ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Secure PIN-Entry Method Using One-Time PIN (OTP)
2023
Author(s) : Miss Laiha Binti Mat Kiah,Por Lip Yee @ Por Khoon Sun Source : IEEE Access DOI : 10.1109/ACCESS.2023.3243114 |
2. |
A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations
2023
Author(s) : Miss Laiha Binti Mat Kiah Source : Computers, Materials and Continua DOI : 10.32604/cmc.2023.036138 |
3. |
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
2022
Author(s) : Miss Laiha Binti Mat Kiah,Mohd Yamani Idna Bin Idris Source : IEEE ACCESS DOI : 10.1109/ACCESS.2022.3171853 |
4. |
Code-Switching in Automatic Speech Recognition: The Issues and Future Directions
2022
Source : APPLIED SCIENCES-BASEL DOI : 10.3390/app12199541 |
5. |
Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization
2022
Source : MOBILE INFORMATION SYSTEMS DOI : 10.1155/2022/9109300 |
6. |
Driver Behavior Profiling and Recognition Using Deep-Learning Methods: In Accordance with Traffic Regulations and Experts Guidelines
2022
Author(s) : Miss Laiha Binti Mat Kiah,Por Lip Yee @ Por Khoon Sun Source : INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH DOI : 10.3390/ijerph19031470 |
7. |
EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY
2022
Author(s) : Miss Laiha Binti Mat Kiah,Burhan Ul Islam Khan Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE DOI : 10.22452/mjcs.vol35no3.1 |
8. |
Authenticated Encryption Schemes: A Systematic Review
2022
Author(s) : Miss Laiha Binti Mat Kiah,Mohd Yamani Idna Bin Idris Source : IEEE ACCESS DOI : 10.1109/ACCESS.2022.3147201 |
9. |
Machine learning-based offline signature verification systems: A systematic review
2021
Author(s) : Rodina Binti Ahmad,Miss Laiha Binti Mat Kiah Source : SIGNAL PROCESSING-IMAGE COMMUNICATION DOI : 10.1016/j.image.2021.116139 |
10. |
A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET
2021
Source : JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING DOI : 10.1007/s12652-020-02279-2 |
11. |
BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts
2021
Author(s) : Miss Laiha Binti Mat Kiah,Azah Anir Binti Norman Source : JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE DOI : 10.1080/10919392.2022.2028530 |
12. |
Wireless backhaul network's capacity optimization using time series forecasting approach
2021
Author(s) : Miss Laiha Binti Mat Kiah,Saaidal Razalli Bin Azzuhri,Zati Hakim Binti Azizul Hasan,Muhammad Reza Bin Z'aba Source : JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING DOI : 10.1007/s12652-020-02209-2 |
13. |
Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs
2021
Author(s) : Miss Laiha Binti Mat Kiah Source : IEEE ACCESS DOI : 10.1109/ACCESS.2021.3073343 |
14. |
A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions
2021
Author(s) : Miss Laiha Binti Mat Kiah,Por Lip Yee @ Por Khoon Sun Source : PEERJ COMPUTER SCIENCE DOI : 10.7717/peerj-cs.632 |
15. |
A Frictionless and Secure User Authentication in Web-Based Premium Applications
2021
Author(s) : Miss Laiha Binti Mat Kiah Source : IEEE ACCESS DOI : 10.1109/ACCESS.2021.3110310 |
16. |
A systematic review of PIN-entry methods resistant to shoulder-surfing attacks
2021
Author(s) : Miss Laiha Binti Mat Kiah,Por Lip Yee @ Por Khoon Sun Source : COMPUTERS & SECURITY DOI : 10.1016/j.cose.2020.102116 |
17. |
Wireless backhaul network s capacity optimization using time series forecasting approach
2021
Source : Journal of Ambient Intelligence and Humanized Computing DOI : https://doi.org/10.1007/s12652-020-02209-2 |
18. |
Investigating the Effect of Social and Cultural Factors on Drivers in Malaysia: A Naturalistic Driving Study
2021
Author(s) : Miss Laiha Binti Mat Kiah,Por Lip Yee @ Por Khoon Sun Source : INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH DOI : 10.3390/ijerph182211740 |
19. |
Compliance with bring your own device security policies in organizations: A systematic literature review
2020
Author(s) : Miss Laiha Binti Mat Kiah,Azah Anir Binti Norman Source : COMPUTERS & SECURITY DOI : 10.1016/j.cose.2020.101998 |
20. |
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things
2020
Author(s) : Miss Laiha Binti Mat Kiah,Mohd Yamani Idna Bin Idris,Rafidah Binti Md Noor,Ismail Bin Ahmedy,Tey Kok Soon,Muneer Ahmad Source : SENSORS |
21. |
DM-GKM: A key management scheme for dynamic group based applications
2020
Author(s) : Miss Laiha Binti Mat Kiah Source : Computer Networks |
22. |
BYOD Policy Compliance: Risks and Strategies in Organizations
2020
Author(s) : Miss Laiha Binti Mat Kiah Source : JOURNAL OF COMPUTER INFORMATION SYSTEMS DOI : 10.1080/08874417.2019.1703225 |
23. |
Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges
2020
Author(s) : Miss Laiha Binti Mat Kiah Source : IEEE ACCESS DOI : 10.1109/ACCESS.2020.2970430 |
24. |
Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting
2020
Author(s) : Miss Laiha Binti Mat Kiah,Saaidal Razalli Bin Azzuhri,Zati Hakim Binti Azizul Hasan,Muhammad Shahreeza Safiruz Bin Kassim Source : IEEE ACCESS DOI : 10.1109/ACCESS.2020.2970224 |
25. |
Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting
2020
Author(s) : Miss Laiha Binti Mat Kiah,Saaidal Razalli Bin Azzuhri,Zati Hakim Binti Azizul Hasan,Muhammad Reza Bin Z'aba Source : IEEE ACCESS DOI : 10.1109/ACCESS.2020.2970224 |
26. |
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things
2020
Source : SENSORS DOI : 10.3390/s20010283 |
27. |
Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges
2020
Author(s) : Miss Laiha Binti Mat Kiah Source : IEEE ACCESS |
28. |
An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks
2020
Source : AD HOC & SENSOR WIRELESS NETWORKS |
29. |
A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb
2020
Author(s) : Miss Laiha Binti Mat Kiah Source : IEEE COMMUNICATIONS LETTERS |
30. |
Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey
2020
Author(s) : Miss Laiha Binti Mat Kiah,Rafidah Binti Md Noor,Nor Badrul Anuar Bin Juma'at,Muneer Ahmad Source : JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS DOI : 10.1166/jmihi.2020.3178 |
31. |
An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks
2020
Author(s) : Miss Laiha Binti Mat Kiah,Rafidah Binti Md Noor,Saaidal Razalli Bin Azzuhri,Ismail Bin Ahmedy,Shabana Anjum Shaik Source : AD HOC & SENSOR WIRELESS NETWORKS |
32. |
A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb
2020
Author(s) : Miss Laiha Binti Mat Kiah Source : IEEE COMMUNICATIONS LETTERS DOI : 10.1109/LCOMM.2020.2966198 |
33. |
An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks
2020
Author(s) : Miss Laiha Binti Mat Kiah,Rafidah Binti Md Noor,Saaidal Razalli Bin Azzuhri,Ismail Bin Ahmedy Source : Ad Hoc & Sensor Wireless Networks |
34. |
DM-GKM: A key management scheme for dynamic group based applications
2020
Author(s) : Miss Laiha Binti Mat Kiah Source : COMPUTER NETWORKS DOI : 10.1016/j.comnet.2020.107476 |
35. |
QoS Enabled Layered based Clustering for Reactive Flooding in Internet of Things
2019
Source : Symmetry |
36. |
QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things
2019
Source : SYMMETRY-BASEL |
37. |
Enhancement of Cybersecurity Awareness Program on Personal Data Protection Among Youngsters in Malaysia: An Assessment
2019
Author(s) : Miss Laiha Binti Mat Kiah,Suraya Binti Hamid Source : Malaysian Journal of Computer Science |
38. |
ENHANCEMENT OF CYBERSECURITY AWARENESS PROGRAM ON PERSONAL DATA PROTECTION AMONG YOUNGSTERS IN MALAYSIA: AN ASSESSMENT
2019
Author(s) : Miss Laiha Binti Mat Kiah,Suraya Binti Hamid Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
39. |
Modelling Traffic Congestion based on Air Quality for Greener Environment: An Empirical Study
2019
Author(s) : Miss Laiha Binti Mat Kiah,Nornazlita Binti Hussin,Rafidah Binti Md Noor,Ismail Bin Ahmedy,Nasrin Agha Mohammadi Source : IEEE ACCESS DOI : 10.1109/ACCESS.2019.2914672 |
40. |
Comprehensive review and analysis of anti-malware apps for smartphones
2019
Author(s) : Miss Laiha Binti Mat Kiah Source : Telecommunication Systems |
41. |
Review on Security of Internet of Things Authentication Mechanism
2019
Author(s) : Miss Laiha Binti Mat Kiah,Norjihan Binti Abdul Ghani,Mohd Yamani Idna Bin Idris,Rafidah Binti Md Noor,Nor Badrul Anuar Bin Juma'at,Ismail Bin Ahmedy Source : IEEE Access |
42. |
Comprehensive review and analysis of anti-malware apps for smartphones
2019
Author(s) : Miss Laiha Binti Mat Kiah Source : TELECOMMUNICATION SYSTEMS |
43. |
Modeling Traffic Congestion Based on Air Quality for Greener Environment: An Empirical Study
2019
Author(s) : Miss Laiha Binti Mat Kiah,Nornazlita Binti Hussin,Rafidah Binti Md Noor,Ismail Bin Ahmedy,Nasrin Agha Mohammadi,Shabana Anjum Shaik Source : IEEE ACCESS |
44. |
Review on Security of Internet of Things Authentication Mechanism
2019
Author(s) : Miss Laiha Binti Mat Kiah,Norjihan Binti Abdul Ghani,Mohd Yamani Idna Bin Idris,Rafidah Binti Md Noor,Nor Badrul Anuar Bin Juma'at,Ismail Bin Ahmedy Source : IEEE ACCESS |
45. |
DM-GKM: A key management scheme for dynamic group based applications
2018
Author(s) : Miss Laiha Binti Mat Kiah Source : Wireless Personal Communications |
46. |
A security framework for mHealth apps on Android platform
2018
Author(s) : Miss Laiha Binti Mat Kiah Source : Computers & Security |
47. |
Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients
2018
Author(s) : Miss Laiha Binti Mat Kiah Source : Health and Technology |
48. |
Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey
2018
Author(s) : Miss Laiha Binti Mat Kiah Source : International Journal on Advanced Science Engineering Information Technology |
49. |
A Distributed Framework for Health Information Exchange Using Smartphone Technologies
2017
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Biomedical Informatics |
50. |
Security Issues and Future Challenges of Cloud Service Authentication
2017
Author(s) : Miss Laiha Binti Mat Kiah,Ang Tan Fong Source : Acta Polytechnica Hungarica DOI : 10.12700/APH.14.2.2017.2.4 |
51. |
A review of smart home applications based on Internet of Things
2017
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Network and Computer Applications DOI : 10.1016/j.jnca.2017.08.017 |
52. |
Host mobility key management in dynamic secure group communication
2017
Author(s) : Miss Laiha Binti Mat Kiah Source : Wireless Networks |
53. |
On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service
2016
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Network and Computer Applications DOI : https://doi.org/10.1016/j.jnca. |
54. |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
2016
Source : PERVASIVE AND MOBILE COMPUTING DOI : 10.1016/j.pmcj.2015.12.001 |
55. |
Service Delivery Models of Cloud Computing: Security Issues and Open Challenges
2016
Author(s) : Miss Laiha Binti Mat Kiah Source : Security and Communication Networks DOI : 10.1002/sec.1585 |
56. |
Diagnosing Breast Cancer with an Improved Artificial Immune Recognition System
2016
Author(s) : Miss Laiha Binti Mat Kiah Source : Soft Computing |
57. |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
2016
Author(s) : Miss Laiha Binti Mat Kiah Source : Pervasive and Mobile Computing |
58. |
A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Medical Systems |
59. |
Adaptive neuro-fuzzy evaluation of wind farm power production as function of wind speed and direction
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Stochastic Environmental Research and Risk Assessment |
60. |
RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Medical & Biological Engineering & Computing |
61. |
Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of biomedical informatics |
62. |
Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Circuits Systems and Computers |
63. |
Survey of secure multipath routing protocols for WSNs
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Network and Computer Applications |
64. |
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Grid Computing |
65. |
Multi-Criteria Analysis for OS-EMR Software Selection Problem: A Comparative Study
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Decision Support Systems |
66. |
Decreasing environmental impacts of cropping systems using LCA and multi-objective genetic algorithm
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Cleaner Production |
67. |
A systematic review of approaches to assessing Cybersecurity awareness
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Kybernetes |
68. |
The Landscape of Research on Smartphone Medical Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Computer Methods and Programs in Biomedicine |
69. |
Potential of support vector regression for optimization of lens system
2015
Source : Computer-Aided Design |
70. |
Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm
2015
Author(s) : Miss Laiha Binti Mat Kiah Source : Energy |
71. |
A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Neurocomputing |
72. |
D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Measurement |
73. |
A Group Key Management Scheme in Wireless Mobile Environment
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Scienceasia |
74. |
BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Supercomputing |
75. |
Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment
2014
Author(s) : Miss Laiha Binti Mat Kiah,Shahaboddin Shamshirband Source : Journal of Supercomputing |
76. |
Adaptive neuro-fuzzy optimization of wind farm project net profit
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Energy Conversion and Management |
77. |
Open Source EMR Software: Profiling, Insights and Hands-on Analysis
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Computer Methods and Programs in Biomedicine |
78. |
Cooperative Game Theoretic Approach using Fuzzy Q-learning for Detecting and Preventing Intrusions in Wireless Sensor Networks
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Engineering Applications of Artificial Intelligence |
79. |
Kinetostatic analysis of passively adaptive robotic finger with distributed compliance
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Advances in Mechanical Engineering |
80. |
Routing protocol design for secure WSN: Review and open research issues
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Network and Computer Applications |
81. |
Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : International Journal of Electrical Power Energy Systems |
82. |
Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Network and Computer Applications |
83. |
Sensorless estimation of wind speed by adaptive neuro- fuzzy methodology
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : International Journal of Electrical Power Energy Systems |
84. |
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Network and Computer Applications |
85. |
Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Applied Soft Computing |
86. |
Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Medical Systems |
87. |
MIRASS: Medical Informatics Research Activity Support System using Information Mashup Network
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Medical Systems |
88. |
Wind turbine power coefficient estimation by soft computing methodologies: Comparative study
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Energy Conversion and Management |
89. |
Routing protocol design for secure WSN: Review and open research issues
2014
Source : Journal of Network and Computer Applications |
90. |
Co-FQL :Anomaly Detection Using Cooperative Fuzzy Q-learning in Network
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Intelligent Fuzzy Systems |
91. |
Potential of Support Vector Regression for Forcasting of Stream Flow
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Tehnicki Vjesnik |
92. |
Wind turbine power coefficient estimation by soft computing methodologies: Comparative study
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Energy Conversion and Management |
93. |
Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : International Journal of Medical Sciences |
94. |
Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Optics and Spectroscopy |
95. |
Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group- Based Communication Architecture
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Medical Systems |
96. |
Open source EMR software: Profiling, insights and hands-on analysis
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Computer Methods and Programs in Biomedicine |
97. |
Support vector regression methodology for wind turbine reaction torque prediction with power- split hydrostatic continuous variable transmission
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Energy |
98. |
Anomaly Detection using Fuzzy Q-learning Algorithm in Wireless Network
2014
Author(s) : Miss Laiha Binti Mat Kiah Source : Acta Polytechnica Hungarica |
99. |
An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1
2013
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Medical Systems |
100. |
An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP-XML and SHA-1.
2013
Author(s) : Miss Laiha Binti Mat Kiah |
101. |
Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission
2013
Author(s) : Miss Laiha Binti Mat Kiah Source : ENERGY |
102. |
An Appraisal and Design of Multi Agent Systems Based on Cooperative Wireless Intrusion Detection Computational Intelligence Techniques
2013
Author(s) : Miss Laiha Binti Mat Kiah Source : Engineering Applications of Artificial Intelligence |
103. |
Adaptive neuro-fuzzy estimation of optimal lens system parameters
2013
Author(s) : Miss Laiha Binti Mat Kiah Source : OPTICS AND LASERs in Engineering |
104. |
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
2013
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Supercomputing |
105. |
A review of dynamic and intelligent honeypots
2013
Author(s) : Miss Laiha Binti Mat Kiah Source : Scienceasia |
106. |
Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing
2013
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Supercomputing |
107. |
A review of dynamic and intelligent honeypot
2013
Author(s) : Miss Laiha Binti Mat Kiah Source : SCIENTIFIC RESEARCH AND ESSAYS |
108. |
A More Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks Ad-Hoc Networks
2012
Author(s) : Miss Laiha Binti Mat Kiah Source : Security and Communication Networks |
109. |
Towards Secure Mobile Cloud Computing: A Survey
2012
Author(s) : Miss Laiha Binti Mat Kiah Source : Future Generation Computer Systems |
110. |
Securing peer-to-peer mobile communications using public key cryptography: New security strategy
2011
Author(s) : Miss Laiha Binti Mat Kiah |
111. |
Secure Unicast Position-Based Routing Protocols for Ad-Hoc Networks
2011
Author(s) : Miss Laiha Binti Mat Kiah Source : Acta Polytechnica Hungarica (Journal of Applied Sciences) |
112. |
Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: Review, Participates Opinion and Expert Concerns
2011
Author(s) : Miss Laiha Binti Mat Kiah Source : International journal of pharmacology |
113. |
A review of audio based steganography and digital watermarking
2011
Author(s) : Miss Laiha Binti Mat Kiah Source : INTERNATIONAL JOURNAL OF THE PHYSICAL SCIENCES |
114. |
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : SCIENTIFIC RESEARCH AND ESSAYS |
115. |
Unicast Position-Based Routing Protocols for Ad- Hoc Networks
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : Acta Polytechnica Hungarica (Journal of Applied Sciences) |
116. |
StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : Journal of Physical Sciences |
117. |
Shoulder Surfing Resistance Using PENUP Event and Neighboring Connectivity Manipulation
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
118. |
Secure Topology for Electronic Medical Record Transmissions
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : International Journal of Pharmacology |
119. |
Suitability of SOAP Protocol in Securing Transmissions of EMR Database
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : International Journal of Pharmacology |
120. |
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : SCIENTIFIC RESEARCH AND ESSAYS |
121. |
A biological model to improve PE malware detection: Review
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : Internationa Journal of the Physical Sciences |
122. |
A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm
2010
Author(s) : Miss Laiha Binti Mat Kiah Source : JOURNAL OF APPLIED SCIENCES |
123. |
A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks
2009
Author(s) : Miss Laiha Binti Mat Kiah Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
124. |
A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks
2009
Author(s) : Miss Laiha Binti Mat Kiah |
125. |
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments
2008
Author(s) : Miss Laiha Binti Mat Kiah Source : International Journal of Security and Its Applications |
BOOK
NO | DETAILS OF BOOK |
---|---|
1. |
Secure Group Communication Protocols in Wireless Mobile Environment
2017
Author(s) : Miss Laiha Binti Mat Kiah |
2. |
Pengenalan Kepada Keselamatan Komputer (An
Introduction to Computer Security)
2002
Author(s) : Miss Laiha Binti Mat Kiah |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
A Survey of Position-Based Routing Protocols for
Ad-Hoc Networks
2011
Author(s) : Miss Laiha Binti Mat Kiah |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
Wireless Backhaul Network Optimization Using Automated KPIs Monitoring System Based on Time Series Forecasting
2018
Author(s) : Miss Laiha Binti Mat Kiah |
2. |
EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing
2017
Author(s) : Miss Laiha Binti Mat Kiah |
3. |
Open Source EMR Software: How to Select the Best Software?
2015
Author(s) : Miss Laiha Binti Mat Kiah |
4. |
A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments
2013
Author(s) : Miss Laiha Binti Mat Kiah |
5. |
Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning
2013
Author(s) : Miss Laiha Binti Mat Kiah |
6. |
Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records
2013
Author(s) : Miss Laiha Binti Mat Kiah |
7. |
Cooperative Multi-agent System Based on Fuzzy Quantum
Cryptography
2012
Author(s) : Miss Laiha Binti Mat Kiah |
8. |
Minimizing Errors in Identifying Malicious API to
Detect PE Malwares Using Artificial Costimulation
2012
Author(s) : Miss Laiha Binti Mat Kiah |
9. |
A Review on Artificial Intelligence Techniques for
Developing Intelligent Honeypot
2012
Author(s) : Miss Laiha Binti Mat Kiah |
10. |
An Implementation of Group Key Management in a Wireless
Environment
2011
Author(s) : Miss Laiha Binti Mat Kiah |
11. |
A Scalable and Secure Position-Based Routing
Protocol
for MANETs
2010
Author(s) : Miss Laiha Binti Mat Kiah |
12. |
Group Key Management Using Public Key Exchange
2010
Author(s) : Miss Laiha Binti Mat Kiah |
13. |
A Requirement Framework For Livestock Farming Web
Service Application
2009
Author(s) : Miss Laiha Binti Mat Kiah |
14. |
Secure Group Communication Using Public Key
Exchange
2009
Author(s) : Miss Laiha Binti Mat Kiah |
15. |
A Scalable Secure Routing Protocol for MANETs
2009
Author(s) : Miss Laiha Binti Mat Kiah |
16. |
High Rate Video Streaming Steganography
2009
Author(s) : Miss Laiha Binti Mat Kiah |
17. |
Distributed and Secure Routing Protocol for MANETs
2009
Author(s) : Miss Laiha Binti Mat Kiah |
18. |
Host Mobility Protocol for Secure Group
Communication in Wireless Mobile Environments
2007
Author(s) : Miss Laiha Binti Mat Kiah |
19. |
Secure Multicast: Investigating the Different
Challenges between Internet and Mobile
Environments
2007
Author(s) : Miss Laiha Binti Mat Kiah |
20. |
A generic group key management framework for
group
communication in wireless mobile environments
2006
Author(s) : Miss Laiha Binti Mat Kiah |
21. |
Group communication: Design challenges in the
development of key management frameworks in
wireless
mobile environments
2005
Author(s) : Miss Laiha Binti Mat Kiah |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
An Improved Solution On Sidechain Manipulation For Secure And Scalable Ethereum's Blockchain
Researcher(s) : Associate Prof. Dr. Nor Aniza Binti Abdullah,Dr. Muhammad Reza Bin Z'aba,Norziana Jamil
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
Small Medium Enterprise's Internet Of Things (iot) Threats Landscape, Talent Development And Strategic Framework
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Others MOHE) |
|
end |
Implementation And Utilites Of Rdap For Wider Usability Among Internet Stakeholders
(International Funding) |
|
end |
Mobile Patient Health Record (mphr)
(KW PNC(JIM)) |
|
end |
Dynamic Value Approach to Address Factory Default and Reset Vulnerabilities on IoT Devices
(RU Geran - Fakulti Program) |
|
end |
Anomaly Detection in Policy Authorization Activity Logs
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(Partnership Grant) |
|
end |
Drm For Cloud Based Storage Providers
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at
(Private Funding) |
|
end |
Implementation Of Secure Framework For Electronic Medical Record (emrs).
(High Impact Research - Ministry of Education (HIR-MOE) Cycle 2) |
|
end |
Secure Group Communication For Critical National Information Infrastructur (cnii)
(MOSTI-Science Fund) |
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Security Of Service-oriented Vehicular Cloud Network Using Group Signatures For Intelligent Transportation Systems
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Gary Greaves,Ciaran Mullan,Prof. Dr. Keith M. Martin
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
A Secure And Flexible Authenticated Encryption Schemes
Researcher(s) : Norziana Jamil,Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Prof. Dr. Mohd Yamani Idna Bin Idris,Mohd Saufy Rohmad
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
A Framework For A Multilingual Language Identification In Conversational Speech
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Associate Prof. Ir. Dr. Ting Hua Nong,Dr. Farzana Parveen Tajudeen,M Saravanan Muthaiyah
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
Bring Your Own Device (byod) Security Policy Compliance Framework For The Malaysia Public Sector
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
Centre For Reseach In Industry 4.0 (cr14.0)
Researcher(s) : Professor Dato' Ir. Dr. Mohd Hamdi Bin Abd Shukor,Dr. Siti Nurmaya Binti Musa,Dr. Azni Zarina Binti Taha,Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Associate Prof. Ir. Dr. Chuah Joon Huang,Associate Prof. Ir. Dr. Mohd Sayuti Bin Ab Karim
(Government Agency) |
|
end |
Healthcare Meets Big Data: Security And Privacy Protection
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah
(RU Geran - Fakulti Program) |
|
end |
Prevent Password Reconstruction Attack For Cyber Security Authentication Using Knowledge-based Method
Researcher(s) : Associate Prof. Dr. Ang Tan Fong,Associate Prof. Sellappan A/l Palaniappan,Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Associate Prof. Dr. Norjihan Binti Abdul Ghani,Others Koh Yun Sing,Mr. Ku Chin Soon
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
Smart And Security Enhanced Transportation Ecosystem For A Future Sustainable Smart City
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Prof. Dr. Mohd Yamani Idna Bin Idris,Associate Prof. Dr. Norjihan Binti Abdul Ghani,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Associate Prof. Dr. Fariza Hanum Binti Md Nasaruddin,Associate Prof. Dr. Maizatul Akmar Binti Ismail
(Partnership Grant) |
|
end |
Wireless Backhaul Network Planning and Optimization Techniques Based on Deep Learning Algorithms
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Dr. Muhammad Reza Bin Z'aba,Associate Prof. Ts. Dr. Ismail Bin Ahmedy
(Bantuan Kecil Penyelidikan (BKP)) |
|
end |
Decentralization Of Laboratory Exercise Via Remote Application: A State-of-the-art Approach Toward Efficient Educational Facility Resource And Energy Management In Academic Institutions
Researcher(s) : Professor Dato' Ir. Dr. Mohd Hamdi Bin Abd Shukor,Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Ir. Dr. Mohd Ridha Bin Muhamad @ Mohd Ata'illah,Dr. Mohd Yazed Bin Ahmad
(UM Community Campus-Manage by UMCARES) |
|
end |
The Investigation into Permutation Property of Block Ciphers
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(RU Geran - Fakulti Program) |
|
end |
Anomaly Detection In Policy Authorization Activity Logs
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah
(Private Funding) |
|
end |
Modelling And Governing Traffic Congestion: Air Quality,emission, & Traffic Use
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Madam Nornazlita Binti Hussin,Associate Prof. Dr. Nasrin Agha Mohammadi,Rashid H Khorkar (dr.)
(Grand Challenge - SUS (Sustainability Science)) |
|
end |