ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Implementing federated learning over VPN-based wireless backhaul networks for healthcare systems
2024
Source :
PeerJ Computer Science
DOI :
10.7717/peerj-cs.2422
|
2. |
Employees' BYOD Security Policy Compliance in the Public Sector
2024
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
JOURNAL OF COMPUTER INFORMATION SYSTEMS
DOI :
10.1080/08874417.2023.2178038
|
3. |
A systematic literature review on advanced persistent threat behaviors and its detection strategy
2024
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Cybersecurity
DOI :
10.1093/cybsec/tyad023
|
4. |
Analysis of Terahertz (THz) Frequency Propagation and Link Design for Federated Learning in 6G Wireless Systems
2024
Source :
IEEE Access
DOI :
10.1109/ACCESS.2024.3362966
|
5. |
Analysis of Terahertz (THz) Frequency Propagation and Link Design for Federated Learning in 6G Wireless Systems
2024
Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2024.3362966
|
6. |
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
2023
Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2023.3267161
|
7. |
Secure PIN-Entry Method Using One-Time PIN (OTP)
2023
Author(s) : Miss Laiha Binti Mat Kiah, Por Lip Yee @ Por Khoon Sun Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2023.3243114
|
8. |
Secure PIN-Entry Method Using One-Time PIN (OTP)
2023
Author(s) : Miss Laiha Binti Mat Kiah, Por Lip Yee @ Por Khoon Sun Source :
IEEE Access
DOI :
10.1109/ACCESS.2023.3243114
|
9. |
A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations
2023
Author(s) : Miss Laiha Binti Mat Kiah Source :
Computers, Materials and Continua
DOI :
10.32604/cmc.2023.036138
|
10. |
Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT
2022
Source :
ELECTRONICS
DOI :
10.3390/electronics11233982
|
11. |
Driver Behavior Profiling and Recognition Using Deep-Learning Methods: In Accordance with Traffic Regulations and Experts Guidelines
2022
Author(s) : Miss Laiha Binti Mat Kiah, Por Lip Yee @ Por Khoon Sun Source :
INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH
DOI :
10.3390/ijerph19031470
|
12. |
BYOD Policy Compliance: Risks and Strategies in Organizations
2022
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
JOURNAL OF COMPUTER INFORMATION SYSTEMS
DOI :
10.1080/08874417.2019.1703225
|
13. |
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
2022
Author(s) : Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Bin Idris Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2022.3171853
|
14. |
Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization
2022
Source :
MOBILE INFORMATION SYSTEMS
DOI :
10.1155/2022/9109300
|
15. |
Authenticated Encryption Schemes: A Systematic Review
2022
Author(s) : Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Bin Idris Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2022.3147201
|
16. |
EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY
2022
Author(s) : Miss Laiha Binti Mat Kiah, Burhan Ul Islam Khan Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
DOI :
10.22452/mjcs.vol35no3.1
|
17. |
Code-Switching in Automatic Speech Recognition: The Issues and Future Directions
2022
Author(s) : Miss Laiha Binti Mat Kiah, Ting Hua Nong, Mumtaz Begum Binti Peer Mustafa, Hasan Kahtan Khalaf Source :
APPLIED SCIENCES-BASEL
DOI :
10.3390/app12199541
|
18. |
Machine learning-based offline signature verification systems: A systematic review
2021
Author(s) : Rodina Binti Ahmad, Miss Laiha Binti Mat Kiah Source :
SIGNAL PROCESSING-IMAGE COMMUNICATION
DOI :
10.1016/j.image.2021.116139
|
19. |
Wireless backhaul network's capacity optimization using time series forecasting approach
2021
Author(s) : Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Zati Hakim Binti Azizul Hasan, Muhammad Reza Bin Z'aba Source :
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
DOI :
10.1007/s12652-020-02209-2
|
20. |
Ahmed Al-Hussein W, Mat Kiah ML, Lip Yee P, Zaidan BB. 2021. A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions. PeerJ Computer Science 7:e632 https://doi.org/10.7717/peerj-cs.632
2021
Author(s) : Por Lip Yee @ Por Khoon Sun, Miss Laiha Binti Mat Kiah Source :
PeerJ Computer Science
|
21. |
BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts
2021
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE
DOI :
10.1080/10919392.2022.2028530
|
22. |
Wireless backhaul network s capacity optimization using time series forecasting approach
2021
Source :
Journal of Ambient Intelligence and Humanized Computing
DOI :
https://doi.org/10.1007/s12652-020-02209-2
|
23. |
A systematic review of PIN-entry methods resistant to shoulder-surfing attacks
2021
Author(s) : Miss Laiha Binti Mat Kiah, Por Lip Yee @ Por Khoon Sun Source :
COMPUTERS & SECURITY
DOI :
10.1016/j.cose.2020.102116
|
24. |
A Frictionless and Secure User Authentication in Web-Based Premium Applications
2021
Author(s) : Miss Laiha Binti Mat Kiah Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2021.3110310
|
25. |
Investigating the Effect of Social and Cultural Factors on Drivers in Malaysia: A Naturalistic Driving Study
2021
Author(s) : Miss Laiha Binti Mat Kiah, Por Lip Yee @ Por Khoon Sun Source :
INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH
DOI :
10.3390/ijerph182211740
|
26. |
A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions
2021
Author(s) : Miss Laiha Binti Mat Kiah, Por Lip Yee @ Por Khoon Sun Source :
PEERJ COMPUTER SCIENCE
DOI :
10.7717/peerj-cs.632
|
27. |
Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs
2021
Author(s) : Miss Laiha Binti Mat Kiah Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2021.3073343
|
28. |
A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET
2021
Source :
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
DOI :
10.1007/s12652-020-02279-2
|
29. |
An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks
2020
Author(s) : Rafidah Binti Md Noor, Ismail Bin Ahmedy, Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri Source :
Ad Hoc & Sensor Wireless Networks
|
30. |
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things
2020
Author(s) : Miss Laiha Binti Mat Kiah, Muneer Ahmad, Ismail Bin Ahmedy, Mohd Yamani Idna Bin Idris, Rafidah Binti Md Noor Source :
Sensors
DOI :
10.3390/s20010283
|
31. |
DM-GKM: A key management scheme for dynamic group based applications
2020
Author(s) : Miss Laiha Binti Mat Kiah Source :
Computer Networks
|
32. |
A stream position performance analysis model based on DDoS attack detection for cluster based routing in VANET
2020
Author(s) : Miss Laiha Binti Mat Kiah, Emran Bin Mohd Tamil, Ismail Bin Ahmedy, Rafidah Binti Md Noor Source :
Journal of Ambient Intelligence and Humanized Computing
|
33. |
DM-GKM: A key management scheme for dynamic group based applications
2020
Author(s) : Miss Laiha Binti Mat Kiah Source :
COMPUTER NETWORKS
DOI :
10.1016/j.comnet.2020.107476
|
34. |
Compliance with bring your own device security policies in organizations: A systematic literature review
2020
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
COMPUTERS & SECURITY
DOI :
10.1016/j.cose.2020.101998
|
35. |
A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb
2020
Author(s) : Miss Laiha Binti Mat Kiah Source :
IEEE COMMUNICATIONS LETTERS
|
36. |
Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges
2020
Author(s) : Miss Laiha Binti Mat Kiah Source :
IEEE ACCESS
|
37. |
Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting
2020
Author(s) : Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Zati Hakim Binti Azizul Hasan, Muhammad Reza Bin Z'aba Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2020.2970224
|
38. |
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things
2020
Author(s) : Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Bin Idris, Rafidah Binti Md Noor, Ismail Bin Ahmedy, Tey Kok Soon, Muneer Ahmad Source :
SENSORS
|
39. |
A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb
2020
Author(s) : Miss Laiha Binti Mat Kiah Source :
IEEE COMMUNICATIONS LETTERS
DOI :
10.1109/LCOMM.2020.2966198
|
40. |
Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges
2020
Author(s) : Miss Laiha Binti Mat Kiah Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2020.2970430
|
41. |
Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting
2020
Author(s) : Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Zati Hakim Binti Azizul Hasan, Muhammad Shahreeza Safiruz Bin Kassim Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2020.2970224
|
42. |
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things
2020
Source :
SENSORS
DOI :
10.3390/s20010283
|
43. |
An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks
2020
Source :
AD HOC & SENSOR WIRELESS NETWORKS
|
44. |
Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey
2020
Author(s) : Miss Laiha Binti Mat Kiah, Rafidah Binti Md Noor, Nor Badrul Anuar Bin Juma'at, Muneer Ahmad Source :
JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS
DOI :
10.1166/jmihi.2020.3178
|
45. |
An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks
2020
Author(s) : Miss Laiha Binti Mat Kiah, Rafidah Binti Md Noor, Saaidal Razalli Bin Azzuhri, Ismail Bin Ahmedy, Shabana Anjum Shaik Source :
AD HOC & SENSOR WIRELESS NETWORKS
|
46. |
Capacity and Frequency Optimization of Wireless Backhaul Network using Traffic Forecasting
2020
Author(s) : Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Muhammad Reza Bin Z'aba, Muhammad Shahreeza Safiruz Bin Kassim, Zati Hakim Binti Azizul Hasan Source :
IEEE Access
DOI :
10.1109/ACCESS.2020.2970224
|
47. |
QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things
2019
Source :
SYMMETRY-BASEL
|
48. |
Comprehensive review and analysis of anti-malware apps for smartphones
2019
Author(s) : Miss Laiha Binti Mat Kiah Source :
Telecommunication Systems
|
49. |
QoS Enabled Layered based Clustering for Reactive Flooding in Internet of Things
2019
Source :
Symmetry
|
50. |
Modeling Traffic Congestion Based on Air Quality for Greener Environment: An Empirical Study
2019
Author(s) : Miss Laiha Binti Mat Kiah, Nornazlita Binti Hussin, Rafidah Binti Md Noor, Ismail Bin Ahmedy, Nasrin Agha Mohammadi, Shabana Anjum Shaik Source :
IEEE ACCESS
|
51. |
Comprehensive review and analysis of anti-malware apps for smartphones
2019
Author(s) : Miss Laiha Binti Mat Kiah Source :
TELECOMMUNICATION SYSTEMS
|
52. |
Enhancement of Cybersecurity Awareness Program on Personal Data Protection Among Youngsters in Malaysia: An Assessment
2019
Author(s) : Suraya Binti Hamid, Miss Laiha Binti Mat Kiah Source :
Malaysian Journal of Computer Science
|
53. |
Review on Security of Internet of Things Authentication Mechanism
2019
Author(s) : Norjihan Binti Abdul Ghani, Nor Badrul Anuar Bin Juma'at, Rafidah Binti Md Noor, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Bin Idris, Ismail Bin Ahmedy Source :
IEEE Access
|
54. |
Review on Security of Internet of Things Authentication Mechanism
2019
Author(s) : Miss Laiha Binti Mat Kiah, Norjihan Binti Abdul Ghani, Mohd Yamani Idna Bin Idris, Rafidah Binti Md Noor, Nor Badrul Anuar Bin Juma'at, Ismail Bin Ahmedy Source :
IEEE ACCESS
|
55. |
Modelling Traffic Congestion based on Air Quality for Greener Environment: An Empirical Study
2019
Author(s) : Rafidah Binti Md Noor, Ismail Bin Ahmedy, Nasrin Agha Mohammadi, Nornazlita Binti Hussin, Miss Laiha Binti Mat Kiah Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2019.2914672
|
56. |
ENHANCEMENT OF CYBERSECURITY AWARENESS PROGRAM ON PERSONAL DATA PROTECTION AMONG YOUNGSTERS IN MALAYSIA: AN ASSESSMENT
2019
Author(s) : Miss Laiha Binti Mat Kiah, Suraya Binti Hamid Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
|
57. |
A Comparative Study of Congestion Notification Techniques for Hop-by-Hop Based Flow Control in Data Center Ethernet
2018
Author(s) : Miss Laiha Binti Mat Kiah Source :
IET Networks
|
58. |
DM-GKM: A key management scheme for dynamic group based applications
2018
Author(s) : Miss Laiha Binti Mat Kiah Source :
Wireless Personal Communications
|
59. |
Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients
2018
Author(s) : Miss Laiha Binti Mat Kiah Source :
Health and Technology
|
60. |
Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey
2018
Author(s) : Miss Laiha Binti Mat Kiah Source :
International Journal on Advanced Science Engineering Information Technology
|
61. |
A security framework for mHealth apps on Android platform
2018
Author(s) : Miss Laiha Binti Mat Kiah Source :
Computers & Security
|
62. |
Security Issues and Future Challenges of Cloud Service Authentication
2017
Author(s) : Miss Laiha Binti Mat Kiah, Ang Tan Fong Source :
Acta Polytechnica Hungarica
DOI :
10.12700/APH.14.2.2017.2.4
|
63. |
A Distributed Framework for Health Information Exchange Using Smartphone Technologies
2017
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Biomedical Informatics
|
64. |
Host mobility key management in dynamic secure group communication
2017
Author(s) : Miss Laiha Binti Mat Kiah Source :
Wireless Networks
|
65. |
A review of smart home applications based on Internet of Things
2017
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Network and Computer Applications
DOI :
10.1016/j.jnca.2017.08.017
|
66. |
On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service
2016
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Network and Computer Applications
DOI :
https://doi.org/10.1016/j.jnca.
|
67. |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
2016
Author(s) : Miss Laiha Binti Mat Kiah Source :
Pervasive and Mobile Computing
|
68. |
Diagnosing Breast Cancer with an Improved Artificial Immune Recognition System
2016
Author(s) : Miss Laiha Binti Mat Kiah Source :
Soft Computing
|
69. |
Service Delivery Models of Cloud Computing: Security Issues and Open Challenges
2016
Author(s) : Miss Laiha Binti Mat Kiah Source :
Security and Communication Networks
DOI :
10.1002/sec.1585
|
70. |
Diagnosing breast cancer with an improved artificial immune recognition system
2016
Author(s) : Thamil Selvee A/p Ramasamy Source :
Soft Computing
DOI :
10.1007/s00500-015-1742-1
|
71. |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
2016
Author(s) : Miss Laiha Binti Mat Kiah, Nor Badrul Anuar Bin Juma'at Source :
PERVASIVE AND MOBILE COMPUTING
DOI :
10.1016/j.pmcj.2015.12.001
|
72. |
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Grid Computing
|
73. |
A systematic review of approaches to assessing Cybersecurity awareness
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Kybernetes
|
74. |
Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Energy
|
75. |
Potential of support vector regression for optimization of lens system
2015
Source :
Computer-Aided Design
|
76. |
The Landscape of Research on Smartphone Medical Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Computer Methods and Programs in Biomedicine
|
77. |
Multi-Criteria Analysis for OS-EMR Software Selection Problem: A Comparative Study
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Decision Support Systems
|
78. |
A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Medical Systems
|
79. |
Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Circuits Systems and Computers
|
80. |
Decreasing environmental impacts of cropping systems using LCA and multi-objective genetic algorithm
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Cleaner Production
|
81. |
RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Medical & Biological Engineering & Computing
|
82. |
Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of biomedical informatics
|
83. |
Survey of secure multipath routing protocols for WSNs
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Network and Computer Applications
|
84. |
Adaptive neuro-fuzzy evaluation of wind farm power production as function of wind speed and direction
2015
Author(s) : Miss Laiha Binti Mat Kiah Source :
Stochastic Environmental Research and Risk Assessment
|
85. |
Kinetostatic analysis of passively adaptive robotic finger with distributed compliance
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Advances in Mechanical Engineering
|
86. |
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Network and Computer Applications
|
87. |
Routing protocol design for secure WSN: Review and open research issues
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Network and Computer Applications
|
88. |
Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Applied Soft Computing
|
89. |
Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Medical Systems
|
90. |
Wind turbine power coefficient estimation by soft computing methodologies: Comparative study
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Energy Conversion and Management
|
91. |
Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Network and Computer Applications
|
92. |
Cooperative Game Theoretic Approach using Fuzzy Q-learning for Detecting and Preventing Intrusions in Wireless Sensor Networks
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Engineering Applications of Artificial Intelligence
|
93. |
Open Source EMR Software: Profiling, Insights and Hands-on Analysis
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Computer Methods and Programs in Biomedicine
|
94. |
Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment
2014
Author(s) : Shahaboddin Shamshirband, Miss Laiha Binti Mat Kiah Source :
Journal of Supercomputing
|
95. |
A Group Key Management Scheme in Wireless Mobile Environment
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Scienceasia
|
96. |
D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Measurement
|
97. |
Anomaly Detection using Fuzzy Q-learning Algorithm in Wireless Network
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Acta Polytechnica Hungarica
|
98. |
A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Neurocomputing
|
99. |
Support vector regression methodology for wind turbine reaction torque prediction with power- split hydrostatic continuous variable transmission
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Energy
|
100. |
Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
International Journal of Electrical Power Energy Systems
|
101. |
Sensorless estimation of wind speed by adaptive neuro- fuzzy methodology
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
International Journal of Electrical Power Energy Systems
|
102. |
MIRASS: Medical Informatics Research Activity Support System using Information Mashup Network
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Medical Systems
|
103. |
BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Supercomputing
|
104. |
Co-FQL :Anomaly Detection Using Cooperative Fuzzy Q-learning in Network
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Intelligent Fuzzy Systems
|
105. |
Potential of Support Vector Regression for Forcasting of Stream Flow
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Tehnicki Vjesnik
|
106. |
Wind turbine power coefficient estimation by soft computing methodologies: Comparative study
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Energy Conversion and Management
|
107. |
Open source EMR software: Profiling, insights and hands-on analysis
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Computer Methods and Programs in Biomedicine
|
108. |
Routing protocol design for secure WSN: Review and open research issues
2014
Author(s) : Miss Laiha Binti Mat Kiah, Nor Badrul Anuar Bin Juma'at Source :
Journal of Network and Computer Applications
|
109. |
Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
International Journal of Medical Sciences
|
110. |
Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Optics and Spectroscopy
|
111. |
Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group- Based Communication Architecture
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Medical Systems
|
112. |
Adaptive neuro-fuzzy optimization of wind farm project net profit
2014
Author(s) : Miss Laiha Binti Mat Kiah Source :
Energy Conversion and Management
|
113. |
Towards secure mobile cloud computing: A survey
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
Future Generation Computer Systems-the International Journal of Grid Computing and Escience
|
114. |
Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Supercomputing
|
115. |
An Appraisal and Design of Multi Agent Systems Based on Cooperative Wireless Intrusion Detection Computational Intelligence Techniques
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
Engineering Applications of Artificial Intelligence
|
116. |
Adaptive neuro-fuzzy estimation of optimal lens system parameters
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
OPTICS AND LASERs in Engineering
|
117. |
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Supercomputing
|
118. |
A review of dynamic and intelligent honeypots
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
Scienceasia
|
119. |
An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Medical Systems
|
120. |
An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP-XML and SHA-1.
2013
Author(s) : Miss Laiha Binti Mat Kiah |
121. |
Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
ENERGY
|
122. |
A review of dynamic and intelligent honeypot
2013
Author(s) : Miss Laiha Binti Mat Kiah Source :
SCIENTIFIC RESEARCH AND ESSAYS
|
123. |
Towards Secure Mobile Cloud Computing: A Survey
2012
Author(s) : Miss Laiha Binti Mat Kiah Source :
Future Generation Computer Systems
|
124. |
A More Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks Ad-Hoc Networks
2012
Author(s) : Miss Laiha Binti Mat Kiah Source :
Security and Communication Networks
|
125. |
Secure Unicast Position-Based Routing Protocols for Ad-Hoc Networks
2011
Author(s) : Miss Laiha Binti Mat Kiah Source :
Acta Polytechnica Hungarica (Journal of Applied Sciences)
|
126. |
A review of audio based steganography and digital watermarking
2011
Author(s) : Miss Laiha Binti Mat Kiah Source :
INTERNATIONAL JOURNAL OF THE PHYSICAL SCIENCES
|
127. |
Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: Review, Participates Opinion and Expert Concerns
2011
Author(s) : Miss Laiha Binti Mat Kiah Source :
International journal of pharmacology
|
128. |
Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks
2011
Author(s) : Miss Laiha Binti Mat Kiah Source :
Acta Polytechnica Hungarica
|
129. |
Securing peer-to-peer mobile communications using public key cryptography: New security strategy
2011
Author(s) : Miss Laiha Binti Mat Kiah |
130. |
Unicast Position-based Routing Protocols for Ad-Hoc Networks
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
Acta Polytechnica Hungarica
|
131. |
Shoulder Surfing Resistance Using PENUP Event and Neighboring Connectivity Manipulation
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
|
132. |
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
Scientific Research and Essays
|
133. |
A biological model to improve PE malware detection: Review
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
International Journal of the Physical Sciences
|
134. |
Secure Topology for Electronic Medical Record Transmissions
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
International Journal of Pharmacology
|
135. |
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
SCIENTIFIC RESEARCH AND ESSAYS
|
136. |
Unicast Position-Based Routing Protocols for Ad- Hoc Networks
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
Acta Polytechnica Hungarica (Journal of Applied Sciences)
|
137. |
Secure Topology for Electronic Medical Record Transmissions
2010
Author(s) : Miss Laiha Binti Mat Kiah, Gazi Mahabubul Alam Source :
International Journal of Pharmacology
|
138. |
SHOULDER SURFING RESISTANCE USING PENUP EVENT AND NEIGHBOURING CONNECTIVITY MANIPULATION
2010
Author(s) : Miss Laiha Binti Mat Kiah, Por Lip Yee @ Por Khoon Sun Source :
Malaysian Journal of Computer Science
|
139. |
Suitability of Using SOAP Protocol to Secure Electronic Medical Record Databases Transmission
2010
Author(s) : Miss Laiha Binti Mat Kiah, Gazi Mahabubul Alam Source :
International Journal of Pharmacology
|
140. |
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
2010
Author(s) : Miss Laiha Binti Mat Kiah, Gazi Mahabubul Alam Source :
Scientific Research and Essays
|
141. |
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
SCIENTIFIC RESEARCH AND ESSAYS
|
142. |
StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
Journal of Physical Sciences
|
143. |
Suitability of SOAP Protocol in Securing Transmissions of EMR Database
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
International Journal of Pharmacology
|
144. |
A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
JOURNAL OF APPLIED SCIENCES
|
145. |
StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
2010
Author(s) : Miss Laiha Binti Mat Kiah, Gazi Mahabubul Alam Source :
International Journal of the Physical Sciences
|
146. |
A biological model to improve PE malware detection: Review
2010
Author(s) : Miss Laiha Binti Mat Kiah Source :
Internationa Journal of the Physical Sciences
|
147. |
A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks
2009
Author(s) : Miss Laiha Binti Mat Kiah |
148. |
A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks
2009
Author(s) : Miss Laiha Binti Mat Kiah Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
|
149. |
A SCALABLE AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS
2009
Author(s) : Miss Laiha Binti Mat Kiah Source :
Malaysian Journal of Computer Science
|
150. |
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments
2008
Author(s) : Miss Laiha Binti Mat Kiah Source :
International Journal of Security and Its Applications
|
BOOK
NO | DETAILS OF BOOK |
---|---|
1. |
Secure Group Communication Protocols in Wireless Mobile Environment
2017
Author(s) : Miss Laiha Binti Mat Kiah |
2. |
Pengenalan Kepada Keselamatan Komputer (An
Introduction to Computer Security)
2002
Author(s) : Miss Laiha Binti Mat Kiah |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
A Survey of Position-Based Routing Protocols for
Ad-Hoc Networks
2011
Author(s) : Miss Laiha Binti Mat Kiah |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
Wireless Backhaul Network Optimization Using Automated KPIs Monitoring System Based on Time Series Forecasting
2018
Author(s) : Miss Laiha Binti Mat Kiah |
2. |
EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing
2017
Author(s) : Miss Laiha Binti Mat Kiah |
3. |
Open Source EMR Software: How to Select the Best Software?
2015
Author(s) : Miss Laiha Binti Mat Kiah |
4. |
A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments
2013
Author(s) : Miss Laiha Binti Mat Kiah |
5. |
Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning
2013
Author(s) : Miss Laiha Binti Mat Kiah |
6. |
Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records
2013
Author(s) : Miss Laiha Binti Mat Kiah |
7. |
Cooperative Multi-agent System Based on Fuzzy Quantum
Cryptography
2012
Author(s) : Miss Laiha Binti Mat Kiah |
8. |
Minimizing Errors in Identifying Malicious API to
Detect PE Malwares Using Artificial Costimulation
2012
Author(s) : Miss Laiha Binti Mat Kiah |
9. |
A Review on Artificial Intelligence Techniques for
Developing Intelligent Honeypot
2012
Author(s) : Miss Laiha Binti Mat Kiah |
10. |
An Implementation of Group Key Management in a Wireless
Environment
2011
Author(s) : Miss Laiha Binti Mat Kiah |
11. |
A Scalable and Secure Position-Based Routing
Protocol
for MANETs
2010
Author(s) : Miss Laiha Binti Mat Kiah |
12. |
Group Key Management Using Public Key Exchange
2010
Author(s) : Miss Laiha Binti Mat Kiah |
13. |
A Requirement Framework For Livestock Farming Web
Service Application
2009
Author(s) : Miss Laiha Binti Mat Kiah |
14. |
Secure Group Communication Using Public Key
Exchange
2009
Author(s) : Miss Laiha Binti Mat Kiah |
15. |
A Scalable Secure Routing Protocol for MANETs
2009
Author(s) : Miss Laiha Binti Mat Kiah |
16. |
High Rate Video Streaming Steganography
2009
Author(s) : Miss Laiha Binti Mat Kiah |
17. |
Distributed and Secure Routing Protocol for MANETs
2009
Author(s) : Miss Laiha Binti Mat Kiah |
18. |
Host Mobility Protocol for Secure Group
Communication in Wireless Mobile Environments
2007
Author(s) : Miss Laiha Binti Mat Kiah |
19. |
Secure Multicast: Investigating the Different
Challenges between Internet and Mobile
Environments
2007
Author(s) : Miss Laiha Binti Mat Kiah |
20. |
A generic group key management framework for
group
communication in wireless mobile environments
2006
Author(s) : Miss Laiha Binti Mat Kiah |
21. |
Group communication: Design challenges in the
development of key management frameworks in
wireless
mobile environments
2005
Author(s) : Miss Laiha Binti Mat Kiah |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
An Improved Solution On Sidechain Manipulation For Secure And Scalable Ethereum's Blockchain
Researcher(s) : Associate Prof. Dr. Nor Aniza Binti Abdullah, Dr. Muhammad Reza Bin Z'aba, Norziana Jamil |
|
end |
Small Medium Enterprise's Internet Of Things (iot) Threats Landscape, Talent Development And Strategic Framework
|
|
end |
Implementation And Utilites Of Rdap For Wider Usability Among Internet Stakeholders
|
|
end |
Mobile Patient Health Record (mphr)
|
|
end |
Dynamic Value Approach to Address Factory Default and Reset Vulnerabilities on IoT Devices
|
|
end |
Anomaly Detection in Policy Authorization Activity Logs
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at |
|
end |
Drm For Cloud Based Storage Providers
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at |
|
end |
Implementation Of Secure Framework For Electronic Medical Record (emrs).
|
|
end |
Secure Group Communication For Critical National Information Infrastructur (cnii)
|
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Driving with Data: Privacy in Connected and Autonomous Vehicles
Researcher(s) : Associate Prof. Ts. Dr. Aznul Qalid Bin Md Sabri, Prof. Ts. Dr. Miss Laiha Binti Mat Kiah, Dr. Nur Fadhilah Binti Mohd Shari, Gary Greaves |
|
on going |
Security Of Service-oriented Vehicular Cloud Network Using Group Signatures For Intelligent Transportation Systems
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah, Gary Greaves, Ciaran Mullan, Prof. Dr. Keith M. Martin |
|
end |
A Secure And Flexible Authenticated Encryption Schemes
Researcher(s) : Norziana Jamil, Prof. Ts. Dr. Miss Laiha Binti Mat Kiah, Prof. Dr. Mohd Yamani Idna Bin Idris, Mohd Saufy Rohmad |
|
end |
A Framework For A Multilingual Language Identification In Conversational Speech
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah, Associate Prof. Ir. Dr. Ting Hua Nong, Dr. Farzana Parveen Tajudeen, M Saravanan Muthaiyah |
|
end |
Bring Your Own Device (byod) Security Policy Compliance Framework For The Malaysia Public Sector
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah |
|
end |
Centre For Reseach In Industry 4.0 (cr14.0)
|
|
end |
Healthcare Meets Big Data: Security And Privacy Protection
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah |
|
end |
Prevent Password Reconstruction Attack For Cyber Security Authentication Using Knowledge-based Method
|
|
end |
Smart And Security Enhanced Transportation Ecosystem For A Future Sustainable Smart City
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah, Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at, Prof. Dr. Mohd Yamani Idna Bin Idris, Associate Prof. Dr. Norjihan Binti Abdul Ghani, Associate Prof. Ts. Dr. Ismail Bin Ahmedy, Associate Prof. Dr. Fariza Hanum Binti Md Nasaruddin, Associate Prof. Dr. Maizatul Akmar Binti Ismail |
|
end |
Wireless Backhaul Network Planning and Optimization Techniques Based on Deep Learning Algorithms
|
|
end |
Decentralization Of Laboratory Exercise Via Remote Application: A State-of-the-art Approach Toward Efficient Educational Facility Resource And Energy Management In Academic Institutions
|
|
end |
The Investigation into Permutation Property of Block Ciphers
|
|
end |
Anomaly Detection In Policy Authorization Activity Logs
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah |
|
end |
Modelling And Governing Traffic Congestion: Air Quality,emission, & Traffic Use
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah, Associate Prof. Ts. Dr. Ismail Bin Ahmedy, Madam Nornazlita Binti Hussin, Associate Prof. Dr. Nasrin Agha Mohammadi, Rashid H Khorkar (dr.) |
|
end |