PERSONAL DETAIL


PROF. DR. MISS LAIHA BINTI MAT KIAH

Professor
Department of Computer System & Technology
Faculty of Computer Science & Information Technology
 
  +603-79676354
  misslaiha@um.edu.my
 Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, 50603 Kuala Lumpur, W.Persekutuan Kuala Lumpur, Malaysia
 
Homepage
 
ResearcherID Link
  http://www.researcherid.com/rid/B-2767-2010
Scopus ID Link
  http://www.scopus.com/authid/detail.url?authorId=24833455600

ACADEMIC QUALIFICATION
(Qualification), (Institution).



PROFESSIONAL
(Organisation), (Role), (Year), (Level).


  • EC Council, Committee Member, 2012 to 2018, (International)
  • EC Council, Committee Member, 2012 to 2018, (National)
  • IEEE - Senior Member, Committee Member, 2016 to 2019, (International)
  • IEEE - Senior Member, Committee Member, 2016 to 2019, (National)
  • Malaysian Society for Cryptology Research (MSCR), Committee Member, 2017, (National)
  • Malaysia Board of Technologists, Committee Member, 2018, (National)
  • Centre for Research in Industry 4.0 (CRI4.0), Committee Members, 2018 to 2020, (National)

ADMINISTRATIVE DUTIES
(Role), (Level), (Start date),(End Date).


  • Deputy Dean of Higher Degree, Dean's Office, Faculty of Computer Science & Information Technology, 07/10/2019 to 06/10/2021
  • WAKIL SENAT/AHLI JK PEMILIH KE JAWATAN PROF C, University Malaya, 25/01/2019 to 24/01/2022
  • AHLI JK PEMILIH CUTI BELAJAR DAN SLAB/SLAI 2019/2020, University Malaya, 01/01/2019 to 31/12/2020
  • AHLI SENAT, University Malaya, 17/12/2018 to 16/12/2021
  • Programme Coordinator, Faculty, 07/08/2017 to 06/08/2020 (Bagi penawaran program baru sarjana Cyber Security)
  • Ahli JK Tapisan - Fakulti Sains, Faculty, 03/07/2017 to 31/12/2019 (Bagi Permohonan Kenaikan Pangkat Jawatan Akademik)
  • Ahli JK Penilai Luar Program - Bidang Sains Teknologi dan Klinikal, University Malaya, 01/06/2017 to 16/12/2018 (Ahli JK Penilai Luar Program - Bidang Sains Teknologi dan Klinikal)
  • Wakil Senat - JK Perpustakaan Universiti, University Malaya, 26/05/2017 to 16/12/2018 (Wakil Senat (Ahli ganti) ke JK Perpustakaan UM)
  • Pengawai Penilai Prestasi Khas, University Malaya, 15/05/2017 to 14/05/2018 (PPPK - Exit Policy)
  • Wakil Senat - Ahli JK Pengajian (Ijazah Tinggi), Faculty, 01/05/2017 to 16/12/2018 (Bagi Program Baru Sarjana Sains Perlindungan Tanaman)
  • Ahli JK Tapisan (Pelantikan), Faculty, 16/03/2017 to 15/03/2020 (Ahli JK Tapisan (Pelantikan) Fakulti)
  • Ahli Panel Penemuduga Cuti Belajar dan SLAB/SLAI, University Malaya, 03/01/2017 to 31/12/2018 (Peringkat Pusat)
  • AJK Kump Penyelidik ICT Security Research Group, Faculty, 13/12/2016 to 12/12/2018
  • AJK Kump Penyelidik IoT, Faculty, 13/12/2016 to 12/12/2018
  • Pengerusi/Panel REMOS.stk, Faculty, 25/11/2016 to 25/11/2016 (REMOS.stk)
  • Wakil Pengerusi, Faculty, 12/09/2016 to 11/06/2017 (Candidature Defence & Proposal Defence)
  • Wakil Senat - JK Induk Pengecualian dan Pemindahan Kredit, University Malaya, 26/08/2016 to 16/12/2018 (JK Induk Pengecualian dan Pemindahan Kredit)
  • Ahli JK Badan Penasihat Dekan, Faculty, 15/08/2016 to 30/06/2017 (Ahli JK)
  • Ahli JK Penyelidikan, Faculty, 10/08/2016 to 09/08/2017 (Wakil Digital Security Research)
  • Wakil Senat - Ahli Jawatankuasa Pemilih, University Malaya, 01/08/2016 to 16/12/2018 (Bagi Maksud Pelantikan dan Kenaikan Pangkat Ke Jawatan Reader dan Prof Madya or equivalent)
  • Senate Member, University Malaya, 17/12/2015 to 16/12/2018 (Senate Member)
  • Deputy Dean of Higher Degree, Dean's Office, Faculty of Computer Science & Information Technology, 01/07/2014 to 31/07/2014
  • Acting Dean, Faculty, 22/05/2014 to 23/05/2014
  • Ahli JK Kurikulum Jabatan - Program Sarjana, Faculty, 01/03/2014 to 28/02/2016
  • Ahli Panel Penemuduga, University Malaya, 14/11/2013 to 13/11/2014
  • Acting Dean, Faculty, 05/07/2013 to 09/07/2013
  • Ahli JKIT FSKTM, Faculty, 01/07/2013 to 30/06/2014
  • AJK Penilaian Slim Geran FRGS & ERGS Peringkat UM, University Malaya, 21/05/2013 to 31/12/2014
  • AJK PGRES FSKTM, Faculty, 07/02/2013 to 31/12/2013 (PGRES FSKTM)
  • Acting Director, Faculty, 10/01/2013 to 11/01/2013
  • Acting Director, Faculty, 29/11/2012 to 30/11/2012
  • Ahli Panel Penemuduga, University Malaya, 31/10/2012 to 30/10/2013 (Untuk Pemilihan Calon SLAB/SLAI)
  • Acting Director, Faculty, 26/09/2012 to 28/09/2012
  • Acting Director, Faculty, 22/09/2012 to 25/09/2012
  • Acting Director, Faculty, 28/08/2012 to 13/09/2012
  • Jawatankuasa Kerja Audit Program Ijazah Tinggi (JKAPIT), University Malaya, 06/08/2012
  • AJK Bright Spark FSKTM, Faculty, 01/07/2012 to 30/06/2014
  • Acting Director, Faculty, 17/06/2012 to 22/06/2012
  • AJK PGRES FSKTM , Faculty, 22/02/2012 to 31/12/2012 (PGRES FSKTM 2012)
  • Wakil Tetap Fakulti Ke JawatanKuasa Penasihat Akademik, IPS, Faculty, 26/08/2011
  • Timbalan Pengerusi NADI, Faculty, 22/08/2011 to 21/08/2013
  • PENGERUSI - JK Ijazah Tinggi (JKIT), Faculty, 01/07/2011 to 30/06/2014
  • Deputy Dean of Higher Degree, Dean's Office, Faculty of Computer Science & Information Technology, 01/07/2011 to 30/06/2014
  • PENGERUSI - JK Kurikulum FSKTM (Ijazah Tinggi), Faculty, 01/07/2011 to 30/06/2014
  • Deputy Dean of Higher Degree, Faculty, 01/07/2011 to 30/06/2014
  • Head of Department, Computer System & Technology, Faculty of Computer Science & Information Technology, 13/05/2008 to 31/08/2009
  • Head of Department, Faculty, 12/05/2008 to 31/08/2009

AREAS OF EXPERTISE
(Area).


  • Security Services Sn: Digital Forensic, Steganography, Network Security, Public Key Infrastucture and Biometrics (Cloud computing, cyber security)
  • Information Security (Applied Cryptography, Applied Steganography)
  • Communication Protocols (Wireless Security, Ad-hoc Network Security, Mobile Communication Security)
  • Security Protocols (Group Communication, Key Management, Wireless Mobile Environments)


RECENT SELECTED PUBLICATIONS
(Publication).


Book

2017
  • Salman Iqbal & Miss Laiha Mat Kiah. (2017). Secure Group Communication Protocols in Wireless Mobile Environment. LAP LAMBERT Academic Publishing. 

2002
  • Omar Zakaria and Miss Laiha Mat Kiah (2002), Pengenalan Kepada Keselamatan Komputer (An Introduction to Computer Security), Mc-Graw Hill (M) Sdn Bhd. 
Chapter in Book

2011
  • Liana K. Qabajeh, Miss Laiha Mat Kiah & Mohammad M. Qabajeh. 2011. A Survey of Position-Based Routing Protocols for Ad-Hoc Networks. (DOI: 10.1007/978-1- 84996-510-1_4). Book chapter in Application and Multidisciplinary Aspects of Wireless Sensor Networks: Concepts, Integration, and Case Studies, Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic and Roman Trobec (ISBN 976-1-84996-509-5), Part 1, pp. 47-83, Springer. 
Article in Academic Journals

2020
  • Shaik Shabana Anjum, Rafidah Md Noor, Ismail Ahmedy, Mohammad Hossein Anisi, Saaidal Razalli Azzuhri, Miss Laiha Mat Kiah, Jaime Lloret, Pradeep Kumar, An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks, Ad Hoc & Sensor Wireless Networks (F=0.948, Q4), 2020 (Accepted) (ISI-Indexed)
  • Fawad Ali Khan , Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani Idna Idris, Tey Kok Soon, Muneer Ahmad, "Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things", Sensors (IF=3.031,Q1) (Accepted) (ISI-Indexed)

2019
  • Talal, M., Zaidan, A.A., Zaidan, B.B., O. S. Albahri, A. H. Alamoodi, M. A. Alsalem, A. S. Albahri, M. L. M. Kiah, F. M. Jumaah & Mussab Alaa. 2019. Comprehensive review and analysis of anti-malware apps for smartphones. Telecommun Syst 72, 285–337. [Q3-ISI, IF=1.707] (ISI-Indexed)
  • Fawad Ali Khan, Rafidah Md Noor*, Miss Laiha Binti Mat Kiah, Noorzaily Mohd Noor, Saleh M. Altowaijri, Atiq Ur Rahman, QoS Enabled Layered based Clustering for Reactive Flooding in Internet of Things, Symmetry (IF = 1.256 Q2), (2019) (Accepted) (ISI-Indexed)
  • Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah. (2019). Enhancement of Cybersecurity Awareness Program on Personal Data Protection Among Youngsters in Malaysia: An Assessment. Malaysian Journal of Computer Science. 32 (3). (ISI-Indexed)
  • Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Miss Laiha Mat Kiah, Lau Sian Lun, Nor Badrul Annuar Juma'at, Ismail Ahmedy, Norjihan Abdul Ghani and Sananda Bhattacharyya, Review on Security of Internet of Things Authentication Mechanism, IEEE Access (IF=4.098, Q1), Volume: 7, Issue:1, DECEMBER 2019, DOI 10.1109/ACCESS.2019.2947723 (ISI-Indexed)
  • Shaik Shabana Anjum, Rafidah Md Noor, Nasrin Aghamohammadi, Ismail Ahmedy, Miss Laiha Mat Kiah, Nornazlita Hussin, Mohammad Hossein Anisi and Muhammad Ahsan Qureshi, Modelling Traffic Congestion based on Air Quality for Greener Environment: An Empirical Study, Vol. 7, Issue 1, December 2019, IEEE Access (IF=3.557,Q1) (ISI-Indexed)

2018
  • Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, Reza Ismail. (2018). Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey. International Journal on Advanced Science Engineering Information Technology, 8(4-2). (SCOPUS-Indexed)
  • Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. Kiah, S. Iqbal and Mohamed Abdulnabi. (2018). A security framework for mHealth apps on Android platform. Computers & Security. 75, 191-217. [Q1-ISI] (ISI-Indexed)
  • Salman Iqbal, Miss Laiha Mat Kiah, Aws Alaa & Babak Daghighi. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients. Journal of Health and Technology. Online first on 30 Aug 2018. p1-19. (ISI-Indexed)
  • Salman Iqbal, Miss Laiha Mat Kiah & Babak Daghighi. DM-GKM: A key management scheme for dynamic group based applications. Wireless Personal Communications Journal. [UNDER-REVIEW] (ISI-Indexed)

2017
  • Mussab, Alaa. Zaidan, A.A. Zaidan, B.B. Mohammed, Talal & Kiah, M.L.M. (2017). A review of smart home applications based on Internet of Things. Journal of Network and Computer Applications, 97, 48-65. (ISI-Indexed)
  • Daghighi, B. Mat Kiah, M.L. Iqbal, S. Ur Rehman, M.H. & Martin, K. (2017). Host mobility key management in dynamic secure group communication. Wireless Networks, 23(147), 1-19. (ISI-Indexed)
  • Shu Yun Lim. M.L Mat Kiah. Tan Fong Ang. (2017). Security Issues and Future Challenges of Cloud Service Authentication. Acta Polytechnica Hungarica (Journal of Applied Sciences), 14(2). [ACCEPTED] DOI: 10.12700/APH.14.2.2017.2.4 (ISI-Indexed)
  • Mohamed Abdulnabi, Ahmed Al-Haiqi, M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan, Muzammil Hussain. (2017). A Distributed Framework for Health Information Exchange Using Smartphone Technologies. Journal of Biomedical Informatics, 69, 230-250. [Q1-ISI] (ISI-Indexed)

2016
  • Saybani, M.R. Wah, T.Y. Aghabozorgi, S.R. Shamshirband, S. Mat Kiah, M.L. & Balas, V.E. 2015. Diagnosing Breast Cancer with an Improved Artificial Immune Recognition System. Soft Computing. [ISI-Q2] (ISI-Indexed)
  • Igbal, S. Mat Kiah, M.L. Daghighi, B. Hussain, M. Khan, S. Khan, M.K. & Choo, K.K.R. 2016. On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications. [Q1-ISI] (ISI-Indexed)
  • Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab and Suleman Khan. (2016). Service Delivery Models of Cloud Computing: Security Issues and Open Challenges. Security and Communication Networks. (ISI-Indexed)
  • Muzammil Hussain, Ahmed Al-Haiqi, A.A. Zaidan, B.B. Zaidan, M.L. Mat Kiah, Nor Badrul Anuar & Mohamed Abdulnabi. 2016. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive and Mobile Computing 25(c):1-25. [Q1-ISI] (ISI-Indexed)

2015
  • Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ismail Ahmedy. 2015. Survey of secure multipath routing protocols for WSNs. Journal of Network and Computer Applications 55:123-153. [ISI-Q1] (ISI-Indexed)
  • Altameem, T. A., Nikolic, V., Shamshirband, S., Petkovic, D., Javidnia, H., Kiah, M. L. M., Gani, A. 2015. Potential of support vector regression for optimization of lens system Computer-Aided Design (ISI-Indexed)
  • Milan Proti, Shahaboddin Shamshirband, Dalibor Petkovi, Almas Abbasi, Miss Laiha Mat Kiah, Jawed Akhtar Unar, Ljiljana ivkovi & Miomir Raos. 2015. Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm. Energy 87:343- 351. [ISI-Q1] (ISI-Indexed)
  • Mahmoud Reza Saybani, Shahaboddin Shamshirband, Shahram Golzari, Teh Ying Wah, Saeed Reza Aghabozorgi, Miss Laiha Mat Kiah & Valentina Emilia Balas. 2015. RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system. Medical & Biological Engineering & Computing. [Accepted] [ISI-Q2] (ISI-Indexed)
  • Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband & Steven Furnell. 2015. A systematic review of approaches to assessing Cybersecurity awareness. Kybernetes 44 (4):606-622. [ISI-Q4] (ISI-Indexed)
  • B.B. Zaidan, Ahmed Haiqi, A.A. Zaidan, Mohamed Abdulnabi, M. L. Mat Kiah & Hussaen Muzamel. 2015. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy. Journal of Medical Systems 39:51. [ISI-Q2] (ISI-Indexed)
  • A.A. Zaidan, H.Abdul Karim, N.N. Ahmad, B.B. Zaidan & M.L. Mat Kiah. 2015. Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning. Journal of Circuits, Systems and Computers 24(2). [ISI-Q4] (ISI-Indexed)
  • Dalibor Petkovic, Shahaboddin Shamshirband, Nor Badrul Anuar,Sareh Naji, Miss Laiha Mat Kiah & Abdullah Gani. 2015. Adaptive neuro-fuzzy evaluation of wind farm power production as function of wind speed and direction. Stochastic Environmental Research and Risk Assessment 29:793- 802. [ISI-Q1] (ISI-Indexed)
  • Benyamin Khoshnevisan, Elham Bolandnazar, Shahaboddin Shamshirband, Hanifreza Motamed Shariati, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2015. Decreasing environmental impacts of cropping systems using LCA and multi-objective genetic algorithm. Journal of Cleaner Production 86:67-77. [ISI-Q1] (ISI-Indexed)
  • A.A. Zaidan, B.B. Zaidan, Ahmed Al-Haiqi, M.L.M. Kiah, Hussaen Muzamel & Mohamed Abdulnabi. 2015. Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS. Journal of Biomedical Informatics 53:390- 404. [ISI-Q1] (ISI-Indexed)
  • Abdul Nasir Khan, M.L. Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband & Atta ur Rehman Khan. 2015. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. Journal of Grid Computing 13(4):651-675. [ISI-Q1/Q2] (ISI-Indexed)
  • Muzammil Hussain, Ahmed Al-Haiqi, A.A. Zaidan, B.B. Zaidan, M.L.M. Kiah, Nor Badrul Anuar & Mohamed Abdulnabi. 2015. The Landscape of Research on Smartphone Medical Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations. Computer Methods and Programs in Biomedicine 122 (3):393-408. [Q1-ISI] (ISI-Indexed)
  • A.A. Zaidan, B.B. Zaidan, Muzammil Hussain, Ahmed Haiqi, M.L. Mat Kiah & Mohamed Abdulnabi. 2015. Multi- Criteria Analysis for OS-EMR Software Selection Problem: A Comparative Study. Decision Support Systems 78:15-27. [ISI-Q1] (ISI-Indexed)

2014
  • Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan & Shahab Shamshirband. 2014. Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment. Journal of Supercomputing 68(2): 624-651. [ISI-Q2] (ISI-Indexed)
  • Dalibor Petkovi , Shahaboddin Shamshirband, Javed Iqbal, Nor Badrul Anuar, Nenad D. Pavlovi & Miss Laiha Mat Kiah. 2014. Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper. Applied Soft Computing 22:424-431. [ISI-Q1] (ISI-Indexed)
  • Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ajith Abraham. 2014. Cooperative Game Theoretic Approach using Fuzzy Q-learning for Detecting and Preventing Intrusions in Wireless Sensor Networks. Engineering Applications of Artificial Intelligence 32:228-241. [ISI-Q1] (ISI-Indexed)
  • Shahaboddin Shamshirband, Dalibor Petkovi , arko ojba i , Vlastimir Nikoli , Nor Badrul Anuar, Nor Liyana Mohd Shuib, Miss Laiha Mat Kiah & Shatirah Akib. 2014. Adaptive neuro-fuzzy optimization of wind farm project net profit. Energy Conversion and Management. [ISI-Q1] (ISI-Indexed)
  • Babak Daghighi & Miss Laiha Mat Kiah. 2014. A Group Key Management Scheme in Wireless Mobile Environment. ScienceAsia Journal. [Accepted] [ISI-Q3] (ISI-Indexed)
  • Dalibor Petkovic, Shahaboddin Shamshirband, Nenad D. Pavlovic, Abdullah Gani & Miss Laiha Mat Kiah. 2014. Kinetostatic analysis of passively adaptive robotic finger with distributed compliance. Advances in Mechanical Engineering. [ISI-Q2] (ISI-Indexed)
  • Shamshirband,S., Petkovic, D., Amini, A., Anuar, N.B., Nikolic, V., Cojbasic, Z., Mat Kiah, M.L. & Gani, A. 2014. Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission. Energy 67:623-630. [ISI-Q1] (ISI-Indexed)
  • Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Al-Sakib Khan Pathan. 2014. Routing protocol design for secure WSN: Review and open research issues. Journal of Network and Computer Applications 41:517- 530. [ISI-Q1] (ISI-Indexed)
  • Shamshirband, S., Petkovi, D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., Cojbasic, Z., Nikolic, V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81: 520-526. [ISI-Q1] (ISI-Indexed)
  • Shamshirband, S., Petkovi , D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., ojba i , ., Nikoli , V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81:520 526. [ISI-Q1] (ISI-Indexed)
  • Shamshirband S, Hessam S, Javidnia H, Amiribesheli M, Vahdat S, Petkovic D, Gani A, Kiah MLM. 2014. Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System. International Journal of Medical Science. 11(5):508-514. [ISI-Q1] (ISI-Indexed)
  • M.L.M. Kiah, B.B Zaidan, A.A.Zaidan, Mohamed Nabi & Rabiu Ibraheem. 2014. MIRASS: Medical Informatics Research Activity Support System using Information Mashup Network. Journal of Medical Systems 38 (37):1-15. [ISI-Q2] (ISI-Indexed)
  • Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Sanjay Misra. 2014. Anomaly Detection using Fuzzy Q-learning Algorithm in Wireless Network. Acta Polytechnica Hungarica. [ISI-Q3] (ISI-Indexed)
  • Shahaboddin Shamshirband, Mohd Rashid Mohd Radzi, Saeed Aghabozorgi, Sanjay Misra, Shatirah Akib & Miss Laiha Mat Kiah. 2014. Potential of Support Vector Regression for Forcasting of Stream Flow. Tehnicki Vjesnik 21(5):1017-1024. [ISI-Q3] (ISI-Indexed)
  • Dalibor Petkovi, Shahaboddin Shamshirband, Nenad Pavlovi, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology. Optics and Spectroscopy. [ISI-Q4] (ISI-Indexed)
  • Ehsan Daryabeigi, Ali Zafari,Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm. International Journal of Electrical Power & Energy Systems 61:326- 334.[ISI-Q1] (ISI-Indexed)
  • Afshin Jahangirzadeh,Shahaboddin Shamshirband,Saeed Aghabozorgi, Shatirah Akib,Hossein Basser, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier. Neurocomputing 140(22):172-184. [ISI-Q2] (ISI-Indexed)
  • Shahaboddin Shamshirband, Amineh Amini, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ying Wah Teh & Steven Furnell. 2014. D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55: 212-226. [ISI-Q2] (ISI-Indexed)
  • Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovi , Sanjay Misra & Abdul Nasir Khan. 2014. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. Journal of Network and Computer Applications 42:102- 117. [ISI-Q1] (ISI-Indexed)
  • M.L.M Kiah, Ahmed Haiqi, B.B Zaidan & A.A Zaidan. 2014. Open Source EMR Software: Profiling, Insights and Hands-on Analysis. Computer Methods and Programs in Biomedicine. [ISI-Q1] (ISI-Indexed)
  • Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad A. Madani, Atta ur Rehman Khan & Shahaboddin Shamshirband. 2014. BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment. Journal of Supercomputing 70(2):946-976. [ISI-Q2] (ISI-Indexed)
  • M.L.Mat Kiah, S.H. Al-Bakri, A.A. Zaidan, B.B. Zaidan & Muzammil Hussain. 2014. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture. Journal of Medical Systems. [ISI-Q2] (ISI-Indexed)
  • Shahaboddin Shamshirband, Nor Badrul Anuar, Babak Daghighi, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham. 2014. Co-FQL :Anomaly Detection Using Cooperative Fuzzy Q-learning in Network. Journal of Intelligent Fuzzy Systems. [ISI-Q3] (ISI-Indexed)
  • Shahaboddin Shamshirband, Dalibor Petkovi , Nor Badrul Anuar, Miss Laiha Mat Kiah, Shatirah Akib, Abdullah Gani, arko ojba i & Vlastimir Nikoli . 2014. Sensorless estimation of wind speed by adaptive neuro-fuzzy methodology. International Journal of Electrical Power & Energy Systems 62:490- 495. [ISI-Q1] (ISI-Indexed)
  • Daghighi, B., Kiah, M. L. M., Shamshirband, S., & Rehman, M. H. U. 2014. Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. Journal of Network and Computer Applications 50:1-14. [ISI-Q1] (ISI-Indexed)
  • H.O. Alanazi, A.A. Zaidan, B.B. Zaidan, M.L. Mat Kiah & S.H. Al-Bakri. 2014. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. Journal of medical systems 39:165. [ISI-Q2] (ISI-Indexed)

2013
  • Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2013. A review of dynamic and intelligent honeypot. ScienceAsia Journal 39(1):1-5. [ISI-Q3] (ISI-Indexed)
  • Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ahmed Patel. 2013. An Appraisal and Design of Multi Agent Systems Based on Cooperative Wireless Intrusion Detection Computational Intelligence Techniques. Engineering Applications of Artificial Intelligence 26(9):2105-2127. [ISI-Q1] (ISI-Indexed)
  • Dalibor Petkovi, arko jba I, Vlastimir Nikoli, Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Ainuddin Wahid Abdul Wahab. 2013. Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission. Energy 64:868-874. [ISI-Q1] (ISI-Indexed)
  • Dalibor Petković, Nenad T. Pavlović, Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Mohd Yamani Idna Idris. 2013. Adaptive neuro-fuzzy estimation of optimal lens system parameters. Optics and Lasers in Engineering 55:84-93. [ISI-Q2] (ISI-Indexed)
  • Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan & Mazhar Ali. 2013. Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing. Journal of Supercomputing 66(3):1687-1706. [ISI-Q2] (ISI-Indexed)
  • M.L Mat Kiah, Mohamed S.Nabi, B.B Zaidan & A.A Zaidan. 2013. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP-XML and SHA-1. Journal of Medical Systems 37:9971. [ISI-Q2] (ISI-Indexed)

2012
  • Liana Khamis Qabajeh, Miss Laiha Mat Kiah, Mohammad Moustafa Qabajeh. 2012. A More Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. Security and Communication Networks 6(3):286-308. [ISI-Q4] (ISI-Indexed)
  • Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan & Sajjad A. Madani. 2012. Towards Secure Mobile Cloud Computing: A Survey. Future Generation Computer Systems 29(5):1278-1299. [ISI-Q1] (ISI-Indexed)

2011
  • B.B.Zaidan, A.A. Zaidan, M.L. Mat Kiah. 2011. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: Review, Participates Opinion and Expert Concerns. International Journal of Pharmacology 7(3):382-387.[ISI-Q4] (ISI-Indexed)
  • M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan, A. Mohammed Ahmed & Sameer Hasan Al-bakri. 2011. A review of audio based steganography and digital watermarking. International Journal of the Physical Sciences 6 (16):3837-3850. [ISI-Q2] (ISI-Indexed)
  • Qabajeh, L., Mat Kiah, M. L. & Qabajeh, M. 2011. Secure Unicast Position-Based Routing Protocols for Ad- Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences) 8(6):191-214. [ISI-Q3] (ISI-Indexed)
  • Sameer Hasan Al-Bakri, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan & Gazi Mahabubul Alam. 2011. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences 6(4):930-938. [ISI-Q2] (ISI-Indexed)

2010
  • Miss Laiha Mat Kiah, Liana Khamis Qabajeh, Mohammad Moustafa Qabajeh. 2010. Unicast Position-Based Routing Protocols for Ad-Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences, ISSN: 17858860)7(5):19-46.[Q3-SCI][JCR2010] (ISI-Indexed)
  • Saman Mirza Abdulalla, Laiha Mat Kiah & Omar Zakaria. 2010. A biological model to improve PE malware detection: Review. International Journal of the Physical Sciences 5(15): 2236-2247. [Q2-SCI][JCR2010] (ISI-Indexed)
  • Por Lip Yee & Miss Laiha Mat Kiah. 2010. Shoulder Surfing Resistance Using PENUP Event and Neighboring Connectivity Manipulation. Malaysian Journal of Computer Science 23(2):121-140.[Q4-SCI][JCR2010] (ISI-Indexed)
  • Sameer Hasan Al-bakri & M. L. Mat Kiah. 2010. A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Scientific Research and Essays 5(22):3455-3466.[ISI- Q3] (ISI-Indexed)
  • Mohamed S. A.Nabi, M.L. Mat Kiah, B.B. Zaidan, A.A. Zaidan & G.M. Alam. 2010. Suitability of SOAP Protocol in Securing Transmissions of EMR Database. International Journal of Pharmacology 6(6):959-964. [ISI-Q4] (ISI-Indexed)
  • Hamdan O. Alanizi, M. L. Mat Kiah, A.A.Zaidan, B.B.Zaidan & G.M. Alam. 2010. Secure Topology for Electronic Medical Record Transmissions. International Journal of Pharmacology 6(6):954-958. [ISI-Q4] (ISI-Indexed)
  • Gazi Mahabubul Alam, M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan and Hamdan O. Alanazi. 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Scientific Research and Essays 5(21):3254-3260.[ISI-Q3] (ISI-Indexed)
  • B. B. Zaidan, A. A. Zaidan, Alaa Taqa, Gazi Mahabubul Alam, M. L. Mat Kiah & Hamid Jalab. 2010. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. International Journal of the Physical Sciences 5(11):1796-1806. [ISI-Q2] (ISI-Indexed)
  • Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B. Zaidan and A.A. Zaidan. 2010. A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. Journal of Applied Sciences 10(1): 59-64. (ISI/SCOPUS Indexed Publication)

2009
  • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Scalable and Secure Position- Based Routing Protocol for Ad-Hoc Networks. Malaysian Journal of Computer Science (ISSN 0127- 9084) 22(2):99- 120. [Q4-SCI] (ISI-Indexed)
  • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks. International Journal of Computer Science and Network Security (IJCSNS) 9(2): 131-140. (Non-ISI/Non-SCOPUS)

2008
  • Mat Kiah, M.L. & Martin, K.M. 2008. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and Its Applications (IJSIA) 2(1):39-52. (SCOPUS-Indexed)
Proceeding

2018
  • Atif Mahmood, Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Adnan N. Qureshi. 2018. Wireless Backhaul Network Optimization Using Automated KPIs Monitoring System Based on Time Series Forecasting. World Symposium on Communication Engineering 2018, ISBN 978-1-5386-7985-2. (Non-ISI/Non-SCOPUS)

2017
  • Chowdhury, F.Z., Idris, M. Y, Mat Kiah, M.L, Ahsan, M. A. 2017. EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing. In the Proceeding of 8th IEEE Control and System Graduate Research Colloquium, 4-5th Aug 2017 Shah Alam, Selangor, Malaysia. (ISI-Indexed)

2015
  • M.L.M. Kiah, Ahmed Haiqi, B.B. Zaidan, A.A. Zaidan & Mohamed Abdulnabi. 2015. Open Source EMR Software: How to Select the Best Software?. Proceeding of 3rd International Conference on Information and Computer Networks (ICICN). (ISI/SCOPUS Indexed Publication)

2013
  • Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani. 2013. A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments. IEEE Symposium on Wireless Technology and Applications (ISWTA 2013), September 22-25, 2013, at Pullman Kuching Hotel, Malaysia. (ISI/SCOPUS Indexed Publication)
  • Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2013. Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning. Kaspersky�s CyberSecurity for the Next Generation, National University of Singapore, Republic of Singapore, 21 - 23 March 2013. (ISI/SCOPUS Indexed Publication)
  • Nabi, M. S., Mat Kiah, M. L., Zaidan, A. A., & Zaidan, B. B. 2013. Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. In Future Generation Communication Technology (FGCT), 2013 Second International IEEE Conference. 93- 97. (ISI-Indexed)

2012
  • S. M. Abdulla, M. L. Mat Kiah & O. Zakaria. 2012. Minimizing Errors in Identifying Malicious API to Detect PE Malwares Using Artificial Costimulation. International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE'2012), pg. 49-54. 
  • Hossein Javidnia,Shahaboddin Shamshirband & Miss Laiha Mat Kiah. 2012. Cooperative Multi-agent System Based on Fuzzy Quantum Cryptography. International Conference on Electrical, Computer, Electronics & Biomedical Engineering(ICECEBE�2012). Bangkok, Thailand. (Non-ISI/Non-SCOPUS)
  • Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2012. A Review on Artificial Intelligence Techniques for Developing Intelligent Honeypot. International Conference on Next Generation Information Technology (ICNIT2012). Seoul, Korea. (Non-ISI/Non-SCOPUS)

2011
  • Mat Kiah, M.L., Daghighi, B.,& Albakri, S. 2011. An Implementation of Group Key Management in a Wireless Environment. International Conference on Electronics, Networks and Computer (ICENC 2011), Kuala Lumpur, Malaysia. (ISI/SCOPUS Indexed Publication)

2010
  • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2010. A Scalable and Secure Position- Based Routing Protocol for MANETs. Proceedings of the Annual International Conference on Network Technologies & Communication (NTC 2010), 29-30th November, Phuket Beach Resort, Thailand, pp. N7-N12. 
  • Daghighi, B., Mat Kiah, M.L.& Afkhami, S. 2010. Group Key Management Using Public Key Exchange. International Conference on Intelligent network & Computing, Malaysia. (ISI/SCOPUS Indexed Publication)

2009
  • Daghighi, B.,& Mat Kiah, M.L. 2009. Secure Group Communication Using Public Key Exchange. In the Proceeding of 3rd International Conference on Informatics and Technology, 27 - 28th Oct 2009 Kuala Lumpur, Malaysia. 
  • Mohamed Elsadig Eltahir, Miss Laiha Mat Kiah, Bilal Bahaa Zaidan & Aos Alaa Zaidan. 2009. High Rate Video Streaming Steganography. International Conference on Future Computer and Communication, pp 550-553.(Indexed by EI Compendex, INSPEC, Thomson ISI, IEEE XploreTM,IEEE Computer Society digital libraries) 
  • Nor Aniza Abdullah, Safinaz Mustapha, Miss Laiha Mat Kiah. 2009. A Requirement Framework For Livestock Farming Web Service Application. Proceeding of the 3rd International Conference on Informatics and Technology, 27 - 28th October, Kuala Lumpur Malaysia. 
  • L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable Secure Routing Protocol for MANETs. Proceedings of The International Conference on Computer Technology and Development (ICCTD 2009), pp.143-147, 13-15 Nov, Kota Kinabalu, Malaysia. (Indexed by Ei Compendex and ISI) 
  • L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable, Distributed and Secure Routing Protocol for MANETs. Proceedings of the International Conference on Computer Engineering and Applications (ICCEA 2009), pp. 51-56, 6-8 June 2009, Manila, Philippine. (Indexed by Ei Compendex and Thomson ISI) 

2007
  • Miss Laiha Mat Kiah & Keith Martin. 2007. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. Proceeding of International Conference on Future Generation Communication Networking,06-08 Dec 2007, Jeju Island South Korea, Vol. 1, pg 99-106. 
  • Miss L. Mat Kiah and Keith M. Martin. 2007. Secure Multicast: Investigating the Different Challenges between Internet and Mobile Environments. In Proceeding of M2USIC 2007, 19 & 20th Nov 2007, Hilton Hotel PJ, Malaysia. 

2006
  • MatKiah, M. L. and Martin, K. M. (2006). A generic group key management framework for group communication in wireless mobile environments. In Proceedings of the Sixth International Network Conference (INC2006), pp. 347-354. 

2005
  • MatKiah, M. L. and Martin, K. M. (2005). Group communication: Design challenges in the development of key management frameworks in wireless mobile environments. In Proceedings of International Conference on Security and Management (SAM\'05), pp. 385-390. Las Vegas, USA. 
Technical Report

2018
  • Hussain, A., Luqman, W., Anuar, N. B., Kiah, M. L. M., & Kumar, S. (2018). Digital Rights Management for Cloud Based Storage Providers. Technical Report. Universiti Malaya, Kuala Lumpur, Malaysia. 

2017
  • Zamanian, A., Feizollah, A., Anuar, NB., Kiah, M. L. M., Srikanth, K., and Kumar, S. (2017). Anomaly Detection in Policy Authorisation Activity Log. Technical Report, Universiti Malaya, Kuala Lumpur, Malaysia. 

AREAS OF RESEARCH
(Project title), (Role), (From)-(Until), (Level), (Source).


  • Anomaly Detection In Policy Authorization Activity Logs, Consultant, 2017 - 2019, Private Funding, (National)
  • Drm For Cloud Based Storage Providers, Principal Investigator(PI), 2017 - 2019, Private Funding, (National)
  • Modelling And Governing Traffic Congestion: Air Quality,emission, & Traffic Use, Consultant, 2015 - 2018, Grand Challenge - SUS (Sustainability Science), (University)
  • Secure Group Communication for Critical National Information Infrastructure, Principal Investigator(PI), 2013 - 2016, ScienceFund, (University)
  • Secure Group Communication For Critical National Information Infrastructur (cnii), Principal Investigator(PI), 2013 - 2016, MOSTI-Science Fund, (National)
  • Implementation of Secure Framework for Electronic Medical Records (EMRs), Principal Investigator(PI), 2012 - 2015, High Impact Research (HIR), (National)
  • Implementation Of Secure Framework For Electronic Medical Record (emrs)., Principal Investigator(PI), 2012 - 2016, High Impact Research - Ministry of Education (HIR-MOE) Cycle 2, (National)
  • Deployment of Virtual Honeypots, Principal Investigator(PI), 2011 - 2013, Geran Penyelidikan Universiti Malaya (UMRG), (National)
  • Information and Communication Security, Principal Investigator(PI), 2010 - 2011, Special Fund, (National)
  • A SCALABLE, DISTRIBUTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, Main Supervisor, 2010 - 2011, Postgraduate Research Grant (PPP) - Research, (National)
  • An Implemetation of Secure Group Communication, Principal Investigator(PI), 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG), (National)
  • A SCALABLE, DISTRIBTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, Main Supervisor, 2009 - 2010, Postgraduate Research Grant (PPP) - Research, (National)
  • A SCALABLE, DISTRIBTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, Main Supervisor, 2009 - 2010, Postgraduate Research Grant (PPP) - Research, (National)
  • PUBLIC KEY INFRASTRUCTURE FOR SECURE MOBILE MESSAGIN USING ELLIPTIC CURVE CRYPTOSYSTEM, Main Supervisor, 2009 - 2010, Postgraduate Research Grant (PPP) - Research, (National)
  • PUBLIC KEY INFRASTRUCTURE FOR SECURE MOBILE MESSAGIN USING ELLIPTIC CURVE CRYPTOSYSTEM, Main Supervisor, 2009 - 2010, Postgraduate Research Grant (PPP) - Research, (National)
  • AN IMPLEMENTION OF SECURE GROUP COMMUNICATION, Principal Investigator(PI), 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG), (National)
  • Secure Routing Protocols for Large Mobile Ad-Hoc Networks, Principal Investigator(PI), 2008 - 2010, Short Term Research Fund (Vote F)(PJP), (National)
  • Information Security
  • Network Security
  • Security Systems

CONSULTATION PROJECT/CONSULTANCY
(Project title), (Role), (From)-(Until), (Organisation).


  • Ahli Akademik sebagai Panel Penemuduga HLP Sessi 2012, Academic Reviewer, 2011-2011, JPA
  • Cisco Netriders Competition 2011, 2011-2011, TAR College
  • Cisco Competition 2009, 2009-2009, UniKL

AWARDS AND RECOGNITIONS
(Name of Award), (Awarding Institution), (Year Awarded), (Level).


  • Gold Award - Innovation, Uitm Melaka, 2019, (International)
  • Instructor 10 Years of Service, Cisco Academy, 2019, (International)
  • Fcsit Innovation Exhibition Competition 2018, UM, 2018, (Ptj)
  • International Research Innovation, Invention & Solution Exposition (Iriise 2018) 14 - 16 August 2018 Dewan Tunku Canselor, University of Malaya, UM, 2018, (National)
  • Leaders in Innovation Fellowships 2017-2018 Grant Award, Newton Fund, 2018, (International)
  • Panel of Jury - Um3mt 2018 - Fea UM, Fea UM, 2018, (Ptj)
  • Inspiring Professor for Motivational Talk - for 1st Class Students and Alumni, Fsktm UM, 2018, (Ptj)
  • Silver Award for Iot Based Eco Friendly Traffic Light Controller, Uitm, 2017, (National)
  • Gold Award for Go Green Malaysia - Iidex 2017, Uitm, 2017, (National)
  • Leaders in Innovation Fellowships, Royal Academy of Engineering , 2017, (International)
  • Best Paper Award, IEEE Css Malaysia Section, 2017, (National)
  • Certificate of Appreciation for Keynote Speech, The Society of Digital Information and Wireless Communications, 2016, (International)
  • Student Consultant, Ips UM, 2016, (University)
  • Chairperson for Pgres 2016, Fcsit UM, 2016, (Ptj)
  • Excellence Service Award, University Malaya, 2014, (University)
  • Certificate of Excellent Service, University Malaya, 2013, (University)
  • Instructor Years of Service, Cisco Networking Academy, 2013, (International)
  • Best Session Paper Award, International Research and Innovations in Science, Engineering and Technology (Iriset), 2012, (International)
  • Um Excellence Award, Naib Canselor, 2011, (University)
  • Excellence Award 2011, University of Malaya, 2011, (University)
  • Certificate of Excellent Service, University Malaya, 2010, (University)
  • Sijil Perkhidmatan Cemerlang, University of Malaya, 2010, (University)

PRESENTATIONS
(Title), (Event), (Date Presented), (Organiser), (Level).


PLEANARY/KEYNOTE SPEAKER
  • Towards Realizing My-Health Nationwide System: A Proposal on Health Information Exchange (HIE), Fifth World Congress of Computing, Engineering and Technology (WCET) and Society of Digital Information and Wireless Communications (SDIWC), 2016-09-06 to 2016-09-08, The Society of Digital Information and Wireless Communications, (International)
INVITED SPEAKER
  • How to Write an Effective Technical Paper, Technical Writing Workshop 2017, 2017-03-28 to 2017-03-28, CSM, (National)
  • Writing Impact Papers, Bengkel Penulisan Jurnal Fakulti Teknologi dan Sains Maklumat, 2019-04-19 to 2019-04-19, FTSM UKM, (University)
  • Technical Writing for High Impact Publication, Bengkel Penulisan Manuskrip dan Penerbitan Berimpak Tinggi, 2019-12-23 to 2019-12-24, FSKTM UPM, (University)
POSTER
  • A Scientific Search Engine Based on Data Mashup, The Digital Education Show Asia 2014, 2014-05-27 to 2014-05-28, MDEC , (International)
PRESENTER
  • Suitability of Adopting S/MIME and OpenPGP Email Messages Protocol to Secure Electronic Medical Records, Second International Conference on Future Generation Communication Technologies, 2013-12-12 to 2013-12-14, British Computer Society, (International)
  • Open Source EMR Software: How to Select the Best Software?, 3rd International Conference on Information and Computer Networks (ICICN 2015), 2015-03-19 to 2015-03-20, ICICN, (International)
OTHERS
  • Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning, Kaspersky s CyberSecurity for the Next Generation, 2013-09-26 to 2013-12-27, FIRA, (International)
  • EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing, 8th IEEE Control and System Graduate Research Colloquium, 2017-08-04 to 2017-08-05, UiTM, (International)

EXPERT/TECHNICAL CONTRIBUTIONS
(Activity), (Organisation), (Role), (From)-(Until), (Level).


  • Panellist for HLAF Scholarship Interview, Human Life Advancement Foundation, Panellist, 2017-2017, (National)
  • TWG ICT FGD Workshop, EPU Jabatan Perdana Menteri, Focus Group Member, 2017-2017, (National)
  • Panellist for Human Life Advancement Foundation (HLAF) Scholarships Interview, Human Life Advancement Foundation, Panellist, 2016-2016, (National)
  • Focus Group Member for MySEAL project Cybersecurity, Cybersecurity Malaysia, Committee Member, 2016-2016, (National)
  • Panel Viva Voce - Master of Info Tech (Full Research), Fakulti Teknologi dan Sains Maklumat UKM, Member Of Board Of Examiner, 2014-2014, (National)
  • PANEL PENILAI BAGI SESI PEMBENTANGAN KERTAS CADANGAN SKIM GERAN PENYELIDIKAN PEMBANGUNAN PROTOTAIP (PRGS) FASA 1/2014, IPPP Universiti Malaya, Panel Penilai, 2014-2014, (University)
  • Panel for Viva Voce - Phd Degree Candidate, Faculty of Information Science & Technology, UKM, Member Of Board Of Examiners, 2013-2013, (National)
  • Panel for Viva Voce - Phd Degree Candidate, Faculty of Computer Science & Info. Tech., University of Malaya, Member Of Board Of Examiner, 2013-2013, (University)
  • Reviewers for ACTA Press Journal, ACTA Press Journal Canada, 2010-Present, (International)
  • Panel Advisor for Competency Standards for Polytechnic Graduates, Jabatan Pengajian Politeknik dan Kolej Komuniti Kementerian Pengajian Tinggi Malaysia, Committee Member, 2008-2009, (National)
  • A Speaker for Technical Writing Workshop 2017, CyberSecurity Malaysia, Speaker, 2008-2009, (National)
  • Technical Committee, 2017 International Conference on Biometric Engineering and Forensics, Committee Member, 2008-2009, (International)

EVALUATION ACTIVITIES
(Description), (Evaluation Activity),(Year).


  • BAGI PROGRAM IJAZAH SARJANA MUDA SAINS KOMPUTER (KESELAMATAN KOMPUTER) DENGAN KEPUJIAN ,  (2019 - 2021)
  • Improving the Accuracy of User Authentication is Public Cloud Computing Through Adoption of Electronic Personal Synthesis Behavior (EPSB), Thesis ,  (2019 - 2019)
  • REAL-TIME ANOMALY DETECTION USING CLUSTERING-AWARE OF BIG DATA TECHNOLOGIES, Thesis ,  (2019 - 2019)
  • 2017 CSM Technical Colloquim (Unpublished Category), Article In Proceeding ,  (2017 - 2017)
  • External Assessor for academic promotion to Assoc Prof/Professor, Academic Promotion ,  (2017 - 2017)
  • For Academic promotion to Associate Professor/Professor, Academic Promotion ,  (2017 - 2017)
  • MILP-Based Approach To Evaluation Of Tweak-Aes-128 Bits Resistant To Related-Key Differential And Boomerang Attacks, Article In Journal ,  (2017 - 2017)
  • External Examiner for Academic Program - Foundation in Computing and Diploma in IT, Academic Program External Examiner ,  (2017 - 2019)
  • 2017 CSM Technical Colloquim (Published Category), Article In Proceeding ,  (2017 - 2017)
  • Evaluation Panel for Newton-Ungku Omar Fund - Project Research Proposal (2), Project ,  (2017 - 2017)
  • Evaluation Panel for Newton-Ungku Omar Fund Research Project Proposal, Project ,  (2017 - 2017)
  • SECURE DATA COLLECTION USING MOBILE SENSORS IN STATICALLY DEPLOYED SENSOR NETWORKS, Article In Journal ,  (2017 - 2017)
  • Reviewer for JICT (Journal of Information and Communication Technology), Article In Journal ,  (2016 - 2016)
  • Esciencefund proposals, Permohonan Geran Penyelidikan Sciencefund ,  (2016 - 2016)
  • Expert Panel for Doctoral Consortium, Doctoral Consortium ,  (2016 - 2016)
  • SECURED IMAGE ENCRYPTION USING RANDOM NUMBERS AND REVERSIBLE DATA HIDING, Thesis ,  (2016 - 2016)
  • FRGS proposals, Permohonan Geran Frgs ,  (2016 - 2016)
  • Paper Reviewer for CSM 2016 Technical Colloquium, Article In Proceeding ,  (2016 - 2016)
  • Risk Assessment Model for Organizational Information Security, Thesis ,  (2016 - 2016)
  • Paper titled 'Study the Reality and Future of the Affordable and Secure Mobile Cloud Computing (SMCC)', Article In Journal ,  (2014)
  • PhD thesis on 'Traffic Aware Backoff Scheduling of Low Data Rate Applications in Wireless Body Area Networks', Thesis ,  (2014)
  • Paper titled 'PROTECTING WIRELESS DATA TRANSMISSION USING WATERMARKING TECHNIQUE APPROACH', Article In Journal ,  (2014)
  • Paper titled "Path Loss Simulation in Different Radio Propagation Models with 1.8GHz and 2.6GHz Bands", Article In Proceeding ,  (2014)
  • Master Thesis (Full Research) titled 'SENIBINA KESELAMATAN MULTI-AGEN UNTUK E-LELONG PATUH SYARIAH', Thesis ,  (2014)
  • Paper titled "Issues Affecting the Adoption of IPv6", Article In Proceeding ,  (2014)
  • PhD Thesis on 'Enhancing Security in Mobile IPv6 with Private Key-based Binding Update Key Protocol', Thesis ,  (2013)
  • Phd Thesis on 'Infrastructure Based Management And Optimization For NEMO Correspondent Registration', Thesis ,  (2013)
  • Master Thesis on 'Key Authentication in Closed Communities Using Images', Thesis ,  (2013)
  • Master Thesis on 'Parallel Chaotic Hash Function Based on the Shuffle-Exchange Network', Thesis ,  (2013)
  • Master Thesis on 'Kajian Perbandingan Model Gelombang Penyebaran Radio Terhadap Rangkaian 4G', Thesis ,  (2013)
  • Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique - Re-Examination, Thesis ,  (2012 - 2012)
  • M-XKMS: Adaptation of XKMS for Mobile Devices to Secure Short Message Service Using XML Key Management Specification, Article In Journal ,  (2012 - 2012)
  • Research Project for MCS candidate - A Framework to Support Cross-Platform Application Development for Mobile Devices, Project ,  (2012 - 2012)
  • A Generic Relation to Assess Interdependency of QoE and QoS, Thesis ,  (2012 - 2012)
  • Development of High Secure Data Hiding System Using Least Significant Bit Algorithm, Thesis ,  (2012 - 2012)
  • SECURITY ANALYSIS OF WATERMARKING PROTOCOLS AND SCHEMES BASED ON SINGULAR VALUE DECOMPOSITION, Thesis ,  (2012 - 2012)
  • Research Project for MCS candidate - Improving DSR Routing Protocol Using TTL-Based in Mobile Ad Hoc Network (MANET), Project ,  (2012 - 2012)
  • A PROXY-ASSISTED ROUTING FOR EFFICIENT DATA TRANSMISSION IN MOBILE AD HOC NETWORKS, Thesis ,  (2011 - 2011)
  • An Approach The Implementation Of Access Control Policy And Identity Management In The Public Sector Agency, Thesis ,  (2011)
  • Designing a Low Cost Implementation of E‐Commerce Security by Optimizing the Parameters of NTRU Cryptosystem Algorithm for Inderscience Publishers Ltd., Article In Journal ,  (2011 - 2011)
  • A Reservation‐Based Multiple Access Scheme with Adaptive Permission Probability for Wireless Systems Journal of King Saud University ‐ Computer and Information Sciences, Article In Journal ,  (2011 - 2011)
  • Paper on A NEW IDENTITY BASED GROUP SIGNATURE SCHEME, Article In Journal ,  (2011)
  • Master Dissertation on Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme, Thesis ,  (2010)
  • Paper on BIOMETRIC ENCRYPTION THROUGH MODIFIED HILL CIPHER TECHNIQUE, Article In Journal ,  (2010)
  • Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique, Thesis ,  (2010)
  • Master Dissertation on Throughput Optimization of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), Thesis ,  (2010)
  • Master Dissertation on Implementation of Elliptic Curve Cryptography Using Biometric Features to Enhance Security Services, Thesis ,  (2009)
  • For paper publications of Malaysian Journal of Computer Science (MJCS), Article In Journal ,  (2007 - 2008)

CONTRIBUTION TO SOCIETY
(Contribution To Society), (Level), (Start Date), (End Date).


  • AJK Induk Pemilihan MPPUM Sesi 2012/2013, (University), 18/09/2012 until  
  • Executive Editor for Malaysian Journal of Computer Science, (University), 01/08/2007 until 01/08/2008

INTELLECTUAL PROPERTY RIGHTS
(Product Name), (Type), (Reference), (Year), (Level).


  • A FRAMEWORK AND RELATED METHODS FOR HEALTH INFORMATION EXCHANGE USING MOBILE PERSONAL HEALTH RECORDS, PATENT, PI 2016700571, 19/02/2016, (NATIONAL)
  • SECURE VIDEO CONFERENCING FRAMEWORK FOR REAL TIME APPLICATION: METHODOLOGY AND SYSTEM, PATENT, 603/827, 27/11/2014, (INTERNATIONAL)
  • A Scientific Search Engine Based on Data Mashup , PATENT, UM.TNC2/UMCIC/603/79​3 , 21/08/2014, (INTERNATIONAL)

SUPERVISION


POST GRADUATE STUDENT
(Name of Degree), (Name of Candidates), (Title of Thesis), (Academic Session)

Completed
  • Doctoral Degree (phd), Abdul Nasir Khan, Energy Efficient Data Security Schemes for Mobile Users in Cloud Environment, 2011/2012
  • Doctoral Degree (phd), Shahaboddin Shamshirband, COOPERATIVE MULTI AGENTS FOR INTELLIGENT INSTRUSION DETECTION AND PREVENTION SYSTEMS, 2011/2012
  • Master Degree, Mohamed Shabbir Hamza Abdulnabi, Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, 2010/2011
  • Master Degree, Wira Zanoramy Ansiry Bin Zakaria, A Case Based Reasoning Approach for Dynamic Honeypot, 2010/2011
  • Master Degree, Samer Hasan Saif, An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, 2009/2010
  • Master Degree, Alanazi, Hamdan Owaid R, Hybrid Techniques of NTRU and AES for Improving the Security of Electronic Medical Records, 2009/2010
  • Master Degree, Mohammed A Ahmed, Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-bit Encoding Audio Steganagraphy Technique, 2009/2010
  • Master Degree, Mohamed Shabbir Hamza Abdulnabi, Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, 2009/2010
  • Master Degree, Mohammad Yasin Arashpour, Implementation of Wireless Security on Virtual WiFi, 2008/2009
  • Doctoral Degree (phd), Saman Mirza Abdulla, An Artificial Co-stimulation Classifier of Malicious API calls classification in Portable Executable Malwares, 2008/2009
  • Master Degree, Mohamed Elsadiq Eltahir Ahmed, An Implementation of Video Steganography Using the LSB Method, 2008/2009
  • Master Degree, Hamsah Ahmed Ghaleb Al-jbara, High Capacity Image Steganography Algorithm Based on Artificial Neural Network, 2008/2009
  • Doctoral Degree (phd), Liana K. M. Qabajeh, A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, 2008/2009
  • Master Degree, Babak Daghighi, Key Management for Secure Group Communication in a Wireless Environment, 2008/2009
  • Master Degree, Anas Mageed Hamid, An Image Steganography Using Texture Analysis for High Rate Data Hiding, 2008/2009
  • Doctoral Degree (phd), Saman Mirza Abdulla, An Artificial Co-stimulation Classifier for Malicious API calls classification in Portable Executable Malwares, 2008/2009
  • Doctoral Degree (phd), Liana Khamis Qabajeh, A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, 2008/2009
  • Master Degree, Hamsah Ahmed Ghaleb Al-jbara, High Capacity Image Steganography Algorithm Based on Artificial Neural Network, 2007/2008
  • Master Degree, Mohammad Yasin Arashpour, Implementation of Wireless Security on Virtual WIFI, 2007/2008
  • Master Degree, Addy Majed Abdalkarem Alquraan, Implementation of End-To-End Secure SMS Using Elliptic Curve Cryptography, 2007/2008
  • Master Degree, Samer Hasan Saif Qaid, An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, 2007/2008
  • Master Degree, Mohammed-a-ahmed, Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-Bit Encoding Audio Steganography Technique, 2007/2008
  • Master Degree, Anas Mageed Hamid, An Image Steganography Using Texture Analysis for High Rate Data Hiding, 2007/2008
  • Master Degree, Babak Daghighi, The Implementation of Secure Group Communication in Wireless and Mobile Environment, 2006/2007
  • Master Degree, Mohamed El Sadiq El Tahir Ahmed, An Implementation of Video Steganography Using the LSB Method, 2006/2007
  • Master Degree, Addy Majed Abdalkarem Alquraan, Implementation of End-to-End Secure SMS Using Elliptic Curve Cryptography, 2006/2007

Ongoing
  • Doctoral Degree (phd), Muzammil Hussain, A Security Framework For Mobile Health Applications On Android Platform, 2013/2014
  • Doctoral Degree (phd), Nordiana Binti Rahim, Computer Forensic, 2012/2013
  • Doctoral Degree (phd), Noor Hayani Binti Abd Rahim, Assessment of Cybersecurity Awareness Program On Personal Data Protection Among Youngsters in Malaysia, 2012/2013
  • Doctoral Degree (phd), Noor Hayani Binti Abd Rahim, Information Security, 2012/2013
  • Doctoral Degree (phd), Salman Iqbal Malik, Network Security, 2012/2013
  • Doctoral Degree (phd), Mohamed Shabbir Hamza Abdulnabi, Computer Security, 2012/2013
  • Doctoral Degree (phd), Shazana Binti Md Zin, WIRELESS SECURITY, 2011/2012
  • Doctoral Degree (phd), Abdul Nasir Khan, Network Security, 2011/2012
  • Doctoral Degree (phd), Lim Shu Yun, Network Security, 2011/2012
  • Doctoral Degree (phd), Shazana Binti Md Zin, Wireless Security, 2011/2012
  • Doctoral Degree (phd), Babak Daghighi, Secure Group Communication, 2011/2012
  • Doctoral Degree (phd), Shahaboddin Shamshirband, Network Security, 2011/2012
  • Master Degree, Wira Zanoramy, A Case Based Reasoning Approach for Dynamic Honeypot, 2010/2011
  • Doctoral Degree (phd), Abdul Mueed Khalid, Network Security, 2009/2010
  • Doctoral Degree (phd), Fazidah Binti Othman, -, 2008/2009
  • Doctoral Degree (phd), Fazidah Binti Othman, Secure Group Communication, 2008/2009

TEACHING
(Course Title), (Academic Session), (No of Student), (No of Contact Hours).


FIRST DEGREE
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2013/2014(1), 48, 5
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2012/2013(1), 66, 5
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2011/2012(1), 25, 2
  • FUNDAMENTALS OF NETWORK TECHNOLOGY, 2010/2011(1), 97, 6
  • ADVANCE NETWORK TECHNOLOGY, 2009/2010(2), 45, 5