for Spam Profile Detection on Twitter Using WEKA and RapidMiner. Advanced Science Letters, 24(2), 1043-1046. doi:10.1166/asl.2018.10683
  4. Hashem, I. A. T., Anuar, N. B., Marjani, M., Gani, A., Sangaiah, A. K., & Sakariyah, A. K. (2018). Multi-objective scheduling of MapReduce jobs in big data processing. Multimedia Tools and Applications, 77(8), 9979-9994. doi:10.1007/s11042-017-4685-y
  5. Tahaei, H., Bin Salleh, R., Ab Razak, M. F., Ko, K., & Anuar, N. B. (2018). Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario. IEEE Access, 6, 5182-5198. doi:10.1109/access.2017.2789281
  6. Adewole, K.S., Anuar, N.B., Kamsin, A., Varathan, K.D., Razak, S.A. (2017). Malicious accounts: Dark of the social networks. Journal of Network and Computer Applications, 79, 41-67. doi: 10.1016/j.jnca.2016.11.030
  7. Anwar, S., Inayat, Z., Zolkipli, M. F., Zain, J. M., Gani, A., Anuar, N. B., Khan, M.K., Chang, V. (2017). Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey. Journal of Network and Computer Applications, 93, 259-279. doi:10.1016/j.jnca.2017.06.001
  8. Feizollah, A., Anuar, N.B., Salleh, R., Suarez-Tangil, G., Furnell, S. (2017). AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Computers & Security, 65, 121-134. doi:10.1016/j.cose.2016.11.007
  9. Inayat, Z., Gani, A., Anuar, N.B., Anwar, S., Khan, M.K. (2017). Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions. Arabian Journal for Science and Engineering, 1-25. doi:10.1007/s13369-016-2400-3
  10. Jahanirad, M., Anuar, N.B., Wahab, A.W.A. (2017). Blind source computer device identification from recorded VoIP calls for forensic investigation. Forensic Science International, 272, 111-126. doi:10.1016/j.forsciint.2017.01.010
  11. Tahaei, H., Salleh, R., Khan, S., Izard, R., Choo, K.-K.R., Anuar, N.B. (2017). A multi-objective software defined network traffic measurement. Measurement, 95, 317-327. doi:10.1016/j.measurement.2016.10.026
  12. Tam, K., Feizollah, A., Anuar, N.B., Salleh, R., Cavallaro, L. (2017). The Evolution of Android Malware and Android Analysis Techniques. ACM Computing Surveys, 49(4), 1-41. doi:10.1145/3017427
  13. Ab Razak, M.F., Anuar, N.B., Salleh, R., Firdaus, A. (2016). The rise of "malware": Bibliometric analysis of malware study. Journal of Network and Computer Applications, 75, 58-76. doi:10.1016/j.jnca.2016.08.022
  14. Akhunzada, A., Gani, A., Anuar, N.B., Abdelaziz, A., Khan, M.K., Hayat, A., Khan, S.U. (2016). Secure and dependable software defined networks. Journal of Network and Computer Applications, 61, 199-221. doi:10.1016/j.jnca.2015.11.012
  15. Hashem, I.A.T., Anuar, N.B., Gani, A., Yaqoob, I., Xia, F., Khan, S.U. (2016). MapReduce: Review and open challenges. Scientometrics, 109(1), 389-422. doi:10.1007/s11192-016-1945-y
  16. Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Ahmed, E., Chiroma, H. (2016). The role of big data in smart city. International Journal of Information Management, 36(5), 748-758. doi:10.1016/j.ijinfomgt.2016.05.002
  17. Hussain, M., Al-Haiqi, A., Zaidan, A.A., Zaidan, B.B., Kiah, M.L.M., Anuar, N.B., Abdulnabi, M. (2016). The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive and Mobile Computing, 25, 1-25. doi:10.1016/j.pmcj.2015.12.001
  18. Inayat, Z., Gani, A., Anuar, N.B., Khan, M.K., Anwar, S. (2016). Intrusion response systems: Foundations, design, and challenges. Journal of Network and Computer Applications, 62, 53-74. doi:10.1016/j.jnca.2015.12.006
  19. Iqbal, S., Kiah, M.L.M., Anuar, N.B., Daghighi, B., Wahab, A.W.A., Khan, S. (2016). Service delivery models of cloud computing: security issues and open challenges. Security and Communication Networks, 9(17), 4726-4750. doi:10.1002/sec.1585
  20. Jahanirad, M., Wahab, A.W.A., Anuar, N.B. (2016). An evolution of image source camera attribution approaches. Forensic Science International, 262, 242-275. doi:10.1016/j.forsciint.2016.03.035
  21. Marefat, A., Noor, R.M., Anuar, N.B., Hussin, N. (2016). The Feasibility Of Employing IEEE802.11p In Electronic-Based Congestion Pricing Zone: A Comparative Study With RFID. Malaysian Journal of Computer Science, 29(4), 247-261.
  22. Narudin, F.A., Feizollah, A., Anuar, N.B., Gani, A. (2016). Evaluation of machine learning classifiers for mobile malware detection. Soft Computing, 20(1), 343-357. doi:10.1007/s00500-014-1511-6
  23. Savari, M., Wahab, A.W.A., Anuar, N.B. (2016). High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices. Forensic Science International, 266, 427-439. doi:10.1016/j.forsciint.2016.07.001
  24. Yacioob, I., Hashem, I.A.T., Gani, A., Mokhtar, S., Ahmed, E., Anuar, N.B., Vasilakos, A.V. (2016). Big data: From beginning to future. International Journal of Information Management, 36(6), 1231-1247. doi:10.1016/j.ijinfomgt.2016.07.009
  25. Akhunzada, A., Sookhak, M., Anuar, N.B., Gani, A., Ahmed, E., Shiraz, M., Furnell, S., Hayat, A., Khan, M.K. (2015). Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. Journal of Network and Computer Applications, 48, 44-57. doi:10.1016/j.jnca.2014.10.009
  26. Feizollah, A., Anuar, N.B., Salleh, R., Wahab, A.W.A. (2015). A review on feature selection in mobile malware detection. Digital Investigation, 13, 22-37. doi:10.1016/j.diin.2015.02.001
  27. Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A., Khan, S.U. (2015). The rise of "big data" on cloud computing: Review and open research issues. Information Systems, 47, 98-115. doi:10.1016/j.is.2014.07.006
  28. Hussain, M., Al-Haiqi, A., Zaidan, A.A., Zaidan, B.B., Kiah, M.L.M., Anuar, N.B., Abdulnabi, M. (2015). The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations. Computer Methods and Programs in Biomedicine, 122(3), 393-408. doi:10.1016/j.cmpb.2015.08.015
  29. Zin, S.M., Anuar, N.B., Kiah, M.L.M., Ahmedy, I. (2015). Survey of secure multipath routing protocols for WSNs. Journal of Network and Computer Applications, 55, 123-153. doi:10.1016/j.jnca.2015.04.018
  30. Jabbarpour, M.R., Jalooli, A., Shaghaghi, E., Noor, R.M., Rothkrantz, L., Khokhar, R.H., Anuar, N.B. (2014). Ant-based vehicle congestion avoidance system using vehicular networks. Engineering Applications of Artificial Intelligence, 36, 303-319. doi:10.1016/j.engappai.2014.08.001
  31. Jahanirad, M., Wahab, A.W.A., Anuar, N.B., Idris, M.Y.I., Ayub, M.N. (2014). Blind source mobile device identification based on recorded call. Engineering Applications of Artificial Intelligence, 36, 320-331. doi:10.1016/j.engappai.2014.08.008
  32. Sookhak, M., Akhunzada, A., Gani, A., Khan, M.K., Anuar, N.B. (2014). Towards Dynamic Remote Data Auditing in Computational Clouds. Scientific World Journal. doi:10.1155/2014/269357
  33. Anuar, N.B., Lai, N.K., Gani, A., Zakaria, O., Wahab, A.W.A. (2009), "Usability and Performance of Secure Mobile Messaging: M-PKI", WSEAS Transactions on Information Science & Applications, Volume 6, Issue 2, pp. 179-189.
  34. Anyi, K.W.U., Zainab, A.N., Anuar, N.B. (2009). Bibliometric studies on single journals: a review. Malaysian Journal of Library & Information Science, 14(1), 17-55.
  35. Gani, A, Yang, L., Anuar, N.B., Zakaria, O. (2009), "Implementing Lightweight Reservation Protocol for Mobile Network Using Hybrid Schema", WSEAS Transactions on Computers, Volume 8, Issue 3, pp. 417-428.
  36. Gani, A., Han, Q., Anuar, N.B., Zakaria, O. (2009), "Enhancing DSR Protocol Performance in Mobile Ad Hoc Network Using ACK Reply", WSEAS Transactions on Communications, Volume 8, Issue 2, pp. 227-236.
  37. Gani, A., Li, X., Yang, L., Zakaria, O., Anuar, N.B. (2009), "Multi-Bandwidth Data Path Design for 5G Wireless Mobile Internets", WSEAS Transactions on Information Science & Applications, Volume 6, Issue 2, pp. 159-168.
  38. Zainab, A.N., Anyi, K.W.U., Anuar, N.B. (2009). A Single Journal Study: Malaysian Journal of Computer Science. Malaysian Journal of Computer Science, 22(1), 1-18.
  39. Anuar, N.B., Lai, N.K., Gani, A., Zakaria, O., Wahab, A.W.A. (2008), "GSM mobile SMS/MMS using public key infrastructure: m-PKI", WSEAS Transactions on Computers, Volume 7, Issue 8, pp. 1219-1229.
  40. Anuar, N.B., Sallehudin, H., Gani, A., Zakari, O. (2008). Identifying False Alarm for Network Intrusion Detection System Using Hybrid Data Mining And Decision Tree. Malaysian Journal of Computer Science, 21(2), 101-115.
  41. Anuar, N.B., Zakaria, O., Chong, W.O. (2006), "Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration", Journal of Issues in Informing Science and Information Technology, Volume 3. pp. 45 56.
  42. Anuar, N.B., Yaacob, M., Idna, M.Y. (2004), RedAlert: Approach for Firewall Policies Update Mechanism , WSEAS Transaction on Computer, Volume 3, Issue 5, pp. 1451- 1454.
  43. Gani, A., Zakaria, O., Anuar, N.B. (2004), A Markov Decision Process Model for Traffic Prioritisation Provision , Journal of Issues in Informing Science and Information Technology, Volume 1, pp 905 913.
  44. Zainab, A.N., Abdullah, A., Anuar, N.B. (2004), Building Online Historical Resources Collaboratively: Making the Most of a Digital Library to Reinforce ICT Skills in Malaysia , Journal of Information Development, Volume 20, Issue 3, pp. 200 210.
Chapter in Books
  1. Alansari, Z., Anuar, N. B., Kamsin, A., Soomro, S., & Belgaum, M. R. (2019). Evaluation of IoT-based computational intelligence tools for DNA sequence analysis in bioinformatics. In Progress in Advanced Computing and Intelligent Engineering, pp. 339-350. Springer, Singapore. doi:10.1007/978-981-13-0224-4_31
  2. Zamanian, Z., Feizollah, A., Anuar, N. B., Kiah, L. B. M., Srikanth, K., & Kumar, S. (2019). User Profiling in Anomaly Detection of Authorization Logs. In Computational Science and Technology, Lecture Notes in Electrical Engineering, vol. 481, pp. 59-65. Springer, Singapore. doi:10.1007/978-981-13-2622-6_6
  3. Alansari, Z., Anuar, N. B., Kamsin, A., Soomro, S., Belgaum, M. R., Miraz, M. H., & Alshaer, J. (2018). Challenges of Internet of Things and Big Data Integration. In Emerging Technologies in Computing, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST). vol 200, pp. 47-55. Springer, Cham. doi:10.1007/978-3-319-95450-9_4
  4. Feizollah, A., Anuar, N. B., Salleh, R., & Amalina, F. (2015). Comparative Evaluation of Ensemble Learning and Supervised Learning in Android Malwares Using Network-Based Analysis. In Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering, vol. 315, pp. 1025-1035. Springer. doi:10.1007/978-3-319-07674-4_95
  5. Jahanirad, M., Wahab, A. W. A., & Anuar, N. B. (2015). Blind Source Computer Device Identification from Recorded Calls. In Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering, vol. 315, pp. 263-275. Springer. doi: 10.1007/978-3-319-07674-4_27
  6. Feizollah, A., Shamshirband, S., Anuar, N.B, Salleh, R., Kiah, M.L.M (2013). Anomaly Detection Using Cooperative Fuzzy Logic Controller. Intelligent Robotics Systems: Inspiring the NEXT. vol 376, pp 220-231 . Springer Berlin Heidelberg. doi: 10.1007/978-3-642-40409-2_19
  7. Anuar, N. B., Papadaki, M., Furnell, S. and Clarke, N. (2012). A Response Strategy Model for Intrusion Response Systems. In Gritzalis, D., Furnell, S., Theoharidou, M. (Eds.), Information Security and Privacy Research (573-578). Springer Berlin Heidelberg. doi: 10.1007/978-3-642-30436-1_51
  8. Nor Badrul Anuar, "Firewall". Chapter in the Selected Topics In Installation of Client-Server Applications. Universiti Malaya Press. 2006.
Article in Proceeding
  1. Alansari, Z., Anuar, N. B., Kamsin, A., Soomro, S., & Belgaum, M. R. (2017, August). The Internet of Things adoption in healthcare applications. In Engineering Technologies and Social Sciences (ICETSS), 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences, ICETSS, pp. 1-5. IEEE.
  2. Alansari, Z., Anuar, N. B., Kamsin, A., Soomro, S., & Belgaum, M. R. (2017, November). Computational intelligence tools and databases in bioinformatics. In Engineering Technologies and Applied Sciences (ICETAS), 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences, pp. 1-6. IEEE.
  3. Nakhai, P. H., & Anuar, N. B. (2017, November). Performance evaluation of virtual desktop operating systems in virtual desktop infrastructure. In Application, Information and Network Security (AINS), 2017 IEEE Conference on Applications, Information and Network Security, AINS, pp. 105-110. IEEE.
  4. Hussain, M., Wahab, A.W.A., Anuar, N.B., Salleh, R., Noor, R.M., "Pixel value differencing steganography techniques: Analysis and open challenge", 2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015, 20 August 2015, Article number 7216859, Pages 21-22
  5. Feizollah, A., Anuar, N. B., Salleh, R., & Amalina, F. (2014, August). Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. In Biometrics and Security Technologies (ISBAST), 2014 International Symposium on Biometrics and Security Technologies, pp. 193-197. IEEE. doi: 10.1109/ISBAST.2014.7013120
  6. Eslahi, M., Salleh, R. and Anuar, N.B., (2012), "MoBots: A New Generation of Botnets on Mobile Devices and Networks", Proceedings of the IEEE International Symposium on Computer Applications and Industrial Electronics (ISCAIE), Kota Kinabalu, Malaysia.
  7. Eslahi, M., Salleh, R. and Anuar, N.B., (2012), "Bots and Botnets: An Overview of Characteristics, Detection and Challenges", Proceedings of the IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia.
  8. Anuar, N.B., Furnell, S.M., Papadaki, M. Clarke, N.L. (2011), "A Risk Index Model for Security Incident Prioritisation", in Proceedings of the 9th Australian Information Security Management Conference (ASIM 2011), Perth, Australia, pp. 25-39.
  9. Anuar, N.B., Papadaki, M., Furnell, S.M., Clarke, N.L., (2010), "An investigation and survey of response options for Intrusion Response Systems (IRSs)", Proceedings of the 9th Annual Information Security South Africa Conference, Sandton, South Africa, pp. 1- 8.
  10. Anuar, N.B., Ibrahim, M.A., Wahab, A.W.A., Zakaria, O. (2008), "SANAsms: Secure Short Messaging System for Secure GSM Mobile Communication", Proceedings of ECIW 2008 The 7th European Conference on Information Warfare and Security, University of Plymouth, UK, 30 June - 1 July 2008, pp. 1-6.
  11. Anuar, N.B., Lai, N.K., Zakaria, O., Gani, A. (2008), "Secure Mobile Messaging using Public Key Infrastructure: m-PKI", 12th WSEAS International Conference on Computers, WSEAS Press, 23-25 July 2008, Heraklion, Crete, Greece, pp. 76-81.
  12. Anuar, N.B., Lai, N.K., Zakaria, O., Gani, A., Wahab, A.W.A. (2008), "Usability and Performance of Secure Mobile Messaging using Public Key Infrastructure", 7th WSEAS International Conference on Data Networks, Communications & Computers (DNCOCO '08), WSEAS Press, Bucharest, Romania, pp. 29-42.
  13. Li, X., Gani, A., Zakaria, O., Anua, N.B. (2008), "Mix- Bandwidth Data Path Design for 5G Real Wireless World", 12th WSEAS International Conference on Communications, WSEAS Press, 23-25 July 2008, Heraklion, Crete, Greece, pp. 316-320.
  14. Abdullah Gani,Omar Zakaria, Nor Badrul Anuar and Zolkepli Buang, Integrating Agent Technology In Teaching And Learning Of Computer Security Course In Tertiary Level , Int. Conf. On Engineering And Ict 2007, Equatorial Hotel, Melaka. 27th-28th November 2007
  15. Akash Rosen R.K and Nor Badrul Anuar, Dynamic Network Traffic Per Host Controlling System Using Normal Prediction Interval , In Proceeding Of 2nd International Conference On Informatics (Informatics 2007), Kuala Lumpur, 27th - 28th November 2007.
  16. Omar Zakaria, Abdullah Gani, Mustaffa Mohd Nor And Nor Badrul Anuar, Reengineering Information Security Culture Formulation Through Management Perspective , ICEEI, Bandung, Indonesia, 17-19 June 2007: 638-641
  17. Ainuddin Wahid Abdul Wahab, Mohd. Yamani Idna Idris, Nor Badrul Anuar & Mohammad Rezal Kamel Ariffin, An FPGA Implementation Of Stream Cipher Encryption Based On Statistical Approach , Computer Science And Mathematics Symposium (CSMS 2006), Terangganu, MY, 8th - 9th November 2006.
  18. Nor Badrul Anuar, Omar Zakaria, and Chong Wei Yao, "Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration", Informing Science + Information Technology Education joint Conference, Greater Manchester, England, 25-28 Jun 2006,
  19. A.N.Zainab, Shobana Rajendran Abrizah Abdullah, Bustamin Ahmad and Nor Badrul Anuar, Integrated Approach for the Multimedia Retrieval and Database Management of a Collaborative Digital Library , IN Proceeding of 1st International Conference on Informatics 2004 . Kuala Lumpur, Malaysia, 28 30 July 2004.
  20. Abdullah Gani, Omar Zakaria and Nor Badrul Anuar, A Markov Decision Process Model for Traffic Prioritisation Provision , Informing Scienceand IT Education (InSITE 2004), Rockhampton, Australia. June 2004.
  21. Abrizah Abdullah, A.N.Zainab, Nor Badrul Anuar, Bustamin Ahmad and Shobana Rajendran, Open-Source Approach in Developing a Collaborative Digital Library for School Projects , IN Proceeding of 1st International Conference on Informatics 2004 . Kuala Lumpur, Malaysia, 28 30 July 2004.
  22. Nor Badrul Anuar and Chong Wei Yoa, Dynamic and Manageable Honeypot: Honeyd@WEB , IN Proceeding of 1st International Conference on Informatics 2004 . Kuala Lumpur, Malaysia, 28-30 July 2004.
  23. Nor Badrul Anuar and Lai Siew Cheng, Malaysian usage of Open Source in Local Residential College Network Management, IN Proceeding of 4th Wseas International Conference On Information Science And Applications (ISA 2004), Florida, USA, 21-23 April, 2004.
  24. Nor Badrul Anuar, Mashkuri Yaacob, Mohd Yamani Idna, RedAlert: Approach for Firewall Policies Update Mechanism ,IN Proceeding of 4th Wseas International Conference On Information Science And Applications (ISA 2004), Florida, USA, 21-23 April, 2004.
  25. AN. Zainab, Abdullah Abrizah, Nor Badrul Anuar, Inculcating ICT Skills through a Collabrative Digital Library Initiative for Education Use , The 6th International Conference of Asian Digital Libraries (ICADL 2003) , Kuala Lumpur, Malaysia, 8-11 Dec, 2003. pp 489 - 492.
Other Publications
  1. Hussain, A., Luqman, W., Anuar, N. B., Kiah, M. L. M., & Kumar, S. (2018). Digital Rights Management for Cloud Based Storage Providers. Technical Report. Universiti Malaya, Kuala Lumpur, Malaysia. - Technical Report
  2. Zamanian, A., Feizollah, A., Anuar, NB., Kiah, M. L. M., Srikanth, K., and Kumar, S. (2017). Anomaly Detection in Policy Authorisation Activity Log. Technical Report, Universiti Malaya, Kuala Lumpur, Malaysia. - Technical Report

RESEARCH PROJECT


National
  1. 2007 - 2008, Internal University Fund (FS227-2007C)
    SMS/MMS Encryption For Secure Mobile Communication Using Public Key Infrastructure ( Principal Investigator(PI))

CONSULTANCY PROJECT


  • Service Works On Proposal Assessment On Big Data Solution, Sarawak Multimedia Authority
    01 Jan 2018 - 01 Jan 2018 (National)
  • Small Proof-of-Concept Data Science Project, Petroliam Nasional Berhad
    01 Jan 2017 - 01 Jan 2018 (National)
  • Kajian Pembangunan Dokumen Portal Staf Jabatan Pengajian Tinggi, Jabatan Pengajian Tinggi
    01 Jan 2018 - 01 Jan 2018 (National)
  • Data Analytic Beginner Level, Kumpulan Wang Simpanan Pekerja (KWSP)
    01 Jan 2017 - 01 Jan 2018 (National)
  • E-Rezeki Database Revision, MDEC
    01 Jan 2017 - 01 Jan 2017 (National)
  • Pembangunan Laman Web Pencil.My, Pencil Brand Sdn. Bhd.
    01 Jan 2012 - 01 Jan 2013 (National)

ACADEMIC/PROF. SERVICES


Evaluation
  1. (2022) Panel Penilai Skim Geran Penyelidikan Pembangunan Prototaip (Prgs), University, (Internal Evaluator)
  2. (2020) Panel Penilai Skim Geran Penyelidikan Pembangunan Prototaip (PRGS) Universiti Malaya , (Reviewer)
  3. (2019) Panel Penilai Geran Penyelidikan Universiti Universiti Islam Sains Malaysia, (Reviewer)
  4. (2018) External Evaluator Research Grant Yayasan Teknologi Petronas , (Scientific Committee)
  5. (2017) Expert Evaluator PRESTIGE Post-doctoral Research Programme Fellowship France , (Expert Evaluator)
  6. (2013) Reviewer for Computer Standards & Interface, (Reviewer)
  7. (2013) Reviewer for Journal of KSII Transactions on Internet and Information Systems , (Reviewer)
  8. (2013) Panel Penilai Anugerah Inovasi Jabatan Perdana Menteri, Malaysia, (Reviewer)
  9. (2012) Reviewer for Security and Communications Networks , (Reviewer)
  10. (2012) Reviewer and Committee Member for the 11th European Conference on Information Warfare and Security (ECIW-2012) , (Reviewer)
  11. (2012) Reviewer for Journal of Network and Computer Applications , (Reviewer)
  12. (2012) Reviewer for Communications and Computer Security , (Reviewer)
  13. (2005) Reviewer for Informing Science + Information Technology Education Conference, InSITE. , (Reviewer)
  14. (2005) Internal Examiner for Master of Software Engineering, "Efficient Control of Virus Propagation" , (Internal Examiner)
  15. (2004) Reviewer for International Conference on Informatics 2004 , (Reviewer)
Contribution to external organisation
  1. (2023) Pakar Bidang Penjana-Kpt Career Advancement Programme (Penjana-Kpt Cap), National, (Resource Person)
  2. (2021) Ahli Action Lab Bagi Pelan Transformasi Universiti malaya, Universiti Malaya
  3. (2019) Technical Program Chair, IEEE Computer Society Conferences (2019) , IEEE Computer Society Malaysia
  4. (2017) Working Group on ISO/IEC JTC 1/SC 27/WG 4 - Security controls and services, International Standard Organization (ISO), International
  5. (2016) Member of the ASM Task Force on Cyber Security, Academy of Science Malaysia
  6. (2014) Ahli Jawatankuasa Kurikulum Jabatan Bagi Program Sarjana, Faculty of Computer Science and Information Technology
  7. (2013) Ahli Panel Kluster Penyelidikan Computation and Informatic (C+i), Universiti Malaya

SUPERVISION


Postgraduate Student
PhD/ Doctoral
  1. (2018) Software Defined Network, Muhammad Nur Firdaus Bin Sahran
  2. (2018) Deep Network Analytics: Granular Application Classification using Machine Learning, Muhammad Faiz bin Mohd Zaki
  3. (2014) Computer Network Security, Wael Farouk Mohamed Elsersy
  4. (2014) Computer Network Security, Mohd Faizal Bin Ab Razak
  5. (2014) Computer Network Security, Elham Babaee Salar Abadi
  6. (2014) Computer Network Security, Ali Feizollah
  7. (2014) Computer Network Security, Ahmad Fahmi Faiza
  8. (2014) Computer Network Security, Adewole Kayode Sakariah
  9. (2013) Computer Network Security, Muzammil Hussain
  10. (2013) Computer Network Security, Emran Bin Mohd Tamil
  11. (2013) Computer Network Security, Ahmad Firdaus Bin Zainal Abidin
  12. (2013) A Controller-Agnostic Random Oracle Based Intrusion Detection Method in Software Defined Networks, Adnan
  13. (2012) Optimising Acoustic Features for Source Mobile Device Identification using Spectral Analysis Techniques, Mehdi Jahanirad
  14. (2012) Computer Network Security, Salman Iqbal Malik
  15. (2012) Computer Network Security, Ibrahim Abaker Targio Hashem
  16. (2012) Computer Network Security, Asiah Binti Haron
  17. (2011) Cooperative Multi Agents For Intelligent Instrusion Detection And Prevention Systems, Shahaboddin Shamshirband
  18. (2011) Computer Network Security, Shazana Binti Md Zin
Master
  1. (2015) Computer Network Security, Firdaus Afifi Md Isa
  2. (2013) Electrical Network Frequency Based Audio Forgery Detection, Maryam Savari
  3. (2013) An Optimized VANET-Based Congestion Pricing Zone Management Model (OVB-CPZ), Alireza Marefat Vayghani
  4. (2012) Computer Network Security, Tharmaraj A/L Batmanathan
  5. (2012) A Comparative Study Of Machine Learning Methods For Android Malware Detection, Fairuz Amalina Binti Narudin
  6. (2011) An Evaluation Study Of Mobile Botnet Detection Using Machine Learning Classifiers, Ali Feizollah
  7. (2011) An Evaluation Of Mobile Device Identification Using Spectral Features, Koo Sue Lynn
  8. (2008) Security Enhancements For Globus-Based (Grid) Local Area Cluster Using Port-Knocking, Nor Azylia Binti Ahmad Azam
  9. (2007) Pengenalpastian Amaran Palsu Positif Menggunakan Perlombongan Data Dan Pepohon Keputusan, Hasimi Bin Sallehudin
  10. (2007) Mobile Messaging Using Public Key Infrastructure:M-PKI, Lai Ngan Kuen
  11. (2004) Dynamic and Manageable Honeypot : Honeyd@Web., Chong Wei Yoa

TEACHING


Bachelor
  1. (2020) WIA1005 - Network Technology Foundation
  2. (2020) WIC2001 - Advanced Network Technology

PATENT/IPR


  • Centralized Security Information and Event Management System
    Copyright (National)
  • Deep Network Analytics: Granular flow-level traffic identification for detailed network management
    Copyright (National)
  • Data Science with Python Module
    Copyright (National)
  • Getting started with Data Analytics
    Copyright (National)
  • System for Malware Detection in Android Based Communication Devices
    Filed/Pending (National)
  • Blind Source Mobile Device Identification Based on Recorded Call
    Filed/Pending (National)

SOCIAL RESPONSIBILITY ACTIVITIES


  • Ahli Jawatankuasa Akademia Keselamatan Siber Malaysia (Csam), (01 Jan 2021 - 31 Dec 2022)
  • Executive Committee Member IEEE Computer Society Malaysia, (01 Jan 2019 - 31 Dec 2020)
  • Instructor for The 2017 Cau-UM Global Summer School Artificial Intelligence, (22 Jul 2017 - 29 Jul 2017)
  • Instructor for The 2017 Cau-UM Global Winter School Big Data Analytics, (12 Feb 2017 - 19 Feb 2017)
  • Penghulu Nadi, Faculty of Computer Science and Information Technology, (09 Apr 2012 - 08 Apr 2014)
  • Penghulu Nadi, Fakulti Sains Komputer dan Teknologi Maklumat, (22 Jan 2006 - 20 Jan 2008)