PERSONAL DETAIL


PROF. DR. MISS LAIHA BINTI MAT KIAH

Department of Computer System & Technology
Faculty of Computer Science & Information Technology
 
  +603-79676354
  misslaiha@um.edu.my
 Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, 50603 Kuala Lumpur, W.Persekutuan Kuala Lumpur, Malaysia
 
Homepage
 
ResearcherID Link
  http://www.researcherid.com/rid/B-2767-2010
Scopus ID Link
  http://www.scopus.com/authid/detail.url?authorId=24833455600

ACADEMIC QUALIFICATION
(Qualification), (Institution).



PROFESSIONAL
(Organisation), (Role), (Year), (Level).


  • ACM (ASSOCIATION FOR COMPUTING MACHINERY), Member, 2010, (International)
  • EC Council, Committee Member, 2012 to 2018, (International)
  • EC Council, Committee Member, 2012 to 2018, (National)
  • IEEE - Senior Member, Committee Member, 2016 to 2019, (National)
  • IEEE - Senior Member, Committee Member, 2016 to 2019, (International)
  • Malaysian Society for Cryptology Research (MSCR), Committee Member, 2017, (National)
  • Malaysia Board of Technologists, Committee Member, 2018, (National)
  • Centre for Research in Industry 4.0 (CRI4.0), Committee Members, 2018 to 2020, (National)

ADMINISTRATIVE DUTIES
(Role), (Level), (Start date),(End Date).


  • Deputy Dean of Higher Degree, Dean's Office, Faculty of Computer Science & Information Technology, 07/10/2019 to 06/10/2021
  • Deputy Dean of Higher Degree, Dean's Office, Faculty of Computer Science & Information Technology, 01/07/2014 to 31/07/2014
  • Deputy Dean of Higher Degree, Dean's Office, Faculty of Computer Science & Information Technology, 01/07/2011 to 30/06/2014
  • Head of Department, Computer System & Technology, Faculty of Computer Science & Information Technology, 13/05/2008 to 31/08/2009
  • WAKIL SENAT/AHLI JK PEMILIH KE JAWATAN PROF C, University Malaya, 25/01/2019 to 24/01/2022
  • AHLI JK PEMILIH CUTI BELAJAR DAN SLAB/SLAI 2019/2020, University Malaya, 01/01/2019 to 31/12/2020
  • AHLI SENAT, University Malaya, 17/12/2018 to 16/12/2021
  • Programme Coordinator, Faculty, 07/08/2017 to 06/08/2020 (Bagi penawaran program baru sarjana Cyber Security)
  • Ahli JK Tapisan - Fakulti Sains, Faculty, 03/07/2017 to 31/12/2019 (Bagi Permohonan Kenaikan Pangkat Jawatan Akademik)
  • Ahli JK Penilai Luar Program - Bidang Sains Teknologi dan Klinikal, University Malaya, 01/06/2017 to 16/12/2018 (Ahli JK Penilai Luar Program - Bidang Sains Teknologi dan Klinikal)
  • Wakil Senat - JK Perpustakaan Universiti, University Malaya, 26/05/2017 to 16/12/2018 (Wakil Senat (Ahli ganti) ke JK Perpustakaan UM)
  • Pengawai Penilai Prestasi Khas, University Malaya, 15/05/2017 to 14/05/2018 (PPPK - Exit Policy)
  • Wakil Senat - Ahli JK Pengajian (Ijazah Tinggi), Faculty, 01/05/2017 to 16/12/2018 (Bagi Program Baru Sarjana Sains Perlindungan Tanaman)
  • Ahli JK Tapisan (Pelantikan), Faculty, 16/03/2017 to 15/03/2020 (Ahli JK Tapisan (Pelantikan) Fakulti)
  • Ahli Panel Penemuduga Cuti Belajar dan SLAB/SLAI, University Malaya, 03/01/2017 to 31/12/2018 (Peringkat Pusat)
  • AJK Kump Penyelidik ICT Security Research Group, Faculty, 13/12/2016 to 12/12/2018
  • AJK Kump Penyelidik IoT, Faculty, 13/12/2016 to 12/12/2018
  • Pengerusi/Panel REMOS.stk, Faculty, 25/11/2016 to 25/11/2016 (REMOS.stk)
  • Wakil Pengerusi, Faculty, 12/09/2016 to 11/06/2017 (Candidature Defence & Proposal Defence)
  • Wakil Senat - JK Induk Pengecualian dan Pemindahan Kredit, University Malaya, 26/08/2016 to 16/12/2018 (JK Induk Pengecualian dan Pemindahan Kredit)
  • Ahli JK Badan Penasihat Dekan, Faculty, 15/08/2016 to 30/06/2017 (Ahli JK)
  • Ahli JK Penyelidikan, Faculty, 10/08/2016 to 09/08/2017 (Wakil Digital Security Research)
  • Wakil Senat - Ahli Jawatankuasa Pemilih, University Malaya, 01/08/2016 to 16/12/2018 (Bagi Maksud Pelantikan dan Kenaikan Pangkat Ke Jawatan Reader dan Prof Madya or equivalent)
  • Senate Member, University Malaya, 17/12/2015 to 16/12/2018 (Senate Member)
  • Acting Dean, Faculty, 22/05/2014 to 23/05/2014
  • Ahli JK Kurikulum Jabatan - Program Sarjana, Faculty, 01/03/2014 to 28/02/2016
  • Ahli Panel Penemuduga, University Malaya, 14/11/2013 to 13/11/2014
  • Acting Dean, Faculty, 05/07/2013 to 09/07/2013
  • Ahli JKIT FSKTM, Faculty, 01/07/2013 to 30/06/2014
  • AJK Penilaian Slim Geran FRGS & ERGS Peringkat UM, University Malaya, 21/05/2013 to 31/12/2014
  • AJK PGRES FSKTM, Faculty, 07/02/2013 to 31/12/2013 (PGRES FSKTM)
  • Acting Director, Faculty, 10/01/2013 to 11/01/2013
  • Acting Director, Faculty, 29/11/2012 to 30/11/2012
  • Ahli Panel Penemuduga, University Malaya, 31/10/2012 to 30/10/2013 (Untuk Pemilihan Calon SLAB/SLAI)
  • Acting Director, Faculty, 26/09/2012 to 28/09/2012
  • Acting Director, Faculty, 22/09/2012 to 25/09/2012
  • Acting Director, Faculty, 28/08/2012 to 13/09/2012
  • Jawatankuasa Kerja Audit Program Ijazah Tinggi (JKAPIT), University Malaya, 06/08/2012
  • AJK Bright Spark FSKTM, Faculty, 01/07/2012 to 30/06/2014
  • Acting Director, Faculty, 17/06/2012 to 22/06/2012
  • AJK PGRES FSKTM , Faculty, 22/02/2012 to 31/12/2012 (PGRES FSKTM 2012)
  • Wakil Tetap Fakulti Ke JawatanKuasa Penasihat Akademik, IPS, Faculty, 26/08/2011
  • Timbalan Pengerusi NADI, Faculty, 22/08/2011 to 21/08/2013
  • PENGERUSI - JK Kurikulum FSKTM (Ijazah Tinggi), Faculty, 01/07/2011 to 30/06/2014
  • Deputy Dean of Higher Degree, Faculty, 01/07/2011 to 30/06/2014
  • PENGERUSI - JK Ijazah Tinggi (JKIT), Faculty, 01/07/2011 to 30/06/2014
  • Head of Department, Faculty, 12/05/2008 to 31/08/2009

AREAS OF EXPERTISE
(Area).


  • Security Services Sn: Digital Forensic, Steganography, Network Security, Public Key Infrastucture and Biometrics (Cloud computing, cyber security)
  • Information Security (Applied Cryptography, Applied Steganography)
  • Communication Protocols (Wireless Security, Ad-hoc Network Security, Mobile Communication Security)
  • Security Protocols (Group Communication, Key Management, Wireless Mobile Environments)


RECENT SELECTED PUBLICATIONS
(Publication).


Book

2017
  • Salman Iqbal & Miss Laiha Mat Kiah. (2017). Secure Group Communication Protocols in Wireless Mobile Environment. LAP LAMBERT Academic Publishing. 

2002
  • Omar Zakaria and Miss Laiha Mat Kiah (2002), Pengenalan Kepada Keselamatan Komputer (An Introduction to Computer Security), Mc-Graw Hill (M) Sdn Bhd. 
Chapter in Book

2011
  • Liana K. Qabajeh, Miss Laiha Mat Kiah & Mohammad M. Qabajeh. 2011. A Survey of Position-Based Routing Protocols for Ad-Hoc Networks. (DOI: 10.1007/978-1- 84996-510-1_4). Book chapter in Application and Multidisciplinary Aspects of Wireless Sensor Networks: Concepts, Integration, and Case Studies, Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic and Roman Trobec (ISBN 976-1-84996-509-5), Part 1, pp. 47-83, Springer. 
Article in Academic Journals

2020
  • Fawad Ali Khan , Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani Idna Idris, Tey Kok Soon, Muneer Ahmad, "Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things", Sensors (IF=3.031,Q1) (Accepted) (ISI-Indexed)
  • Shaik Shabana Anjum, Rafidah Md Noor, Ismail Ahmedy, Mohammad Hossein Anisi, Saaidal Razalli Azzuhri, Miss Laiha Mat Kiah, Jaime Lloret, Pradeep Kumar, An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks, Ad Hoc & Sensor Wireless Networks (F=0.948, Q4), 2020 (Accepted) (ISI-Indexed)

2019
  • Talal, M., Zaidan, A.A., Zaidan, B.B., O. S. Albahri, A. H. Alamoodi, M. A. Alsalem, A. S. Albahri, M. L. M. Kiah, F. M. Jumaah & Mussab Alaa. 2019. Comprehensive review and analysis of anti-malware apps for smartphones. Telecommun Syst 72, 285–337. [Q3-ISI, IF=1.707] (ISI-Indexed)
  • Fawad Ali Khan, Rafidah Md Noor*, Miss Laiha Binti Mat Kiah, Noorzaily Mohd Noor, Saleh M. Altowaijri, Atiq Ur Rahman, QoS Enabled Layered based Clustering for Reactive Flooding in Internet of Things, Symmetry (IF = 1.256 Q2), (2019) (Accepted) (ISI-Indexed)
  • Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah. (2019). Enhancement of Cybersecurity Awareness Program on Personal Data Protection Among Youngsters in Malaysia: An Assessment. Malaysian Journal of Computer Science. 32 (3). (ISI-Indexed)
  • Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Miss Laiha Mat Kiah, Lau Sian Lun, Nor Badrul Annuar Juma'at, Ismail Ahmedy, Norjihan Abdul Ghani and Sananda Bhattacharyya, Review on Security of Internet of Things Authentication Mechanism, IEEE Access (IF=4.098, Q1), Volume: 7, Issue:1, DECEMBER 2019, DOI 10.1109/ACCESS.2019.2947723 (ISI-Indexed)
  • Shaik Shabana Anjum, Rafidah Md Noor, Nasrin Aghamohammadi, Ismail Ahmedy, Miss Laiha Mat Kiah, Nornazlita Hussin, Mohammad Hossein Anisi and Muhammad Ahsan Qureshi, Modelling Traffic Congestion based on Air Quality for Greener Environment: An Empirical Study, Vol. 7, Issue 1, December 2019, IEEE Access (IF=3.557,Q1) (ISI-Indexed)

2018
  • Salman Iqbal, Miss Laiha Mat Kiah, Aws Alaa & Babak Daghighi. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients. Journal of Health and Technology. Online first on 30 Aug 2018. p1-19. (ISI-Indexed)
  • Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, Reza Ismail. (2018). Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey. International Journal on Advanced Science Engineering Information Technology, 8(4-2). (SCOPUS-Indexed)
  • Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. Kiah, S. Iqbal and Mohamed Abdulnabi. (2018). A security framework for mHealth apps on Android platform. Computers & Security. 75, 191-217. [Q1-ISI] (ISI-Indexed)
  • Salman Iqbal, Miss Laiha Mat Kiah & Babak Daghighi. DM-GKM: A key management scheme for dynamic group based applications. Wireless Personal Communications Journal. [UNDER-REVIEW] (ISI-Indexed)

2017
  • Mussab, Alaa. Zaidan, A.A. Zaidan, B.B. Mohammed, Talal & Kiah, M.L.M. (2017). A review of smart home applications based on Internet of Things. Journal of Network and Computer Applications, 97, 48-65. (ISI-Indexed)
  • Daghighi, B. Mat Kiah, M.L. Iqbal, S. Ur Rehman, M.H. & Martin, K. (2017). Host mobility key management in dynamic secure group communication. Wireless Networks, 23(147), 1-19. (ISI-Indexed)
  • Mohamed Abdulnabi, Ahmed Al-Haiqi, M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan, Muzammil Hussain. (2017). A Distributed Framework for Health Information Exchange Using Smartphone Technologies. Journal of Biomedical Informatics, 69, 230-250. [Q1-ISI] (ISI-Indexed)
  • Shu Yun Lim. M.L Mat Kiah. Tan Fong Ang. (2017). Security Issues and Future Challenges of Cloud Service Authentication. Acta Polytechnica Hungarica (Journal of Applied Sciences), 14(2). [ACCEPTED] DOI: 10.12700/APH.14.2.2017.2.4 (ISI-Indexed)

2016
  • Saybani, M.R. Wah, T.Y. Aghabozorgi, S.R. Shamshirband, S. Mat Kiah, M.L. & Balas, V.E. 2015. Diagnosing Breast Cancer with an Improved Artificial Immune Recognition System. Soft Computing. [ISI-Q2] (ISI-Indexed)
  • Igbal, S. Mat Kiah, M.L. Daghighi, B. Hussain, M. Khan, S. Khan, M.K. & Choo, K.K.R. 2016. On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications. [Q1-ISI] (ISI-Indexed)
  • Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab and Suleman Khan. (2016). Service Delivery Models of Cloud Computing: Security Issues and Open Challenges. Security and Communication Networks. (ISI-Indexed)
  • Muzammil Hussain, Ahmed Al-Haiqi, A.A. Zaidan, B.B. Zaidan, M.L. Mat Kiah, Nor Badrul Anuar & Mohamed Abdulnabi. 2016. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive and Mobile Computing 25(c):1-25. [Q1-ISI] (ISI-Indexed)

2015
  • Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ismail Ahmedy. 2015. Survey of secure multipath routing protocols for WSNs. Journal of Network and Computer Applications 55:123-153. [ISI-Q1] (ISI-Indexed)
  • Altameem, T. A., Nikolic, V., Shamshirband, S., Petkovic, D., Javidnia, H., Kiah, M. L. M., Gani, A. 2015. Potential of support vector regression for optimization of lens system Computer-Aided Design (ISI-Indexed)
  • Benyamin Khoshnevisan, Elham Bolandnazar, Shahaboddin Shamshirband, Hanifreza Motamed Shariati, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2015. Decreasing environmental impacts of cropping systems using LCA and multi-objective genetic algorithm. Journal of Cleaner Production 86:67-77. [ISI-Q1] (ISI-Indexed)
  • A.A. Zaidan, H.Abdul Karim, N.N. Ahmad, B.B. Zaidan & M.L. Mat Kiah. 2015. Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning. Journal of Circuits, Systems and Computers 24(2). [ISI-Q4] (ISI-Indexed)
  • Milan Proti, Shahaboddin Shamshirband, Dalibor Petkovi, Almas Abbasi, Miss Laiha Mat Kiah, Jawed Akhtar Unar, Ljiljana ivkovi & Miomir Raos. 2015. Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm. Energy 87:343- 351. [ISI-Q1] (ISI-Indexed)
  • Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband & Steven Furnell. 2015. A systematic review of approaches to assessing Cybersecurity awareness. Kybernetes 44 (4):606-622. [ISI-Q4] (ISI-Indexed)
  • A.A. Zaidan, B.B. Zaidan, Ahmed Al-Haiqi, M.L.M. Kiah, Hussaen Muzamel & Mohamed Abdulnabi. 2015. Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS. Journal of Biomedical Informatics 53:390- 404. [ISI-Q1] (ISI-Indexed)
  • B.B. Zaidan, Ahmed Haiqi, A.A. Zaidan, Mohamed Abdulnabi, M. L. Mat Kiah & Hussaen Muzamel. 2015. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy. Journal of Medical Systems 39:51. [ISI-Q2] (ISI-Indexed)
  • Mahmoud Reza Saybani, Shahaboddin Shamshirband, Shahram Golzari, Teh Ying Wah, Saeed Reza Aghabozorgi, Miss Laiha Mat Kiah & Valentina Emilia Balas. 2015. RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system. Medical & Biological Engineering & Computing. [Accepted] [ISI-Q2] (ISI-Indexed)
  • Dalibor Petkovic, Shahaboddin Shamshirband, Nor Badrul Anuar,Sareh Naji, Miss Laiha Mat Kiah & Abdullah Gani. 2015. Adaptive neuro-fuzzy evaluation of wind farm power production as function of wind speed and direction. Stochastic Environmental Research and Risk Assessment 29:793- 802. [ISI-Q1] (ISI-Indexed)
  • Abdul Nasir Khan, M.L. Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband & Atta ur Rehman Khan. 2015. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. Journal of Grid Computing 13(4):651-675. [ISI-Q1/Q2] (ISI-Indexed)
  • A.A. Zaidan, B.B. Zaidan, Muzammil Hussain, Ahmed Haiqi, M.L. Mat Kiah & Mohamed Abdulnabi. 2015. Multi- Criteria Analysis for OS-EMR Software Selection Problem: A Comparative Study. Decision Support Systems 78:15-27. [ISI-Q1] (ISI-Indexed)
  • Muzammil Hussain, Ahmed Al-Haiqi, A.A. Zaidan, B.B. Zaidan, M.L.M. Kiah, Nor Badrul Anuar & Mohamed Abdulnabi. 2015. The Landscape of Research on Smartphone Medical Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations. Computer Methods and Programs in Biomedicine 122 (3):393-408. [Q1-ISI] (ISI-Indexed)

2014
  • Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan & Shahab Shamshirband. 2014. Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment. Journal of Supercomputing 68(2): 624-651. [ISI-Q2] (ISI-Indexed)
  • Shahaboddin Shamshirband, Dalibor Petkovi , Nor Badrul Anuar, Miss Laiha Mat Kiah, Shatirah Akib, Abdullah Gani, arko ojba i & Vlastimir Nikoli . 2014. Sensorless estimation of wind speed by adaptive neuro-fuzzy methodology. International Journal of Electrical Power & Energy Systems 62:490- 495. [ISI-Q1] (ISI-Indexed)
  • Babak Daghighi & Miss Laiha Mat Kiah. 2014. A Group Key Management Scheme in Wireless Mobile Environment. ScienceAsia Journal. [Accepted] [ISI-Q3] (ISI-Indexed)
  • Afshin Jahangirzadeh,Shahaboddin Shamshirband,Saeed Aghabozorgi, Shatirah Akib,Hossein Basser, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier. Neurocomputing 140(22):172-184. [ISI-Q2] (ISI-Indexed)
  • Shamshirband,S., Petkovic, D., Amini, A., Anuar, N.B., Nikolic, V., Cojbasic, Z., Mat Kiah, M.L. & Gani, A. 2014. Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission. Energy 67:623-630. [ISI-Q1] (ISI-Indexed)
  • Shamshirband, S., Petkovi, D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., Cojbasic, Z., Nikolic, V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81: 520-526. [ISI-Q1] (ISI-Indexed)
  • Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Al-Sakib Khan Pathan. 2014. Routing protocol design for secure WSN: Review and open research issues. Journal of Network and Computer Applications 41:517- 530. [ISI-Q1] (ISI-Indexed)
  • Shamshirband, S., Petkovi , D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., ojba i , ., Nikoli , V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81:520 526. [ISI-Q1] (ISI-Indexed)
  • Shahaboddin Shamshirband, Mohd Rashid Mohd Radzi, Saeed Aghabozorgi, Sanjay Misra, Shatirah Akib & Miss Laiha Mat Kiah. 2014. Potential of Support Vector Regression for Forcasting of Stream Flow. Tehnicki Vjesnik 21(5):1017-1024. [ISI-Q3] (ISI-Indexed)
  • Daghighi, B., Kiah, M. L. M., Shamshirband, S., & Rehman, M. H. U. 2014. Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. Journal of Network and Computer Applications 50:1-14. [ISI-Q1] (ISI-Indexed)
  • M.L.M Kiah, Ahmed Haiqi, B.B Zaidan & A.A Zaidan. 2014. Open Source EMR Software: Profiling, Insights and Hands-on Analysis. Computer Methods and Programs in Biomedicine. [ISI-Q1] (ISI-Indexed)
  • Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Sanjay Misra. 2014. Anomaly Detection using Fuzzy Q-learning Algorithm in Wireless Network. Acta Polytechnica Hungarica. [ISI-Q3] (ISI-Indexed)
  • M.L.Mat Kiah, S.H. Al-Bakri, A.A. Zaidan, B.B. Zaidan & Muzammil Hussain. 2014. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture. Journal of Medical Systems. [ISI-Q2] (ISI-Indexed)
  • Ehsan Daryabeigi, Ali Zafari,Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm. International Journal of Electrical Power & Energy Systems 61:326- 334.[ISI-Q1] (ISI-Indexed)
  • Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad A. Madani, Atta ur Rehman Khan & Shahaboddin Shamshirband. 2014. BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment. Journal of Supercomputing 70(2):946-976. [ISI-Q2] (ISI-Indexed)
  • H.O. Alanazi, A.A. Zaidan, B.B. Zaidan, M.L. Mat Kiah & S.H. Al-Bakri. 2014. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. Journal of medical systems 39:165. [ISI-Q2] (ISI-Indexed)
  • Shahaboddin Shamshirband, Nor Badrul Anuar, Babak Daghighi, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham. 2014. Co-FQL :Anomaly Detection Using Cooperative Fuzzy Q-learning in Network. Journal of Intelligent Fuzzy Systems. [ISI-Q3] (ISI-Indexed)
  • Dalibor Petkovi , Shahaboddin Shamshirband, Javed Iqbal, Nor Badrul Anuar, Nenad D. Pavlovi & Miss Laiha Mat Kiah. 2014. Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper. Applied Soft Computing 22:424-431. [ISI-Q1] (ISI-Indexed)
  • Dalibor Petkovic, Shahaboddin Shamshirband, Nenad D. Pavlovic, Abdullah Gani & Miss Laiha Mat Kiah. 2014. Kinetostatic analysis of passively adaptive robotic finger with distributed compliance. Advances in Mechanical Engineering. [ISI-Q2] (ISI-Indexed)
  • Shamshirband S, Hessam S, Javidnia H, Amiribesheli M, Vahdat S, Petkovic D, Gani A, Kiah MLM. 2014. Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System. International Journal of Medical Science. 11(5):508-514. [ISI-Q1] (ISI-Indexed)
  • Shahaboddin Shamshirband, Dalibor Petkovi , arko ojba i , Vlastimir Nikoli , Nor Badrul Anuar, Nor Liyana Mohd Shuib, Miss Laiha Mat Kiah & Shatirah Akib. 2014. Adaptive neuro-fuzzy optimization of wind farm project net profit. Energy Conversion and Management. [ISI-Q1] (ISI-Indexed)
  • Dalibor Petkovi, Shahaboddin Shamshirband, Nenad Pavlovi, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology. Optics and Spectroscopy. [ISI-Q4] (ISI-Indexed)
  • Shahaboddin Shamshirband, Amineh Amini, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ying Wah Teh & Steven Furnell. 2014. D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55: 212-226. [ISI-Q2] (ISI-Indexed)
  • Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ajith Abraham. 2014. Cooperative Game Theoretic Approach using Fuzzy Q-learning for Detecting and Preventing Intrusions in Wireless Sensor Networks. Engineering Applications of Artificial Intelligence 32:228-241. [ISI-Q1] (ISI-Indexed)
  • M.L.M. Kiah, B.B Zaidan, A.A.Zaidan, Mohamed Nabi & Rabiu Ibraheem. 2014. MIRASS: Medical Informatics Research Activity Support System using Information Mashup Network. Journal of Medical Systems 38 (37):1-15. [ISI-Q2] (ISI-Indexed)
  • Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovi , Sanjay Misra & Abdul Nasir Khan. 2014. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. Journal of Network and Computer Applications 42:102- 117. [ISI-Q1] (ISI-Indexed)

2013
  • Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan & Mazhar Ali. 2013. Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing. Journal of Supercomputing 66(3):1687-1706. [ISI-Q2] (ISI-Indexed)
  • Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2013. A review of dynamic and intelligent honeypot. ScienceAsia Journal 39(1):1-5. [ISI-Q3] (ISI-Indexed)
  • M.L Mat Kiah, Mohamed S.Nabi, B.B Zaidan & A.A Zaidan. 2013. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP-XML and SHA-1. Journal of Medical Systems 37:9971. [ISI-Q2] (ISI-Indexed)
  • Dalibor Petković, Nenad T. Pavlović, Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Mohd Yamani Idna Idris. 2013. Adaptive neuro-fuzzy estimation of optimal lens system parameters. Optics and Lasers in Engineering 55:84-93. [ISI-Q2] (ISI-Indexed)
  • Dalibor Petkovi, arko jba I, Vlastimir Nikoli, Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Ainuddin Wahid Abdul Wahab. 2013. Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission. Energy 64:868-874. [ISI-Q1] (ISI-Indexed)
  • Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ahmed Patel. 2013. An Appraisal and Design of Multi Agent Systems Based on Cooperative Wireless Intrusion Detection Computational Intelligence Techniques. Engineering Applications of Artificial Intelligence 26(9):2105-2127. [ISI-Q1] (ISI-Indexed)

2012
  • Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan & Sajjad A. Madani. 2012. Towards Secure Mobile Cloud Computing: A Survey. Future Generation Computer Systems 29(5):1278-1299. [ISI-Q1] (ISI-Indexed)
  • Liana Khamis Qabajeh, Miss Laiha Mat Kiah, Mohammad Moustafa Qabajeh. 2012. A More Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. Security and Communication Networks 6(3):286-308. [ISI-Q4] (ISI-Indexed)

2011
  • Sameer Hasan Al-Bakri, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan & Gazi Mahabubul Alam. 2011. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences 6(4):930-938. [ISI-Q2] (ISI-Indexed)
  • Qabajeh, L., Mat Kiah, M. L. & Qabajeh, M. 2011. Secure Unicast Position-Based Routing Protocols for Ad- Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences) 8(6):191-214. [ISI-Q3] (ISI-Indexed)
  • M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan, A. Mohammed Ahmed & Sameer Hasan Al-bakri. 2011. A review of audio based steganography and digital watermarking. International Journal of the Physical Sciences 6 (16):3837-3850. [ISI-Q2] (ISI-Indexed)
  • B.B.Zaidan, A.A. Zaidan, M.L. Mat Kiah. 2011. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: Review, Participates Opinion and Expert Concerns. International Journal of Pharmacology 7(3):382-387.[ISI-Q4] (ISI-Indexed)

2010
  • Miss Laiha Mat Kiah, Liana Khamis Qabajeh, Mohammad Moustafa Qabajeh. 2010. Unicast Position-Based Routing Protocols for Ad-Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences, ISSN: 17858860)7(5):19-46.[Q3-SCI][JCR2010] (ISI-Indexed)
  • Hamdan O. Alanizi, M. L. Mat Kiah, A.A.Zaidan, B.B.Zaidan & G.M. Alam. 2010. Secure Topology for Electronic Medical Record Transmissions. International Journal of Pharmacology 6(6):954-958. [ISI-Q4] (ISI-Indexed)
  • Mohamed S. A.Nabi, M.L. Mat Kiah, B.B. Zaidan, A.A. Zaidan & G.M. Alam. 2010. Suitability of SOAP Protocol in Securing Transmissions of EMR Database. International Journal of Pharmacology 6(6):959-964. [ISI-Q4] (ISI-Indexed)
  • Sameer Hasan Al-bakri & M. L. Mat Kiah. 2010. A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Scientific Research and Essays 5(22):3455-3466.[ISI- Q3] (ISI-Indexed)
  • Por Lip Yee & Miss Laiha Mat Kiah. 2010. Shoulder Surfing Resistance Using PENUP Event and Neighboring Connectivity Manipulation. Malaysian Journal of Computer Science 23(2):121-140.[Q4-SCI][JCR2010] (ISI-Indexed)
  • B. B. Zaidan, A. A. Zaidan, Alaa Taqa, Gazi Mahabubul Alam, M. L. Mat Kiah & Hamid Jalab. 2010. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. International Journal of the Physical Sciences 5(11):1796-1806. [ISI-Q2] (ISI-Indexed)
  • Saman Mirza Abdulalla, Laiha Mat Kiah & Omar Zakaria. 2010. A biological model to improve PE malware detection: Review. International Journal of the Physical Sciences 5(15): 2236-2247. [Q2-SCI][JCR2010] (ISI-Indexed)
  • Gazi Mahabubul Alam, M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan and Hamdan O. Alanazi. 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Scientific Research and Essays 5(21):3254-3260.[ISI-Q3] (ISI-Indexed)
  • Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B. Zaidan and A.A. Zaidan. 2010. A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. Journal of Applied Sciences 10(1): 59-64. (ISI/SCOPUS Indexed Publication)

2009
  • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks. International Journal of Computer Science and Network Security (IJCSNS) 9(2): 131-140. (Non-ISI/Non-SCOPUS)
  • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Scalable and Secure Position- Based Routing Protocol for Ad-Hoc Networks. Malaysian Journal of Computer Science (ISSN 0127- 9084) 22(2):99- 120. [Q4-SCI] (ISI-Indexed)

2008
  • Mat Kiah, M.L. & Martin, K.M. 2008. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and Its Applications (IJSIA) 2(1):39-52. (SCOPUS-Indexed)
Proceeding

2018
  • Atif Mahmood, Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Adnan N. Qureshi. 2018. Wireless Backhaul Network Optimization Using Automated KPIs Monitoring System Based on Time Series Forecasting. World Symposium on Communication Engineering 2018, ISBN 978-1-5386-7985-2. (Non-ISI/Non-SCOPUS)

2017
  • Chowdhury, F.Z., Idris, M. Y, Mat Kiah, M.L, Ahsan, M. A. 2017. EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing. In the Proceeding of 8th IEEE Control and System Graduate Research Colloquium, 4-5th Aug 2017 Shah Alam, Selangor, Malaysia. (ISI-Indexed)

2015
  • M.L.M. Kiah, Ahmed Haiqi, B.B. Zaidan, A.A. Zaidan & Mohamed Abdulnabi. 2015. Open Source EMR Software: How to Select the Best Software?. Proceeding of 3rd International Conference on Information and Computer Networks (ICICN). (ISI/SCOPUS Indexed Publication)

2013
  • Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2013. Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning. Kaspersky�s CyberSecurity for the Next Generation, National University of Singapore, Republic of Singapore, 21 - 23 March 2013. (ISI/SCOPUS Indexed Publication)
  • Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani. 2013. A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments. IEEE Symposium on Wireless Technology and Applications (ISWTA 2013), September 22-25, 2013, at Pullman Kuching Hotel, Malaysia. (ISI/SCOPUS Indexed Publication)
  • Nabi, M. S., Mat Kiah, M. L., Zaidan, A. A., & Zaidan, B. B. 2013. Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. In Future Generation Communication Technology (FGCT), 2013 Second International IEEE Conference. 93- 97. (ISI-Indexed)

2012
  • S. M. Abdulla, M. L. Mat Kiah & O. Zakaria. 2012. Minimizing Errors in Identifying Malicious API to Detect PE Malwares Using Artificial Costimulation. International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE'2012), pg. 49-54. 
  • Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2012. A Review on Artificial Intelligence Techniques for Developing Intelligent Honeypot. International Conference on Next Generation Information Technology (ICNIT2012). Seoul, Korea. (Non-ISI/Non-SCOPUS)
  • Hossein Javidnia,Shahaboddin Shamshirband & Miss Laiha Mat Kiah. 2012. Cooperative Multi-agent System Based on Fuzzy Quantum Cryptography. International Conference on Electrical, Computer, Electronics & Biomedical Engineering(ICECEBE�2012). Bangkok, Thailand. (Non-ISI/Non-SCOPUS)

2011
  • Mat Kiah, M.L., Daghighi, B.,& Albakri, S. 2011. An Implementation of Group Key Management in a Wireless Environment. International Conference on Electronics, Networks and Computer (ICENC 2011), Kuala Lumpur, Malaysia. (ISI/SCOPUS Indexed Publication)

2010
  • Daghighi, B., Mat Kiah, M.L.& Afkhami, S. 2010. Group Key Management Using Public Key Exchange. International Conference on Intelligent network & Computing, Malaysia. (ISI/SCOPUS Indexed Publication)
  • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2010. A Scalable and Secure Position- Based Routing Protocol for MANETs. Proceedings of the Annual International Conference on Network Technologies & Communication (NTC 2010), 29-30th November, Phuket Beach Resort, Thailand, pp. N7-N12. 

2009
  • L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable, Distributed and Secure Routing Protocol for MANETs. Proceedings of the International Conference on Computer Engineering and Applications (ICCEA 2009), pp. 51-56, 6-8 June 2009, Manila, Philippine. (Indexed by Ei Compendex and Thomson ISI) 
  • Nor Aniza Abdullah, Safinaz Mustapha, Miss Laiha Mat Kiah. 2009. A Requirement Framework For Livestock Farming Web Service Application. Proceeding of the 3rd International Conference on Informatics and Technology, 27 - 28th October, Kuala Lumpur Malaysia. 
  • Daghighi, B.,& Mat Kiah, M.L. 2009. Secure Group Communication Using Public Key Exchange. In the Proceeding of 3rd International Conference on Informatics and Technology, 27 - 28th Oct 2009 Kuala Lumpur, Malaysia. 
  • L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable Secure Routing Protocol for MANETs. Proceedings of The International Conference on Computer Technology and Development (ICCTD 2009), pp.143-147, 13-15 Nov, Kota Kinabalu, Malaysia. (Indexed by Ei Compendex and ISI) 
  • Mohamed Elsadig Eltahir, Miss Laiha Mat Kiah, Bilal Bahaa Zaidan & Aos Alaa Zaidan. 2009. High Rate Video Streaming Steganography. International Conference on Future Computer and Communication, pp 550-553.(Indexed by EI Compendex, INSPEC, Thomson ISI, IEEE XploreTM,IEEE Computer Society digital libraries) 

2007
  • Miss L. Mat Kiah and Keith M. Martin. 2007. Secure Multicast: Investigating the Different Challenges between Internet and Mobile Environments. In Proceeding of M2USIC 2007, 19 & 20th Nov 2007, Hilton Hotel PJ, Malaysia. 
  • Miss Laiha Mat Kiah & Keith Martin. 2007. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. Proceeding of International Conference on Future Generation Communication Networking,06-08 Dec 2007, Jeju Island South Korea, Vol. 1, pg 99-106. 

2006
  • MatKiah, M. L. and Martin, K. M. (2006). A generic group key management framework for group communication in wireless mobile environments. In Proceedings of the Sixth International Network Conference (INC2006), pp. 347-354. 

2005
  • MatKiah, M. L. and Martin, K. M. (2005). Group communication: Design challenges in the development of key management frameworks in wireless mobile environments. In Proceedings of International Conference on Security and Management (SAM\'05), pp. 385-390. Las Vegas, USA. 
Technical Report

2018
  • Hussain, A., Luqman, W., Anuar, N. B., Kiah, M. L. M., & Kumar, S. (2018). Digital Rights Management for Cloud Based Storage Providers. Technical Report. Universiti Malaya, Kuala Lumpur, Malaysia. 

2017
  • Zamanian, A., Feizollah, A., Anuar, NB., Kiah, M. L. M., Srikanth, K., and Kumar, S. (2017). Anomaly Detection in Policy Authorisation Activity Log. Technical Report, Universiti Malaya, Kuala Lumpur, Malaysia. 

AREAS OF RESEARCH
(Project title), (Role), (From)-(Until), (Level), (Source).


  • Centre For Reseach In Industry 4.0 (cr14.0), Consultant, 2019 - 2020, Government Agency, (National)
  • A Secure and Flexible Authenticated Encryption Schemes, Consultant, 2019 - 2022, Fundamental Research Grant Scheme (FRGS), (National)
  • An Improved Solution on Sidechain Manipulation for Secure and Scalable Ethereum's Blockchain, Principal Investigator(PI), 2019 - 2022, Fundamental Research Grant Scheme (FRGS), (National)
  • Security of Service-oriented Vehicular Cloud Network using Group Signatures for Intelligent Transportation Systems, Consultant, 2019 - 2022, Fundamental Research Grant Scheme (FRGS), (National)
  • Prevent Password Reconstruction Attack For Cyber Security Authentication Using Knowledge-based Method, Consultant, 2019 - 2020, Fundamental Research Grant Scheme (FRGS), (National)
  • The Investigation into Permutation Property of Block Ciphers, Consultant, 2018 - 2019, RU Geran - Fakulti Program, (National)
  • Dynamic Value Approach to Address Factory Default and Reset Vulnerabilities on IoT Devices, Principal Investigator(PI), 2018 - 2019, RU Geran - Fakulti Program, (National)
  • Wireless Backhaul Network Planning and Optimization Techniques Based on Deep Learning Algorithms, Consultant, 2018 - 2020, Bantuan Kecil Penyelidikan (BKP), (National)
  • Healthcare Meets Big Data: Security And Privacy Protection, Consultant, 2018 - 2020, RU Geran - Fakulti Program, (National)
  • Smart And Security Enhanced Transportation Ecosystem For A Future Sustainable Smart City, Consultant, 2018 - 2020, Partnership Grant, (National)
  • Decentralization Of Laboratory Exercise Via Remote Application: A State-of-the-art Approach Toward Efficient Educational Facility Resource And Energy Management In Academic Institutions, Consultant, 2018 - 2019, UM Living Lab Grant Programme - SUS (Sustainability Science), (National)
  • Drm For Cloud Based Storage Providers, Principal Investigator(PI), 2017 - 2019, Private Funding, (National)
  • Anomaly Detection In Policy Authorization Activity Logs, Consultant, 2017 - 2019, Private Funding, (National)
  • Modelling And Governing Traffic Congestion: Air Quality,emission, & Traffic Use, Consultant, 2015 - 2018, Grand Challenge - SUS (Sustainability Science), (University)
  • Secure Group Communication For Critical National Information Infrastructur (cnii), Principal Investigator(PI), 2013 - 2016, MOSTI-Science Fund, (National)
  • Secure Group Communication for Critical National Information Infrastructure, Principal Investigator(PI), 2013 - 2016, ScienceFund, (National)
  • Implementation of Secure Framework for Electronic Medical Records (EMRs), Principal Investigator(PI), 2012 - 2015, High Impact Research (HIR), (National)
  • Implementation Of Secure Framework For Electronic Medical Record (emrs)., Principal Investigator(PI), 2012 - 2016, High Impact Research - Ministry of Education (HIR-MOE) Cycle 2, (National)
  • Deployment of Virtual Honeypots, Principal Investigator(PI), 2011 - 2013, Geran Penyelidikan Universiti Malaya (UMRG), (National)
  • Information and Communication Security, Principal Investigator(PI), 2010 - 2011, Special Fund, (National)
  • A SCALABLE, DISTRIBUTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, , 2010 - 2011, Postgraduate Research Grant (PPP) - Research, (National)
  • AN IMPLEMENTION OF SECURE GROUP COMMUNICATION, Principal Investigator(PI), 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG), (National)
  • A SCALABLE, DISTRIBTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, , 2009 - 2010, Postgraduate Research Grant (PPP) - Research, (National)
  • An Implemetation of Secure Group Communication, Principal Investigator(PI), 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG), (National)
  • PUBLIC KEY INFRASTRUCTURE FOR SECURE MOBILE MESSAGIN USING ELLIPTIC CURVE CRYPTOSYSTEM, , 2009 - 2010, Postgraduate Research Grant (PPP) - Research, (National)
  • Secure Routing Protocols for Large Mobile Ad-Hoc Networks, Principal Investigator(PI), 2008 - 2010, Short Term Research Fund (Vote F)(PJP), (National)
  • Information Security
  • Security Systems
  • Network Security

CONSULTATION PROJECT/CONSULTANCY
(Project title), (Role), (From)-(Until), (Organisation).


  • Cisco Netriders Competition 2011, 2011-2011, TAR College
  • Ahli Akademik sebagai Panel Penemuduga HLP Sessi 2012, 2011-2011, JPA
  • Cisco Competition 2009, 2009-2009, UniKL

AWARDS AND RECOGNITIONS
(Name of Award), (Awarding Institution), (Year Awarded), (Level).


  • Gold Award - Innovation, Uitm Melaka, 2019, (International)
  • Instructor 10 Years of Service, Cisco Academy, 2019, (International)
  • Fcsit Innovation Exhibition Competition 2018, UM, 2018, (Ptj)
  • International Research Innovation, Invention & Solution Exposition (Iriise 2018) 14 - 16 August 2018 Dewan Tunku Canselor, University of Malaya, UM, 2018, (National)
  • Leaders in Innovation Fellowships 2017-2018 Grant Award, Newton Fund, 2018, (International)
  • Panel of Jury - Um3mt 2018 - Fea UM, Fea UM, 2018, (Ptj)
  • Inspiring Professor for Motivational Talk - for 1st Class Students and Alumni, Fsktm UM, 2018, (Ptj)
  • Silver Award for Iot Based Eco Friendly Traffic Light Controller, Uitm, 2017, (National)
  • Gold Award for Go Green Malaysia - Iidex 2017, Uitm, 2017, (National)
  • Leaders in Innovation Fellowships, Royal Academy of Engineering , 2017, (International)
  • Best Paper Award, IEEE Css Malaysia Section, 2017, (National)
  • Certificate of Appreciation for Keynote Speech, The Society of Digital Information and Wireless Communications, 2016, (International)
  • Student Consultant, Ips UM, 2016, (University)
  • Chairperson for Pgres 2016, Fcsit UM, 2016, (Ptj)
  • Excellence Service Award, University Malaya, 2014, (University)
  • Certificate of Excellent Service, University Malaya, 2013, (University)
  • Instructor Years of Service, Cisco Networking Academy, 2013, (International)
  • Best Session Paper Award, International Research and Innovations in Science, Engineering and Technology (Iriset), 2012, (International)
  • Um Excellence Award, Naib Canselor, 2011, (University)
  • Excellence Award 2011, University of Malaya, 2011, (University)
  • Certificate of Excellent Service, University Malaya, 2010, (University)
  • Sijil Perkhidmatan Cemerlang, University of Malaya, 2010, (University)

PRESENTATIONS
(Title), (Event), (Date Presented), (Organiser), (Level).


INVITED SPEAKER
  • How to Write an Effective Technical Paper, Technical Writing Workshop 2017, 2017-03-28 to 2017-03-28, CSM, (National)
  • Writing Impact Papers, Bengkel Penulisan Jurnal Fakulti Teknologi dan Sains Maklumat, 2019-04-19 to 2019-04-19, FTSM UKM, (University)
  • Technical Writing for High Impact Publication, Bengkel Penulisan Manuskrip dan Penerbitan Berimpak Tinggi, 2019-12-23 to 2019-12-24, FSKTM UPM, (University)
PRESENTER
  • Suitability of Adopting S/MIME and OpenPGP Email Messages Protocol to Secure Electronic Medical Records, Second International Conference on Future Generation Communication Technologies, 2013-12-12 to 2013-12-14, British Computer Society, (International)
  • Open Source EMR Software: How to Select the Best Software?, 3rd International Conference on Information and Computer Networks (ICICN 2015), 2015-03-19 to 2015-03-20, ICICN, (International)
PLEANARY/KEYNOTE SPEAKER
  • Towards Realizing My-Health Nationwide System: A Proposal on Health Information Exchange (HIE), Fifth World Congress of Computing, Engineering and Technology (WCET) and Society of Digital Information and Wireless Communications (SDIWC), 2016-09-06 to 2016-09-08, The Society of Digital Information and Wireless Communications, (International)
POSTER
  • A Scientific Search Engine Based on Data Mashup, The Digital Education Show Asia 2014, 2014-05-27 to 2014-05-28, MDEC , (International)
OTHERS
  • Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning, Kaspersky s CyberSecurity for the Next Generation, 2013-09-26 to 2013-12-27, FIRA, (International)
  • EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing, 8th IEEE Control and System Graduate Research Colloquium, 2017-08-04 to 2017-08-05, UiTM, (International)

EXPERT/TECHNICAL CONTRIBUTIONS
(Activity), (Organisation), (Role), (From)-(Until), (Level).


  • A Speaker for Technical Writing Workshop 2017, CyberSecurity Malaysia, Speaker, (National)
  • Technical Committee, 2017 International Conference on Biometric Engineering and Forensics, Committee Member, (International)
  • TWG ICT FGD Workshop, EPU Jabatan Perdana Menteri, Focus Group Member, 2017-2017, (National)
  • Panellist for HLAF Scholarship Interview, Human Life Advancement Foundation, Panellist, 2017-2017, (National)
  • Panellist for Human Life Advancement Foundation (HLAF) Scholarships Interview, Human Life Advancement Foundation, Panellist, 2016-2016, (National)
  • Focus Group Member for MySEAL project Cybersecurity, Cybersecurity Malaysia, Committee Member, 2016-2016, (National)
  • PANEL PENILAI BAGI SESI PEMBENTANGAN KERTAS CADANGAN SKIM GERAN PENYELIDIKAN PEMBANGUNAN PROTOTAIP (PRGS) FASA 1/2014, IPPP Universiti Malaya, Panel Penilai, 2014-2014, (University)
  • Panel Viva Voce - Master of Info Tech (Full Research), Fakulti Teknologi dan Sains Maklumat UKM, Member Of Board Of Examiner, 2014-2014, (National)
  • Panel for Viva Voce - Phd Degree Candidate, Faculty of Computer Science & Info. Tech., University of Malaya, Member Of Board Of Examiner, 2013-2013, (University)
  • Panel for Viva Voce - Phd Degree Candidate, Faculty of Information Science & Technology, UKM, Member Of Board Of Examiners, 2013-2013, (National)
  • Reviewers for ACTA Press Journal, ACTA Press Journal Canada, 2010-Present, (International)
  • Panel Advisor for Competency Standards for Polytechnic Graduates, Jabatan Pengajian Politeknik dan Kolej Komuniti Kementerian Pengajian Tinggi Malaysia, Committee Member, 2008-2009, (National)

EVALUATION ACTIVITIES
(Description), (Evaluation Activity),(Year).


  • BAGI PROGRAM IJAZAH SARJANA MUDA SAINS KOMPUTER (KESELAMATAN KOMPUTER) DENGAN KEPUJIAN ,  (2019 - 2021)
  • Improving the Accuracy of User Authentication is Public Cloud Computing Through Adoption of Electronic Personal Synthesis Behavior (EPSB), Thesis ,  (2019 - 2019)
  • REAL-TIME ANOMALY DETECTION USING CLUSTERING-AWARE OF BIG DATA TECHNOLOGIES, Thesis ,  (2019 - 2019)
  • External Assessor for academic promotion to Assoc Prof/Professor, Academic Promotion ,  (2017 - 2017)
  • For Academic promotion to Associate Professor/Professor, Academic Promotion ,  (2017 - 2017)
  • MILP-Based Approach To Evaluation Of Tweak-Aes-128 Bits Resistant To Related-Key Differential And Boomerang Attacks, Article In Journal ,  (2017 - 2017)
  • External Examiner for Academic Program - Foundation in Computing and Diploma in IT, Academic Program External Examiner ,  (2017 - 2019)
  • 2017 CSM Technical Colloquim (Published Category), Article In Proceeding ,  (2017 - 2017)
  • 2017 CSM Technical Colloquim (Unpublished Category), Article In Proceeding ,  (2017 - 2017)
  • SECURE DATA COLLECTION USING MOBILE SENSORS IN STATICALLY DEPLOYED SENSOR NETWORKS, Article In Journal ,  (2017 - 2017)
  • Evaluation Panel for Newton-Ungku Omar Fund Research Project Proposal, Project ,  (2017 - 2017)
  • Evaluation Panel for Newton-Ungku Omar Fund - Project Research Proposal (2), Project ,  (2017 - 2017)
  • Expert Panel for Doctoral Consortium, Doctoral Consortium ,  (2016 - 2016)
  • SECURED IMAGE ENCRYPTION USING RANDOM NUMBERS AND REVERSIBLE DATA HIDING, Thesis ,  (2016 - 2016)
  • FRGS proposals, Permohonan Geran Frgs ,  (2016 - 2016)
  • Paper Reviewer for CSM 2016 Technical Colloquium, Article In Proceeding ,  (2016 - 2016)
  • Reviewer for JICT (Journal of Information and Communication Technology), Article In Journal ,  (2016 - 2016)
  • Risk Assessment Model for Organizational Information Security, Thesis ,  (2016 - 2016)
  • Esciencefund proposals, Permohonan Geran Penyelidikan Sciencefund ,  (2016 - 2016)
  • PhD thesis on 'Traffic Aware Backoff Scheduling of Low Data Rate Applications in Wireless Body Area Networks', Thesis ,  (2014)
  • Paper titled "Issues Affecting the Adoption of IPv6", Article In Proceeding ,  (2014)
  • Master Thesis (Full Research) titled 'SENIBINA KESELAMATAN MULTI-AGEN UNTUK E-LELONG PATUH SYARIAH', Thesis ,  (2014)
  • Paper titled "Path Loss Simulation in Different Radio Propagation Models with 1.8GHz and 2.6GHz Bands", Article In Proceeding ,  (2014)
  • Paper titled 'PROTECTING WIRELESS DATA TRANSMISSION USING WATERMARKING TECHNIQUE APPROACH', Article In Journal ,  (2014)
  • Paper titled 'Study the Reality and Future of the Affordable and Secure Mobile Cloud Computing (SMCC)', Article In Journal ,  (2014)
  • Phd Thesis on 'Infrastructure Based Management And Optimization For NEMO Correspondent Registration', Thesis ,  (2013)
  • PhD Thesis on 'Enhancing Security in Mobile IPv6 with Private Key-based Binding Update Key Protocol', Thesis ,  (2013)
  • Master Thesis on 'Kajian Perbandingan Model Gelombang Penyebaran Radio Terhadap Rangkaian 4G', Thesis ,  (2013)
  • Master Thesis on 'Parallel Chaotic Hash Function Based on the Shuffle-Exchange Network', Thesis ,  (2013)
  • Master Thesis on 'Key Authentication in Closed Communities Using Images', Thesis ,  (2013)
  • M-XKMS: Adaptation of XKMS for Mobile Devices to Secure Short Message Service Using XML Key Management Specification, Article In Journal ,  (2012 - 2012)
  • SECURITY ANALYSIS OF WATERMARKING PROTOCOLS AND SCHEMES BASED ON SINGULAR VALUE DECOMPOSITION, Thesis ,  (2012 - 2012)
  • Development of High Secure Data Hiding System Using Least Significant Bit Algorithm, Thesis ,  (2012 - 2012)
  • A Generic Relation to Assess Interdependency of QoE and QoS, Thesis ,  (2012 - 2012)
  • Research Project for MCS candidate - Improving DSR Routing Protocol Using TTL-Based in Mobile Ad Hoc Network (MANET), Project ,  (2012 - 2012)
  • Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique - Re-Examination, Thesis ,  (2012 - 2012)
  • Research Project for MCS candidate - A Framework to Support Cross-Platform Application Development for Mobile Devices, Project ,  (2012 - 2012)
  • A PROXY-ASSISTED ROUTING FOR EFFICIENT DATA TRANSMISSION IN MOBILE AD HOC NETWORKS, Thesis ,  (2011 - 2011)
  • A Reservation‐Based Multiple Access Scheme with Adaptive Permission Probability for Wireless Systems Journal of King Saud University ‐ Computer and Information Sciences, Article In Journal ,  (2011 - 2011)
  • Designing a Low Cost Implementation of E‐Commerce Security by Optimizing the Parameters of NTRU Cryptosystem Algorithm for Inderscience Publishers Ltd., Article In Journal ,  (2011 - 2011)
  • An Approach The Implementation Of Access Control Policy And Identity Management In The Public Sector Agency, Thesis ,  (2011)
  • Paper on A NEW IDENTITY BASED GROUP SIGNATURE SCHEME, Article In Journal ,  (2011)
  • Master Dissertation on Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme, Thesis ,  (2010)
  • Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique, Thesis ,  (2010)
  • Paper on BIOMETRIC ENCRYPTION THROUGH MODIFIED HILL CIPHER TECHNIQUE, Article In Journal ,  (2010)
  • Master Dissertation on Throughput Optimization of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), Thesis ,  (2010)
  • Master Dissertation on Implementation of Elliptic Curve Cryptography Using Biometric Features to Enhance Security Services, Thesis ,  (2009)
  • For paper publications of Malaysian Journal of Computer Science (MJCS), Article In Journal ,  (2007 - 2008)

CONTRIBUTION TO SOCIETY
(Contribution To Society), (Level), (Start Date), (End Date).


  • AJK Induk Pemilihan MPPUM Sesi 2012/2013, (University), 18/09/2012 until  
  • Executive Editor for Malaysian Journal of Computer Science, (University), 01/08/2007 until 01/08/2008

INTELLECTUAL PROPERTY RIGHTS
(Product Name), (Type), (Reference), (Year), (Level).


  • A FRAMEWORK AND RELATED METHODS FOR HEALTH INFORMATION EXCHANGE USING MOBILE PERSONAL HEALTH RECORDS, PATENT, PI 2016700571, 19/02/2016, (NATIONAL)
  • SECURE VIDEO CONFERENCING FRAMEWORK FOR REAL TIME APPLICATION: METHODOLOGY AND SYSTEM, PATENT, 603/827, 27/11/2014, (INTERNATIONAL)
  • A Scientific Search Engine Based on Data Mashup , PATENT, UM.TNC2/UMCIC/603/79​3 , 21/08/2014, (INTERNATIONAL)

SUPERVISION


POST GRADUATE STUDENT
(Name of Degree), (Name of Candidates), (Title of Thesis), (Academic Session)

Completed
  • Doctoral Degree (phd), Abdul Nasir Khan, Energy Efficient Data Security Schemes for Mobile Users in Cloud Environment, 2011/2012
  • Doctoral Degree (phd), Shahaboddin Shamshirband, COOPERATIVE MULTI AGENTS FOR INTELLIGENT INSTRUSION DETECTION AND PREVENTION SYSTEMS, 2011/2012
  • Master Degree, Wira Zanoramy Ansiry Bin Zakaria, A Case Based Reasoning Approach for Dynamic Honeypot, 2010/2011
  • Master Degree, Mohamed Shabbir Hamza Abdulnabi, Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, 2010/2011
  • Master Degree, Alanazi, Hamdan Owaid R, Hybrid Techniques of NTRU and AES for Improving the Security of Electronic Medical Records, 2009/2010
  • Master Degree, Samer Hasan Saif, An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, 2009/2010
  • Master Degree, Mohamed Shabbir Hamza Abdulnabi, Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, 2009/2010
  • Master Degree, Mohammed A Ahmed, Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-bit Encoding Audio Steganagraphy Technique, 2009/2010
  • Doctoral Degree (phd), Liana Khamis Qabajeh, A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, 2008/2009
  • Master Degree, Anas Mageed Hamid, An Image Steganography Using Texture Analysis for High Rate Data Hiding, 2008/2009
  • Master Degree, Mohamed Elsadiq Eltahir Ahmed, An Implementation of Video Steganography Using the LSB Method, 2008/2009
  • Master Degree, Hamsah Ahmed Ghaleb Al-jbara, High Capacity Image Steganography Algorithm Based on Artificial Neural Network, 2008/2009
  • Master Degree, Babak Daghighi, Key Management for Secure Group Communication in a Wireless Environment, 2008/2009
  • Doctoral Degree (phd), Saman Mirza Abdulla, An Artificial Co-stimulation Classifier for Malicious API calls classification in Portable Executable Malwares, 2008/2009
  • Master Degree, Mohammad Yasin Arashpour, Implementation of Wireless Security on Virtual WiFi, 2008/2009
  • Doctoral Degree (phd), Saman Mirza Abdulla, An Artificial Co-stimulation Classifier of Malicious API calls classification in Portable Executable Malwares, 2008/2009
  • Doctoral Degree (phd), Liana K. M. Qabajeh, A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, 2008/2009
  • Master Degree, Samer Hasan Saif Qaid, An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, 2007/2008
  • Master Degree, Mohammad Yasin Arashpour, Implementation of Wireless Security on Virtual WIFI, 2007/2008
  • Master Degree, Mohammed-a-ahmed, Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-Bit Encoding Audio Steganography Technique, 2007/2008
  • Master Degree, Anas Mageed Hamid, An Image Steganography Using Texture Analysis for High Rate Data Hiding, 2007/2008
  • Master Degree, Hamsah Ahmed Ghaleb Al-jbara, High Capacity Image Steganography Algorithm Based on Artificial Neural Network, 2007/2008
  • Master Degree, Addy Majed Abdalkarem Alquraan, Implementation of End-To-End Secure SMS Using Elliptic Curve Cryptography, 2007/2008
  • Master Degree, Addy Majed Abdalkarem Alquraan, Implementation of End-to-End Secure SMS Using Elliptic Curve Cryptography, 2006/2007
  • Master Degree, Babak Daghighi, The Implementation of Secure Group Communication in Wireless and Mobile Environment, 2006/2007
  • Master Degree, Mohamed El Sadiq El Tahir Ahmed, An Implementation of Video Steganography Using the LSB Method, 2006/2007

Ongoing
  • Doctoral Degree (phd), Muzammil Hussain, A Security Framework For Mobile Health Applications On Android Platform, 2013/2014
  • Doctoral Degree (phd), Noor Hayani Binti Abd Rahim, Assessment of Cybersecurity Awareness Program On Personal Data Protection Among Youngsters in Malaysia, 2012/2013
  • Doctoral Degree (phd), Nordiana Binti Rahim, Computer Forensic, 2012/2013
  • Doctoral Degree (phd), Noor Hayani Binti Abd Rahim, Information Security, 2012/2013
  • Doctoral Degree (phd), Salman Iqbal Malik, Network Security, 2012/2013
  • Doctoral Degree (phd), Mohamed Shabbir Hamza Abdulnabi, Computer Security, 2012/2013
  • Doctoral Degree (phd), Abdul Nasir Khan, Network Security, 2011/2012
  • Doctoral Degree (phd), Shazana Binti Md Zin, WIRELESS SECURITY, 2011/2012
  • Doctoral Degree (phd), Shahaboddin Shamshirband, Network Security, 2011/2012
  • Doctoral Degree (phd), Babak Daghighi, Secure Group Communication, 2011/2012
  • Doctoral Degree (phd), Lim Shu Yun, Network Security, 2011/2012
  • Doctoral Degree (phd), Shazana Binti Md Zin, Wireless Security, 2011/2012
  • Master Degree, Wira Zanoramy, A Case Based Reasoning Approach for Dynamic Honeypot, 2010/2011
  • Doctoral Degree (phd), Abdul Mueed Khalid, Network Security, 2009/2010
  • Doctoral Degree (phd), Fazidah Binti Othman, Secure Group Communication, 2008/2009
  • Doctoral Degree (phd), Fazidah Binti Othman, -, 2008/2009

TEACHING
(Course Title), (Academic Session), (No of Student), (No of Contact Hours).


FIRST DEGREE
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2013/2014(1), 48, 5
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2012/2013(1), 66, 5
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2012/2013(1), 2, 5
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2011/2012(1), 25, 2
  • CRYPTOGRAPHY, 2010/2011(2), 30, 5
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2010/2011(1), 97, 6
  • ADVANCE NETWORK TECHNOLOGY, 2010/2011(2), 40, 7
  • ADVANCE NETWORK TECHNOLOGY, 2009/2010(2), 45, 5
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2009/2010(1), 98, 5
  • WIRELESS NETWORK SECURITY, 2008/2009(1), 27, 3
  • INTRODUCTION TO COMPUTER SYSTEM, 2007/2008(1), 4, 3
  • COMPUTER SECURITY, 2007/2008(2), 54, 3
  • NETWORK SECURITY, 2007/2008(2), 50, 5