Curriculum Vitae

PROF. TS. DR. MISS LAIHA BINTI MAT KIAH

Professor
  • Department of Computer System & Technology
    Faculty of Computer Science and Information Technology
  • +603-79676354

AREAS OF EXPERTISE


  • SECURITY SERVICES SN: DIGITAL FORENSIC, STEGANOGRAPHY, NETWORK SECURITY, PUBLIC KEY INFRASTUCTURE AND BIOMETRICS
    Cloud computing, cyber security
  • INFORMATION SECURITY
    Applied Cryptography, Applied Steganography
  • COMMUNICATION PROTOCOLS
    Wireless Security, Ad-hoc Network Security, Mobile Communication Security
  • SECURITY PROTOCOLS
    Group Communication, Key Management, Wireless Mobile Environments

ACADEMIC QUALIFICATION


  • Doctoral Degree (PhD), (Keselamatan Maklumat)
    Royal Holloway, University of London, United Kingd
  • MASTER DEGREE, (Keselamatan Komputer)
    Royal Holloway, University of London, United Kingd
  • PhD (London), (Information Security)
    Royal Holloway, University of London, United Kingd
  • MSc (London), (Information Security)
    Royal Holloway, University of London, United Kingd
  • B.Sc.COMP.SC.(HONS), (Sains Komputer)
    Universiti Malaya (UM)

ADMINISTRATIVE DUTIES


  • Director
    15 Jun 2022 - present (Academic Development and Enhancement Centre, Deputy Vice-Chancellor (Academic and International))
  • Penasihat Akademik
    06 Oct 2023 - 31 Dec 2028 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Penyelia Latihan Industri
    06 Oct 2023 - 31 Dec 2028 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • AJK Sebut Harga PTj
    09 Aug 2023 - 08 Aug 2025 (University Malaya)
  • AJK Kurikulum (Task Force) bagi Program Sarjana Keselamatan Siber (secara Kerja Kursus)
    03 Mar 2023 - 04 Mar 2025 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Committee Members
    07 Mar 2022 - 03 Mar 2025 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Committee Members
    07 Mar 2022 - 03 Mar 2025 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Ahli MEIPTA
    14 Apr 2023 - 31 Dec 2024 (National)
  • Committee Members
    02 Jan 2022 - 31 Dec 2024 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Ahli Akademik Kanan bagi JK Ijazah Tinggi Fakulti
    09 Nov 2023 - 31 Dec 2024 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Committee Members
    17 Dec 2021 - 16 Dec 2024 (University Malaya)
  • Committee Members
    04 Jan 2022 - 16 Dec 2024 (University Malaya)
  • Committee Members
    01 Nov 2022 - 31 Oct 2024 (National)
  • Jawatankuasa Kerja Audit Program Ijazah Tinggi (JKAPIT)
    06 Aug 2012 - present (University Malaya)
  • Wakil Tetap Fakulti Ke JawatanKuasa Penasihat Akademik, IPS
    26 Aug 2011 - present (Dean Office, Faculty of Computer Science and Information Technology)
  • Committee Members
    28 Jan 2022 - 27 Jan 2024 (University Malaya)
  • Moderator Examination for Final Examination/Assessment
    01 Jan 2023 - 31 Dec 2023 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Committee Members
    01 Jul 2022 - 31 Dec 2023 (University Malaya)
  • Ahli Pasukan (Taskforce) Merangka Dokumen MYPORTFOLIO Staf Akademik UM
    23 Mar 2023 - 31 Dec 2023 (University Malaya)
  • Committee Members
    01 Jan 2022 - 31 Dec 2023 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • AJK JKIK - Program Baru Master of Artificial Intelligence
    07 Dec 2020 - 06 Dec 2023 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • AJK JKIK - Master of Cybersecurity
    09 Nov 2020 - 08 Nov 2023 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Committee Members
    24 Feb 2022 - 31 Dec 2022 (University Malaya)
  • Supervisor
    14 Oct 2022 - 31 Dec 2022 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Task Force Member
    15 Jul 2022 - 31 Dec 2022 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Wakil Senat - JK Senat Khas Rayuan
    24 Jul 2020 - 23 Jul 2022 (University Malaya)
  • Committee Members
    24 Feb 2022 - 24 Feb 2022 (University Malaya)
  • WAKIL SENAT/AHLI JK PEMILIH KE JAWATAN PROF C
    25 Jan 2019 - 24 Jan 2022 (University Malaya)
  • Deputy Dean of Higher Degree
    07 Oct 2019 - 31 Dec 2021 (Dean Office, Faculty of Computer Science and Information Technology)
  • Ahli Taskforce Penambahbaikan Research Module UMSITs
    13 Oct 2020 - 31 Dec 2021 (University Malaya)
  • AHLI SENAT
    17 Dec 2018 - 16 Dec 2021 (University Malaya)
  • AHLI JK TASKFORCE PENGEMASKINIAN POLISI PENYELIAAN CALON IJAZAH TINGGI
    08 Oct 2019 - 07 Oct 2021 (University Malaya)
  • Profesor yang dilantik - keanggotaan JK Pemeriksa Sarjana Bahagian Penyelidikan
    05 Sep 2019 - 04 Sep 2021 (Academy of Islamic Studies, Academy of Islamic Studies)
  • Timbalan Pengurus Kualiti
    07 Oct 2019 - 31 Jul 2021 (Academy of Islamic Studies, Faculty of Computer Science and Information Technology)
  • Wakil Senate
    31 Jul 2018 - 25 Jan 2021 (University Malaya)
  • AHLI JK PEMILIH CUTI BELAJAR DAN SLAB/SLAI 2019/2020
    01 Jan 2019 - 31 Dec 2020 (University Malaya)
  • Panel Penilai FYP - Sem2 20192020
    01 Feb 2020 - 30 Sep 2020 (Academy of Islamic Studies, Faculty of Computer Science and Information Technology)
  • Programme Coordinator
    07 Aug 2017 - 06 Aug 2020 (Academy of Islamic Studies, Faculty of Computer Science and Information Technology)
  • Ahli JK Tapisan (Pelantikan)
    16 Mar 2017 - 15 Mar 2020 (Academy of Islamic Studies, Faculty of Computer Science and Information Technology)
  • Ahli JK Tapisan - Fakulti Sains
    03 Jul 2017 - 31 Dec 2019 (Dean Office, Faculty of Science)
  • Ahli Panel Penemuduga Cuti Belajar dan SLAB/SLAI
    03 Jan 2017 - 31 Dec 2018 (University Malaya)
  • Wakil Senat - JK Induk Pengecualian dan Pemindahan Kredit
    26 Aug 2016 - 16 Dec 2018 (University Malaya)
  • Ahli JK Penilai Luar Program - Bidang Sains Teknologi dan Klinikal
    01 Jun 2017 - 16 Dec 2018 (University Malaya)
  • Wakil Senat - Ahli Jawatankuasa Pemilih
    01 Aug 2016 - 16 Dec 2018 (University Malaya)
  • Wakil Senat - Ahli JK Pengajian (Ijazah Tinggi)
    01 May 2017 - 16 Dec 2018 (Dean Office, Faculty of Science)
  • Senate Member
    17 Dec 2015 - 16 Dec 2018 (University Malaya)
  • Wakil Senat - JK Perpustakaan Universiti
    26 May 2017 - 16 Dec 2018 (University Malaya)
  • AJK Kump Penyelidik ICT Security Research Group
    13 Dec 2016 - 12 Dec 2018 (Dean Office, Faculty of Computer Science and Information Technology)
  • AJK Kump Penyelidik IoT
    13 Dec 2016 - 12 Dec 2018 (Dean Office, Faculty of Computer Science and Information Technology)
  • Pengawai Penilai Prestasi Khas
    15 May 2017 - 14 May 2018 (University Malaya)
  • Ahli JK Penyelidikan
    10 Aug 2016 - 09 Aug 2017 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Ahli JK Badan Penasihat Dekan
    15 Aug 2016 - 30 Jun 2017 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Wakil Pengerusi
    12 Sep 2016 - 11 Jun 2017 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Pengerusi/Panel REMOS.stk
    25 Nov 2016 - 25 Nov 2016 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Ahli JK Kurikulum Jabatan - Program Sarjana
    01 Mar 2014 - 28 Feb 2016 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Deputy Dean of Higher Degree
    01 Jul 2014 - 31 Jul 2014 (Dean Office, Faculty of Computer Science and Information Technology)
  • Deputy Dean of Higher Degree
    01 Jul 2011 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
  • AJK Penilaian Slim Geran FRGS & ERGS Peringkat UM
    21 May 2013 - 31 Dec 2014 (University Malaya)
  • Ahli Panel Penemuduga
    14 Nov 2013 - 13 Nov 2014 (University Malaya)
  • PENGERUSI - JK Kurikulum FSKTM (Ijazah Tinggi)
    01 Jul 2011 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
  • Deputy Dean of Higher Degree
    01 Jul 2011 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
  • Ahli JKIT FSKTM
    01 Jul 2013 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
  • AJK Bright Spark FSKTM
    01 Jul 2012 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
  • PENGERUSI - JK Ijazah Tinggi (JKIT)
    01 Jul 2011 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
  • Acting Dean
    22 May 2014 - 23 May 2014 (Dean Office, Faculty of Computer Science and Information Technology)
  • AJK PGRES FSKTM
    07 Feb 2013 - 31 Dec 2013 (Dean Office, Faculty of Computer Science and Information Technology)
  • Ahli Panel Penemuduga
    31 Oct 2012 - 30 Oct 2013 (University Malaya)
  • Timbalan Pengerusi NADI
    22 Aug 2011 - 21 Aug 2013 (Dean Office, Faculty of Computer Science and Information Technology)
  • Acting Dean
    05 Jul 2013 - 09 Jul 2013 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Acting Director
    10 Jan 2013 - 11 Jan 2013 (Dean Office, Faculty of Computer Science and Information Technology)
  • AJK PGRES FSKTM
    22 Feb 2012 - 31 Dec 2012 (Dean Office, Faculty of Computer Science and Information Technology)
  • Acting Director
    29 Nov 2012 - 30 Nov 2012 (Dean Office, Faculty of Computer Science and Information Technology)
  • Acting Director
    26 Sep 2012 - 28 Sep 2012 (Dean Office, Faculty of Computer Science and Information Technology)
  • Acting Director
    22 Sep 2012 - 25 Sep 2012 (Dean Office, Faculty of Computer Science and Information Technology)
  • Acting Director
    28 Aug 2012 - 13 Sep 2012 (Dean Office, Faculty of Computer Science and Information Technology)
  • Acting Director
    17 Jun 2012 - 22 Jun 2012 (Dean Office, Faculty of Computer Science and Information Technology)
  • Head of Department
    13 May 2008 - 31 Aug 2009 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Head of Department
    12 May 2008 - 31 Aug 2009 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)

MEMBERSHIPS


  • AHLI MAJLIS PROFESOR NEGARA, MEMBER
    Since 2022 (National)
  • MALAYSIAN SOCIETY FOR CRYPTOLOGY RESEARCH (MSCR), MEMBER
    Since 2017 (National)
  • MPN - MAJLIS PROFESOR UNIVERSITI , MEMBER
    Since 2017 (National)
  • AJK SEMAKAN SEMULA SISTEM SAPT UM, MEMBER
    2021 to 2023 (University)
  • ASSOCIATE EDITOR , COMMITTEE MEMBER
    2021 to 2023 (International)
  • AHLI JAWATANKUASA PEMILIH CUTI BELAJAR SLAB/SLAI, MEMBER
    2021 to 2022 (University)
  • PENYELARAS PEMASARAN, MEMBER
    2021 to 2022 (University)
  • WAKIL IPT (CSAM SECRETARIAT) - UM , COMMITTEE MEMBER
    2021 to 2022 (National)
  • AHLI JAWATANKUASA PROGRAM BIDANG SAINS KOMPUTER - IJAZAH SARJANA DAN IJAZAH SARJANA MUDA, MEMBER
    2020 to 2022 (National)
  • PANEL TEMU DUGA PROGRAM PENAJAAN/CUTI BELAJAR BERGAJI PENUH (CBBP) PEGAWAI PENDIDIKAN PENGAJIAN TINGGI (PPPT) DI IPTA, MEMBER
    2021 to 2021 (National)
  • IEEE SENIOR MEMBER, MEMBER
    2021 to 2021 (International)
  • MALAYSIA BOARD OF TECHNOLOGISTS, MEMBER
    2018 to 2021 (National)
  • EC COUNCIL, MEMBER
    2012 to 2021 (International)
  • CENTRE FOR RESEARCH IN INDUSTRY 4.0 (CRI4.0), COMMITTEE MEMBERS
    2018 to 2020 (National)
  • IEEE - SENIOR MEMBER, COMMITTEE MEMBER
    2016 to 2020 (National)
  • IEEE - SENIOR MEMBER, COMMITTEE MEMBER
    2016 to 2019 (International)
  • EC COUNCIL, COMMITTEE MEMBER
    2012 to 2018 (National)

AWARD AND STEWARDSHIP


  • Best Paper Award
    CRC2021, 2021 (International)
  • GOLD AWARD - INNOVATION
    UiTM MELAKA, 2019 (International)
  • Instructor 10 Years of Service
    CISCO Academy, 2019 (International)
  • FCSIT Innovation Exhibition Competition 2018
    UM, 2018 (Ptj/ Faculty)
  • INTERNATIONAL RESEARCH INNOVATION, INVENTION & SOLUTION EXPOSITION (IRIISE 2018) 14 - 16 August 2018 Dewan Tunku Canselor, University of Malaya
    UM, 2018 (National)
  • Leaders in Innovation Fellowships 2017-2018 Grant Award
    Newton Fund, 2018 (International)
  • Panel of Jury - UM3MT 2018 - FEA UM
    FEA UM, 2018 (Ptj/ Faculty)
  • Inspiring Professor for Motivational Talk - for 1st class students and Alumni
    FSKTM UM, 2018 (Ptj/ Faculty)
  • SILVER award for IoT Based Eco Friendly Traffic Light Controller
    UiTM, 2017 (National)
  • GOLD award for Go Green Malaysia - iiDEX 2017
    UiTM, 2017 (National)
  • Leaders in Innovation Fellowships
    Royal Academy of Engineering , 2017 (International)
  • KHIDMAT SETIA 20 AWARD
    , 2017 (University)
  • Best Paper Award
    IEEE CSS Malaysia Section, 2017 (National)
  • Certificate of Appreciation for Keynote Speech
    The Society of Digital Information and Wireless Communications, 2016 (International)
  • Student Consultant
    IPS UM, 2016 (University)
  • Chairperson for PGRES 2016
    FCSIT UM, 2016 (Ptj/ Faculty)
  • EXCELLENCE SERVICE AWARD
    University of Malaya, 2014 (University)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2013 (University)
  • Instructor Years of Service
    Cisco Networking Academy, 2013 (International)
  • BEST SESSION PAPER AWARD
    International Research and Innovations in Science, Engineering and Technology (IRISET), 2012 (International)
  • UM EXCELLENCE AWARD
    NAIB CANSELOR, 2011 (University)
  • Excellence Award 2011
    University of Malaya, 2011 (University)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2010 (University)
  • Sijil Perkhidmatan Cemerlang
    University of Malaya, 2010 (University)

PUBLICATIONS


Article in Journal
WoS
  1. Al-Hussein, Ward Ahmed; Por, Lip Yee; Kiah, Miss Laiha Mat; Zaidan, Bilal Bahaa (2022). Driver Behavior Profiling and Recognition Using Deep-Learning Methods: In Accordance with Traffic Regulations and Experts Guidelines, INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH. 19(3). doi:10.3390/ijerph19031470
  2. Alasbali, Nada; Azzuhri, Saaidal Razalli Bin; Salleh, Rosli Bin; Kiah, Miss Laiha Mat; Shariffuddin, Ahmad Aliff A. S. Ahmad; Kamel, Nik Muhammad Izwan bin Nik Mohd; Ismail, Leila (2022). Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization, MOBILE INFORMATION SYSTEMS. 2022. doi:10.1155/2022/9109300
  3. Jimale, Mohamud Ahmed; Z'aba, Muhammad Reza; Kiah, Miss Laiha Binti Mat; Idris, Mohd Yamani Idna; Jamil, Norziana; Mohamad, Moesfa Soeheila; Rohmad, Mohd Saufy (2022). Authenticated Encryption Schemes: A Systematic Review, IEEE ACCESS. 10, 14739-14766. doi:10.1109/ACCESS.2022.3147201
  4. Jimale, Mohamud Ahmed; Z'aba, Muhammad Reza; Kiah, Miss Laiha Binti Mat; Idris, Mohd Yamani Idna; Jamil, Norziana; Mohamad, Moesfa Soeheila; Rohmad, Mohd Saufy (2022). Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces, IEEE ACCESS. 10, 50819-50838. doi:10.1109/ACCESS.2022.3171853
  5. Khan, Burhan Ul Islam; Olanrewaju, Rashidah Funke; Morshidi, Malik Arman; Mir, Roohie Naaz; Kiah, Miss Laiha Binti Mat; Khan, Abdul Mobeen (2022). EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY, MALAYSIAN JOURNAL OF COMPUTER SCIENCE. 35(3), 179-200. doi:10.22452/mjcs.vol35no3.1
  6. Mustafa, Mumtaz Begum; Yusoof, Mansoor Ali; Khalaf, Hasan Kahtan; Abushariah, Ahmad Abdel Rahman Mahmoud; Kiah, Miss Laiha Mat; Hua Nong Ting; Muthaiyah, Saravanan (2022). Code-Switching in Automatic Speech Recognition: The Issues and Future Directions, APPLIED SCIENCES-BASEL. 12(19). doi:10.3390/app12199541
  7. Al-Hussein, W. A., Kiah, M. L. M., Yee, P. L., & Zaidan, B. B. (2021). A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions. Peerj Computer Science, 7, 50. doi: 10.7717/peerj-cs.632
  8. Al-Hussein, Ward Ahmed; Kiah, Miss Laiha Mat; Por, Lip Yee; Zaidan, Bilal Bahaa (2021). Investigating the Effect of Social and Cultural Factors on Drivers in Malaysia: A Naturalistic Driving Study, INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH. 18(22). doi:10.3390/ijerph182211740
  9. Binbeshr, F., Kiah, M. L. M., Por, L. Y., & Zaidan, A. A. (2021). A systematic review of PIN-entry methods resistant to shoulder-surfing attacks. Computers & Security, 101, 14. doi: 10.1016/j.cose.2020.102116
  10. Hameed, M. M., Ahmad, R., Kiah, M. L. M., & Murtaza, G. (2021). Machine learning-based offline signature verification systems: A systematic review. Signal Processing-Image Communication, 93, 22. doi: 10.1016/j.image.2021.116139
  11. Khan, B. U., Anwar, F., Olanrewaju, R. F., Kiah, M., & Mir, R. N. (2021). Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs. IEEE Access, 9, 61778-61792. doi: 10.1109/access.2021.3073343
  12. Kolandaisamy, R., Noor, R. M., Kolandaisamy, I., Ahmedy, I., Kiah, M. L. M., Tamil, M. E. M., & Nandy, T. (2021). A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6599-6612. doi: 10.1007/s12652-020-02279-2
  13. Mahmood, A., Kiah, M. L. M., Azzuhri, S. R., Kamal, M. M., Eldabi, T., Qureshi, A. N., . . . Z'Aba, M. R. (2021). Wireless backhaul network's capacity optimization using time series forecasting approach. Journal of Ambient Intelligence and Humanized Computing, 12(1), 1407-1418. doi: 10.1007/s12652-020-02209-2
  14. Olanrewaju, R. F., Khan, B. U., Morshidi, M. A., Anwar, F., & Kiah, M. (2021). A Frictionless and Secure User Authentication in Web-Based Premium Applications. IEEE Access, 9, 129240-129255. doi: 10.1109/access.2021.3110310
  15. Palanisamy, Rathika; Norman, Azah Anir; Kiah, Laiha Mat (2021). BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts, JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE. 31(4), 320-342. doi:10.1080/10919392.2022.2028530
  16. Anjum, S. S., Noor, R., Ahmedy, I., Anisi, M. H., Azzuhri, S. R., Kiah, M. L. M., . . . Kumar, P. (2020). An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks. Ad Hoc Sensor Wireless Networks, 46(1-2), 83-112.
  17. Anjum, Shaik Shabana; Noor, Rafidah; Ahmedy, Ismail; Anisi, Mohammad Hossein; Azzuhri, Saaidal Razalli; Kiah, Miss Laiha Mat; Lloret, Jaime; Kumar, Pradeep (2020). An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks, AD HOC & SENSOR WIRELESS NETWORKS. 46(1-2), 83-112
  18. Hussain, A., Kiah, M. L. M., Anuar, N. B., Noor, R., & Ahmad, M. (2020). Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey. Journal of Medical Imaging and Health Informatics, 10(10), 2404-2420. doi: 10.1166/jmihi.2020.3178
  19. Iqbal, S., Kiah, M. L. M., Rehman, A. U., Abbas, Z., & Daghighi, B. (2020). DM-GKM: A key management scheme for dynamic group based applications. Computer Networks, 182, 18. doi: 10.1016/j.comnet.2020.107476
  20. Khan, F. A., Noor, R. M., Kiah, M. L. M., Ahmedy, I., Idris, M. Y. I., Soon, T. K., Ahmad, M. (2020). Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things. Sensors, 20(1), 15. doi: 10.3390/s20010283
  21. Khan, Fawad Ali; Noor, Rafidah Md; Kiah, Miss Laiha Mat; Ahmedy, Ismail; Idris, Mohd Yamani Idna; Soon, Tey Kok; Ahmad, Muneer (2020). Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things, SENSORS. 20(1). doi:10.3390/s20010283
  22. Khurshid, W., Khan, I. A., Kiah, M. L. M., Khalid, O., Madani, S. A. (2020). A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb. Ieee Communications Letters, 24(4), 744-747. doi: 10.1109/lcomm.2020.2966198
  23. Khurshid, Waqar; Khan, Imran A.; Kiah, Miss L. M.; Khalid, Osman; Madani, Sajjad A. (2020). A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb, IEEE COMMUNICATIONS LETTERS. 24(4), 744-747. doi:10.1109/LCOMM.2020.2966198
  24. Mahmood, A., Kiah, M. L. M., ZAba, M. R., Qureshi, A. N., Kassim, M. S. S., Hasan, Z. H. A., . . . Azzuhri, S. R. (2020). Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting. Ieee Access, 8, 23264-23276. doi: 10.1109/access.2020.2970224
  25. Mahmood, Atif; Kiah, Miss Laiha Mat; Z'aba, Muhammad Reza; Qureshi, Adnan N.; Kassim, Muhammad Shahreeza Safiruz; Hasan, Zati Hakim Azizul; Kakarla, Jagadeesh; Amiri, Iraj Sadegh; Azzuhri, Saaidal Razalli (2020). Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting, IEEE ACCESS. 8, 23264-23276. doi:10.1109/ACCESS.2020.2970224
  26. Mehrban, S., Nadeem, M. W., Hussain, M., Ahmed, M. M., Hakeem, O., Saqib, S., . . . Khan, M. A. (2020). Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges. Ieee Access, 8, 23391-23406. doi: 10.1109/access.2020.2970430
  27. Mehrban, Sobia; Nadeem, Muhammad Waqas; Hussain, Muzammil; Ahmed, Mohammad Masroor; Hakeem, Owais; Saqib, Shazia; Kiah, M. L. Mat; Abbas, Fakhar; Hassan, Mujtaba; Khan, Muhammad Adnan (2020). Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges, IEEE ACCESS. 8, 23391-23406. doi:10.1109/ACCESS.2020.2970430
  28. Palanisamy, R., Norman, A. A., & Kiah, M. L. M. (2020). Compliance with bring your own device security policies in organizations: A systematic literature review. Computers & Security, 98, 16. doi: 10.1016/j.cose.2020.101998
  29. Palanisamy, Rathika; Norman, Azah Anir; Mat Kiah, Miss Laiha (2020). BYOD Policy Compliance: Risks and Strategies in Organizations, JOURNAL OF COMPUTER INFORMATION SYSTEMS. . doi:10.1080/08874417.2019.1703225
  30. Abd Rahim, N. H., Hamid, S., Kiah, M. L. M. (2019). ENHANCEMENT OF CYBERSECURITY AWARENESS PROGRAM ON PERSONAL DATA PROTECTION AMONG YOUNGSTERS IN MALAYSIA: AN ASSESSMENT. Malaysian Journal of Computer Science, 32(3), 221-245. doi:10.22452/mjcs.vol32no3.4
  31. Anjum, S. S., Noor, R. M., Aghamohammadi, N., Ahmedy, I., Kiah, M. L. M., Hussin, N., . . . Qureshi, M. A. (2019). Modeling Traffic Congestion Based on Air Quality for Greener Environment: An Empirical Study. Ieee Access, 7, 57100-57119. doi:10.1109/access.2019.2914672
  32. Khan, F. A., Noor, R. M., Kiah, M. L. M., Noor, N. M., Altowaijri, S. M., Rahman, A. U. (2019). QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things. Symmetry-Basel, 11(5), 22. doi:10.3390/sym11050634
  33. Nandy, T., Bin Idris, M. Y. I., Noor, R. M., Kiah, M. L. M., Lun, L. S., Jumaat, N. B. A., . . . Bhattacharyya, S. (2019). Review on Security of Internet of Things Authentication Mechanism. Ieee Access, 7, 151054-151089. doi:10.1109/access.2019.2947723
  34. Talal, M., Zaidan, A. A., Zaidan, B. B., Albahri, O. S., Alsalem, M. A., Albahri, A. S., . . . Alaa, M. (2019). Comprehensive review and analysis of anti-malware apps for smartphones. Telecommunication Systems, 72(2), 285-337. doi:10.1007/s11235-019-00575-7
  35. Hussain, Muzammil; Al-Haiqi, Ahmed; Zaidan, A. A.; Zaidan, B. B.; Kiah, M. L. Mat; Anuar, Nor Badrul; Abdulnabi, Mohamed (2016). The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks, PERVASIVE AND MOBILE COMPUTING. 25, 1-25. doi:10.1016/j.pmcj.2015.12.001
  36. Kiah, M. L. M., Haiqi, A., Zaidan, B. B., Zaidan, A. A. (2014). Open source EMR software: Profiling, insights and hands-on analysis, Computer Methods and Programs in Biomedicine. 117(2), 360-382
  37. Zin, S. M., Anuar, N. B., Kiah, M. L. M., Pathan, A. S. K. (2014). Routing protocol design for secure WSN: Review and open research issues, Journal of Network and Computer Applications. 41, 517-5301084-8045.
  38. Khan, A. N., Kiah, M. L. M., Madani, S. A., Khan, A. U. R., Ali, M. (2013). Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing, Journal of Supercomputing. 66(3), 1687-1706
  39. Kiah, M. L. M., Nabi, M. S., Zaidan, B. B., Zaidan, A. A. (2013). An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1, Journal of Medical Systems. 37(50148-5598. )
  40. Zakaria, W. Z. A., Kiah, M. L. M. (2013). A review of dynamic and intelligent honeypots, Scienceasia. 39, 1-5
Scopus
  1. Alshahrani N.M., Kiah M.L.M., Zaidan B.B., Alamoodi A.H., Saif A. (2023). A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations, Computers, Materials and Continua. 75(2), 2833-2858. doi:10.32604/cmc.2023.036138
  2. Binbeshr F., Por L.Y., Kiah M.L.M., Zaidan A.A., Imam M. (2023). Secure PIN-Entry Method Using One-Time PIN (OTP), IEEE Access. 11, 18121-18133. doi:10.1109/ACCESS.2023.3243114
Others
  1. Mahmood, A., Kiah, M.L.M., Azzuhri, S.R., Kamal, M.M., Eldabi, T., Qureshi, A.N., Azizul, Z.H. and Z aba, M.R., 2021. Wireless backhaul network s capacity optimization using time series forecasting approach. Journal of Ambient Intelligence and Humanized Computing, pp.1-12.
  2. Fawad Ali Khan, Rafidah Md Noor*, Miss Laiha Binti Mat Kiah, Noorzaily Mohd Noor, Saleh M. Altowaijri, Atiq Ur Rahman, QoS Enabled Layered based Clustering for Reactive Flooding in Internet of Things, Symmetry (IF = 1.256 Q2), (2019) (Accepted)
  3. Shaik Shabana Anjum, Rafidah Md Noor, Nasrin Aghamohammadi, Ismail Ahmedy, Miss Laiha Mat Kiah, Nornazlita Hussin, Mohammad Hossein Anisi and Muhammad Ahsan Qureshi, Modelling Traffic Congestion based on Air Quality for Greener Environment: An Empirical Study, Vol. 7, Issue 1, December 2019, IEEE Access (IF=3.557,Q1)
  4. Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. Kiah, S. Iqbal and Mohamed Abdulnabi. (2018). A security framework for mHealth apps on Android platform. Computers & Security. 75, 191-217. [Q1-ISI]
  5. Salman Iqbal, Miss Laiha Mat Kiah & Babak Daghighi. DM-GKM: A key management scheme for dynamic group based applications. Wireless Personal Communications Journal. [UNDER-REVIEW]
  6. Salman Iqbal, Miss Laiha Mat Kiah, Aws Alaa & Babak Daghighi. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients. Journal of Health and Technology. Online first on 30 Aug 2018. p1-19.
  7. Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, Reza Ismail. (2018). Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey. International Journal on Advanced Science Engineering Information Technology, 8(4-2).
  8. Daghighi, B. Mat Kiah, M.L. Iqbal, S. Ur Rehman, M.H. & Martin, K. (2017). Host mobility key management in dynamic secure group communication. Wireless Networks, 23(147), 1-19.
  9. Mohamed Abdulnabi, Ahmed Al-Haiqi, M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan, Muzammil Hussain. (2017). A Distributed Framework for Health Information Exchange Using Smartphone Technologies. Journal of Biomedical Informatics, 69, 230-250. [Q1-ISI]
  10. Mussab, Alaa. Zaidan, A.A. Zaidan, B.B. Mohammed, Talal & Kiah, M.L.M. (2017). A review of smart home applications based on Internet of Things. Journal of Network and Computer Applications, 97, 48-65.
  11. Shu Yun Lim. M.L Mat Kiah. Tan Fong Ang. (2017). Security Issues and Future Challenges of Cloud Service Authentication. Acta Polytechnica Hungarica (Journal of Applied Sciences), 14(2). [ACCEPTED] DOI: 10.12700/APH.14.2.2017.2.4
  12. Igbal, S. Mat Kiah, M.L. Daghighi, B. Hussain, M. Khan, S. Khan, M.K. & Choo, K.K.R. 2016. On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications. [Q1-ISI]
  13. Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab and Suleman Khan. (2016). Service Delivery Models of Cloud Computing: Security Issues and Open Challenges. Security and Communication Networks.
  14. Saybani, M.R. Wah, T.Y. Aghabozorgi, S.R. Shamshirband, S. Mat Kiah, M.L. & Balas, V.E. 2015. Diagnosing Breast Cancer with an Improved Artificial Immune Recognition System. Soft Computing. [ISI-Q2]
  15. A.A. Zaidan, B.B. Zaidan, Ahmed Al-Haiqi, M.L.M. Kiah, Hussaen Muzamel & Mohamed Abdulnabi. 2015. Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS. Journal of Biomedical Informatics 53:390- 404. [ISI-Q1]
  16. A.A. Zaidan, B.B. Zaidan, Muzammil Hussain, Ahmed Haiqi, M.L. Mat Kiah & Mohamed Abdulnabi. 2015. Multi- Criteria Analysis for OS-EMR Software Selection Problem: A Comparative Study. Decision Support Systems 78:15-27. [ISI-Q1]
  17. A.A. Zaidan, H.Abdul Karim, N.N. Ahmad, B.B. Zaidan & M.L. Mat Kiah. 2015. Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning. Journal of Circuits, Systems and Computers 24(2). [ISI-Q4]
  18. Abdul Nasir Khan, M.L. Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband & Atta ur Rehman Khan. 2015. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. Journal of Grid Computing 13(4):651-675. [ISI-Q1/Q2]
  19. Altameem, T. A., Nikolic, V., Shamshirband, S., Petkovic, D., Javidnia, H., Kiah, M. L. M., Gani, A. 2015. Potential of support vector regression for optimization of lens system Computer-Aided Design
  20. B.B. Zaidan, Ahmed Haiqi, A.A. Zaidan, Mohamed Abdulnabi, M. L. Mat Kiah & Hussaen Muzamel. 2015. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy. Journal of Medical Systems 39:51. [ISI-Q2]
  21. Benyamin Khoshnevisan, Elham Bolandnazar, Shahaboddin Shamshirband, Hanifreza Motamed Shariati, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2015. Decreasing environmental impacts of cropping systems using LCA and multi-objective genetic algorithm. Journal of Cleaner Production 86:67-77. [ISI-Q1]
  22. Dalibor Petkovic, Shahaboddin Shamshirband, Nor Badrul Anuar,Sareh Naji, Miss Laiha Mat Kiah & Abdullah Gani. 2015. Adaptive neuro-fuzzy evaluation of wind farm power production as function of wind speed and direction. Stochastic Environmental Research and Risk Assessment 29:793- 802. [ISI-Q1]
  23. Mahmoud Reza Saybani, Shahaboddin Shamshirband, Shahram Golzari, Teh Ying Wah, Saeed Reza Aghabozorgi, Miss Laiha Mat Kiah & Valentina Emilia Balas. 2015. RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system. Medical & Biological Engineering & Computing. [Accepted] [ISI-Q2]
  24. Milan Proti, Shahaboddin Shamshirband, Dalibor Petkovi, Almas Abbasi, Miss Laiha Mat Kiah, Jawed Akhtar Unar, Ljiljana ivkovi & Miomir Raos. 2015. Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm. Energy 87:343- 351. [ISI-Q1]
  25. Muzammil Hussain, Ahmed Al-Haiqi, A.A. Zaidan, B.B. Zaidan, M.L.M. Kiah, Nor Badrul Anuar & Mohamed Abdulnabi. 2015. The Landscape of Research on Smartphone Medical Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations. Computer Methods and Programs in Biomedicine 122 (3):393-408. [Q1-ISI]
  26. Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband & Steven Furnell. 2015. A systematic review of approaches to assessing Cybersecurity awareness. Kybernetes 44 (4):606-622. [ISI-Q4]
  27. Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ismail Ahmedy. 2015. Survey of secure multipath routing protocols for WSNs. Journal of Network and Computer Applications 55:123-153. [ISI-Q1]
  28. Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad A. Madani, Atta ur Rehman Khan & Shahaboddin Shamshirband. 2014. BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment. Journal of Supercomputing 70(2):946-976. [ISI-Q2]
  29. Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan & Shahab Shamshirband. 2014. Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment. Journal of Supercomputing 68(2): 624-651. [ISI-Q2]
  30. Afshin Jahangirzadeh,Shahaboddin Shamshirband,Saeed Aghabozorgi, Shatirah Akib,Hossein Basser, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier. Neurocomputing 140(22):172-184. [ISI-Q2]
  31. Babak Daghighi & Miss Laiha Mat Kiah. 2014. A Group Key Management Scheme in Wireless Mobile Environment. ScienceAsia Journal. [Accepted] [ISI-Q3]
  32. Daghighi, B., Kiah, M. L. M., Shamshirband, S., & Rehman, M. H. U. 2014. Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. Journal of Network and Computer Applications 50:1-14. [ISI-Q1]
  33. Dalibor Petkovi , Shahaboddin Shamshirband, Javed Iqbal, Nor Badrul Anuar, Nenad D. Pavlovi & Miss Laiha Mat Kiah. 2014. Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper. Applied Soft Computing 22:424-431. [ISI-Q1]
  34. Dalibor Petkovi, Shahaboddin Shamshirband, Nenad Pavlovi, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology. Optics and Spectroscopy. [ISI-Q4]
  35. Dalibor Petkovic, Shahaboddin Shamshirband, Nenad D. Pavlovic, Abdullah Gani & Miss Laiha Mat Kiah. 2014. Kinetostatic analysis of passively adaptive robotic finger with distributed compliance. Advances in Mechanical Engineering. [ISI-Q2]
  36. Ehsan Daryabeigi, Ali Zafari,Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm. International Journal of Electrical Power & Energy Systems 61:326- 334.[ISI-Q1]
  37. H.O. Alanazi, A.A. Zaidan, B.B. Zaidan, M.L. Mat Kiah & S.H. Al-Bakri. 2014. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. Journal of medical systems 39:165. [ISI-Q2]
  38. M.L.M. Kiah, B.B Zaidan, A.A.Zaidan, Mohamed Nabi & Rabiu Ibraheem. 2014. MIRASS: Medical Informatics Research Activity Support System using Information Mashup Network. Journal of Medical Systems 38 (37):1-15. [ISI-Q2]
  39. M.L.Mat Kiah, S.H. Al-Bakri, A.A. Zaidan, B.B. Zaidan & Muzammil Hussain. 2014. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture. Journal of Medical Systems. [ISI-Q2]
  40. Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ajith Abraham. 2014. Cooperative Game Theoretic Approach using Fuzzy Q-learning for Detecting and Preventing Intrusions in Wireless Sensor Networks. Engineering Applications of Artificial Intelligence 32:228-241. [ISI-Q1]
  41. Shahaboddin Shamshirband, Amineh Amini, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ying Wah Teh & Steven Furnell. 2014. D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55: 212-226. [ISI-Q2]
  42. Shahaboddin Shamshirband, Dalibor Petkovi , Nor Badrul Anuar, Miss Laiha Mat Kiah, Shatirah Akib, Abdullah Gani, arko ojba i & Vlastimir Nikoli . 2014. Sensorless estimation of wind speed by adaptive neuro-fuzzy methodology. International Journal of Electrical Power & Energy Systems 62:490- 495. [ISI-Q1]
  43. Shahaboddin Shamshirband, Dalibor Petkovi , arko ojba i , Vlastimir Nikoli , Nor Badrul Anuar, Nor Liyana Mohd Shuib, Miss Laiha Mat Kiah & Shatirah Akib. 2014. Adaptive neuro-fuzzy optimization of wind farm project net profit. Energy Conversion and Management. [ISI-Q1]
  44. Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Sanjay Misra. 2014. Anomaly Detection using Fuzzy Q-learning Algorithm in Wireless Network. Acta Polytechnica Hungarica. [ISI-Q3]
  45. Shahaboddin Shamshirband, Mohd Rashid Mohd Radzi, Saeed Aghabozorgi, Sanjay Misra, Shatirah Akib & Miss Laiha Mat Kiah. 2014. Potential of Support Vector Regression for Forcasting of Stream Flow. Tehnicki Vjesnik 21(5):1017-1024. [ISI-Q3]
  46. Shahaboddin Shamshirband, Nor Badrul Anuar, Babak Daghighi, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham. 2014. Co-FQL :Anomaly Detection Using Cooperative Fuzzy Q-learning in Network. Journal of Intelligent Fuzzy Systems. [ISI-Q3]
  47. Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovi , Sanjay Misra & Abdul Nasir Khan. 2014. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. Journal of Network and Computer Applications 42:102- 117. [ISI-Q1]
  48. Shamshirband S, Hessam S, Javidnia H, Amiribesheli M, Vahdat S, Petkovic D, Gani A, Kiah MLM. 2014. Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System. International Journal of Medical Science. 11(5):508-514. [ISI-Q1]
  49. Shamshirband, S., Petkovi , D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., ojba i , ., Nikoli , V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81:520 526. [ISI-Q1]
  50. Shamshirband, S., Petkovi, D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., Cojbasic, Z., Nikolic, V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81: 520-526. [ISI-Q1]
  51. Shamshirband,S., Petkovic, D., Amini, A., Anuar, N.B., Nikolic, V., Cojbasic, Z., Mat Kiah, M.L. & Gani, A. 2014. Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission. Energy 67:623-630. [ISI-Q1]
  52. Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan & Mazhar Ali. 2013. Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing. Journal of Supercomputing 66(3):1687-1706. [ISI-Q2]
  53. Dalibor Petkovi , Nenad T. Pavlovi , Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Mohd Yamani Idna Idris. 2013. Adaptive neuro-fuzzy estimation of optimal lens system parameters. Optics and Lasers in Engineering 55:84-93. [ISI-Q2]
  54. Dalibor Petkovi, arko jba I, Vlastimir Nikoli, Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Ainuddin Wahid Abdul Wahab. 2013. Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission. Energy 64:868-874. [ISI-Q1]
  55. M.L Mat Kiah, Mohamed S.Nabi, B.B Zaidan & A.A Zaidan. 2013. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP-XML and SHA-1. Journal of Medical Systems 37:9971. [ISI-Q2]
  56. Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ahmed Patel. 2013. An Appraisal and Design of Multi Agent Systems Based on Cooperative Wireless Intrusion Detection Computational Intelligence Techniques. Engineering Applications of Artificial Intelligence 26(9):2105-2127. [ISI-Q1]
  57. Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2013. A review of dynamic and intelligent honeypot. ScienceAsia Journal 39(1):1-5. [ISI-Q3]
  58. Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan & Sajjad A. Madani. 2012. Towards Secure Mobile Cloud Computing: A Survey. Future Generation Computer Systems 29(5):1278-1299. [ISI-Q1]
  59. Liana Khamis Qabajeh, Miss Laiha Mat Kiah, Mohammad Moustafa Qabajeh. 2012. A More Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. Security and Communication Networks 6(3):286-308. [ISI-Q4]
  60. B.B.Zaidan, A.A. Zaidan, M.L. Mat Kiah. 2011. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: Review, Participates Opinion and Expert Concerns. International Journal of Pharmacology 7(3):382-387.[ISI-Q4]
  61. M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan, A. Mohammed Ahmed & Sameer Hasan Al-bakri. 2011. A review of audio based steganography and digital watermarking. International Journal of the Physical Sciences 6 (16):3837-3850. [ISI-Q2]
  62. Qabajeh, L., Mat Kiah, M. L. & Qabajeh, M. 2011. Secure Unicast Position-Based Routing Protocols for Ad- Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences) 8(6):191-214. [ISI-Q3]
  63. Sameer Hasan Al-Bakri, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan & Gazi Mahabubul Alam. 2011. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences 6(4):930-938. [ISI-Q2]
  64. B. B. Zaidan, A. A. Zaidan, Alaa Taqa, Gazi Mahabubul Alam, M. L. Mat Kiah & Hamid Jalab. 2010. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. International Journal of the Physical Sciences 5(11):1796-1806. [ISI-Q2]
  65. Gazi Mahabubul Alam, M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan and Hamdan O. Alanazi. 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Scientific Research and Essays 5(21):3254-3260.[ISI-Q3]
  66. Hamdan O. Alanizi, M. L. Mat Kiah, A.A.Zaidan, B.B.Zaidan & G.M. Alam. 2010. Secure Topology for Electronic Medical Record Transmissions. International Journal of Pharmacology 6(6):954-958. [ISI-Q4]
  67. Miss Laiha Mat Kiah, Liana Khamis Qabajeh, Mohammad Moustafa Qabajeh. 2010. Unicast Position-Based Routing Protocols for Ad-Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences, ISSN: 17858860)7(5):19-46.[Q3-SCI][JCR2010]
  68. Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B. Zaidan and A.A. Zaidan. 2010. A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. Journal of Applied Sciences 10(1): 59-64.
  69. Mohamed S. A.Nabi, M.L. Mat Kiah, B.B. Zaidan, A.A. Zaidan & G.M. Alam. 2010. Suitability of SOAP Protocol in Securing Transmissions of EMR Database. International Journal of Pharmacology 6(6):959-964. [ISI-Q4]
  70. Por Lip Yee & Miss Laiha Mat Kiah. 2010. Shoulder Surfing Resistance Using PENUP Event and Neighboring Connectivity Manipulation. Malaysian Journal of Computer Science 23(2):121-140.[Q4-SCI][JCR2010]
  71. Saman Mirza Abdulalla, Laiha Mat Kiah & Omar Zakaria. 2010. A biological model to improve PE malware detection: Review. International Journal of the Physical Sciences 5(15): 2236-2247. [Q2-SCI][JCR2010]
  72. Sameer Hasan Al-bakri & M. L. Mat Kiah. 2010. A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Scientific Research and Essays 5(22):3455-3466.[ISI- Q3]
  73. Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Scalable and Secure Position- Based Routing Protocol for Ad-Hoc Networks. Malaysian Journal of Computer Science (ISSN 0127- 9084) 22(2):99- 120. [Q4-SCI]
  74. Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks. International Journal of Computer Science and Network Security (IJCSNS) 9(2): 131-140.
  75. Mat Kiah, M.L. & Martin, K.M. 2008. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and Its Applications (IJSIA) 2(1):39-52.
Books
  1. Salman Iqbal & Miss Laiha Mat Kiah. (2017). Secure Group Communication Protocols in Wireless Mobile Environment. LAP LAMBERT Academic Publishing.
  2. Omar Zakaria and Miss Laiha Mat Kiah (2002), Pengenalan Kepada Keselamatan Komputer (An Introduction to Computer Security), Mc-Graw Hill (M) Sdn Bhd.
Chapter in Books
  1. Liana K. Qabajeh, Miss Laiha Mat Kiah & Mohammad M. Qabajeh. 2011. A Survey of Position-Based Routing Protocols for Ad-Hoc Networks. (DOI: 10.1007/978-1- 84996-510-1_4). Book chapter in Application and Multidisciplinary Aspects of Wireless Sensor Networks: Concepts, Integration, and Case Studies, Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic and Roman Trobec (ISBN 976-1-84996-509-5), Part 1, pp. 47-83, Springer.
Article in Proceeding
  1. Atif Mahmood, Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Adnan N. Qureshi. 2018. Wireless Backhaul Network Optimization Using Automated KPIs Monitoring System Based on Time Series Forecasting. World Symposium on Communication Engineering 2018, ISBN 978-1-5386-7985-2.
  2. Chowdhury, F.Z., Idris, M. Y, Mat Kiah, M.L, Ahsan, M. A. 2017. EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing. In the Proceeding of 8th IEEE Control and System Graduate Research Colloquium, 4-5th Aug 2017 Shah Alam, Selangor, Malaysia.
  3. M.L.M. Kiah, Ahmed Haiqi, B.B. Zaidan, A.A. Zaidan & Mohamed Abdulnabi. 2015. Open Source EMR Software: How to Select the Best Software?. Proceeding of 3rd International Conference on Information and Computer Networks (ICICN).
  4. Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani. 2013. A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments. IEEE Symposium on Wireless Technology and Applications (ISWTA 2013), September 22-25, 2013, at Pullman Kuching Hotel, Malaysia.
  5. Nabi, M. S., Mat Kiah, M. L., Zaidan, A. A., & Zaidan, B. B. 2013. Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. In Future Generation Communication Technology (FGCT), 2013 Second International IEEE Conference. 93- 97.
  6. Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2013. Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning. Kaspersky s CyberSecurity for the Next Generation, National University of Singapore, Republic of Singapore, 21 - 23 March 2013.
  7. Hossein Javidnia,Shahaboddin Shamshirband & Miss Laiha Mat Kiah. 2012. Cooperative Multi-agent System Based on Fuzzy Quantum Cryptography. International Conference on Electrical, Computer, Electronics & Biomedical Engineering(ICECEBE 2012). Bangkok, Thailand.
  8. S. M. Abdulla, M. L. Mat Kiah & O. Zakaria. 2012. Minimizing Errors in Identifying Malicious API to Detect PE Malwares Using Artificial Costimulation. International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE'2012), pg. 49-54.
  9. Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2012. A Review on Artificial Intelligence Techniques for Developing Intelligent Honeypot. International Conference on Next Generation Information Technology (ICNIT2012). Seoul, Korea.
  10. Mat Kiah, M.L., Daghighi, B.,& Albakri, S. 2011. An Implementation of Group Key Management in a Wireless Environment. International Conference on Electronics, Networks and Computer (ICENC 2011), Kuala Lumpur, Malaysia.
  11. Daghighi, B., Mat Kiah, M.L.& Afkhami, S. 2010. Group Key Management Using Public Key Exchange. International Conference on Intelligent network & Computing, Malaysia.
  12. Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2010. A Scalable and Secure Position- Based Routing Protocol for MANETs. Proceedings of the Annual International Conference on Network Technologies & Communication (NTC 2010), 29-30th November, Phuket Beach Resort, Thailand, pp. N7-N12.
  13. Daghighi, B.,& Mat Kiah, M.L. 2009. Secure Group Communication Using Public Key Exchange. In the Proceeding of 3rd International Conference on Informatics and Technology, 27 - 28th Oct 2009 Kuala Lumpur, Malaysia.
  14. L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable Secure Routing Protocol for MANETs. Proceedings of The International Conference on Computer Technology and Development (ICCTD 2009), pp.143-147, 13-15 Nov, Kota Kinabalu, Malaysia. (Indexed by Ei Compendex and ISI)
  15. L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable, Distributed and Secure Routing Protocol for MANETs. Proceedings of the International Conference on Computer Engineering and Applications (ICCEA 2009), pp. 51-56, 6-8 June 2009, Manila, Philippine. (Indexed by Ei Compendex and Thomson ISI)
  16. Mohamed Elsadig Eltahir, Miss Laiha Mat Kiah, Bilal Bahaa Zaidan & Aos Alaa Zaidan. 2009. High Rate Video Streaming Steganography. International Conference on Future Computer and Communication, pp 550-553.(Indexed by EI Compendex, INSPEC, Thomson ISI, IEEE XploreTM,IEEE Computer Society digital libraries)
  17. Nor Aniza Abdullah, Safinaz Mustapha, Miss Laiha Mat Kiah. 2009. A Requirement Framework For Livestock Farming Web Service Application. Proceeding of the 3rd International Conference on Informatics and Technology, 27 - 28th October, Kuala Lumpur Malaysia.
  18. Miss L. Mat Kiah and Keith M. Martin. 2007. Secure Multicast: Investigating the Different Challenges between Internet and Mobile Environments. In Proceeding of M2USIC 2007, 19 & 20th Nov 2007, Hilton Hotel PJ, Malaysia.
  19. Miss Laiha Mat Kiah & Keith Martin. 2007. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. Proceeding of International Conference on Future Generation Communication Networking,06-08 Dec 2007, Jeju Island South Korea, Vol. 1, pg 99-106.
  20. MatKiah, M. L. and Martin, K. M. (2006). A generic group key management framework for group communication in wireless mobile environments. In Proceedings of the Sixth International Network Conference (INC2006), pp. 347-354.
  21. MatKiah, M. L. and Martin, K. M. (2005). Group communication: Design challenges in the development of key management frameworks in wireless mobile environments. In Proceedings of International Conference on Security and Management (SAM'05), pp. 385-390. Las Vegas, USA.
Other Publications
  1. Hussain, A., Luqman, W., Anuar, N. B., Kiah, M. L. M., & Kumar, S. (2018). Digital Rights Management for Cloud Based Storage Providers. Technical Report. Universiti Malaya, Kuala Lumpur, Malaysia. - Technical Report
  2. Zamanian, A., Feizollah, A., Anuar, NB., Kiah, M. L. M., Srikanth, K., and Kumar, S. (2017). Anomaly Detection in Policy Authorisation Activity Log. Technical Report, Universiti Malaya, Kuala Lumpur, Malaysia. - Technical Report

RESEARCH INTEREST


  • Network Security (secure routing, wireless and mobile security, cybersecurity)
  • Security Systems (security protocols, key management, group communication)
  • Information Security (security management, cryptography, authentication)

RESEARCH PROJECT


National
  1. 2019 - 2023, Fundamental Research Grant Scheme (FRGS)
    Security Of Service-oriented Vehicular Cloud Network Using Group Signatures For Intelligent Transportation Systems ( Co-Researcher)
  2. 2019 - 2023, Fundamental Research Grant Scheme (FRGS)
    An Improved Solution On Sidechain Manipulation For Secure And Scalable Ethereum's Blockchain ( Principal Investigator(PI))
  3. 2019 - 2023, Fundamental Research Grant Scheme (FRGS)
    A Secure And Flexible Authenticated Encryption Schemes ( Co-Researcher)
  4. 2020 - 2023, Fundamental Research Grant Scheme (FRGS)
    A Framework For A Multilingual Language Identification In Conversational Speech ( Co-Researcher)
  5. 2021 - 2023, Others MOHE
    Small Medium Enterprise's Internet Of Things (iot) Threats Landscape, Talent Development And Strategic Framework ( Principal Investigator(PI))
  6. 2019 - 2022, Fundamental Research Grant Scheme (FRGS)
    Bring Your Own Device (byod) Security Policy Compliance Framework For The Malaysia Public Sector ( Co-Researcher)
  7. 2018 - 2021, RU Geran - Fakulti Program
    Healthcare Meets Big Data: Security And Privacy Protection ( Co-Researcher)
  8. 2019 - 2021, Fundamental Research Grant Scheme (FRGS)
    Prevent Password Reconstruction Attack For Cyber Security Authentication Using Knowledge-based Method ( Co-Researcher)
  9. 2019 - 2021, Government Agency
    Centre For Reseach In Industry 4.0 (cr14.0) ( Co-Researcher)
  10. 2020 - 2021, KW PNC(JIM)
    Mobile Patient Health Record (mphr) ( Principal Investigator(PI))
  11. 2018 - 2020, Partnership Grant
    Smart And Security Enhanced Transportation Ecosystem For A Future Sustainable Smart City ( Co-Researcher)
  12. 2018 - 2020, Bantuan Kecil Penyelidikan (BKP)
    Wireless Backhaul Network Planning and Optimization Techniques Based on Deep Learning Algorithms ( Co-Researcher)
  13. 2018 - 2019, Partnership Grant
    Anomaly Detection in Policy Authorization Activity Logs ( Principal Investigator(PI))
  14. 2018 - 2019, UM Community Campus-Manage by UMCARES
    Decentralization Of Laboratory Exercise Via Remote Application: A State-of-the-art Approach Toward Efficient Educational Facility Resource And Energy Management In Academic Institutions ( Co-Researcher)
  15. 2018 - 2019, RU Geran - Fakulti Program
    Dynamic Value Approach to Address Factory Default and Reset Vulnerabilities on IoT Devices ( Principal Investigator(PI))
  16. 2018 - 2019, RU Geran - Fakulti Program
    The Investigation into Permutation Property of Block Ciphers ( Co-Researcher)
  17. 2015 - 2018, Grand Challenge - SUS (Sustainability Science)
    Modelling And Governing Traffic Congestion: Air Quality,emission, & Traffic Use ( Co-Researcher)
  18. 2013 - 2016, MOSTI-Science Fund
    Secure Group Communication For Critical National Information Infrastructur (cnii) ( Principal Investigator(PI))
  19. 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG)
    AN IMPLEMENTION OF SECURE GROUP COMMUNICATION ( Principal Investigator(PI))
  20. 2010 - 2011, Postgraduate Research Grant (PPP) - Research
    A SCALABLE, DISTRIBUTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS ( Main Supervisor)
  21. 2009 - 2010, Postgraduate Research Grant (PPP) - Research
    A SCALABLE, DISTRIBTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS ( Main Supervisor)
  22. 2009 - 2010, Postgraduate Research Grant (PPP) - Research
    PUBLIC KEY INFRASTRUCTURE FOR SECURE MOBILE MESSAGIN USING ELLIPTIC CURVE CRYPTOSYSTEM ( Main Supervisor)
  23. 2013 - 2016, ScienceFund
    Secure Group Communication for Critical National Information Infrastructure ( Principal Investigator(PI))
  24. 2012 - 2015, High Impact Research (HIR)
    Implementation of Secure Framework for Electronic Medical Records (EMRs) ( Principal Investigator(PI))
  25. 2011 - 2013, Geran Penyelidikan Universiti Malaya (UMRG)
    Deployment of Virtual Honeypots ( Principal Investigator(PI))
  26. 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG)
    An Implemetation of Secure Group Communication ( Principal Investigator(PI))
  27. 2010 - 2011, Special Fund
    Information and Communication Security ( Principal Investigator(PI))
  28. 2008 - 2010, Short Term Research Fund (Vote F)(PJP)
    Secure Routing Protocols for Large Mobile Ad-Hoc Networks ( Principal Investigator(PI))
Private
  1. 2017 - 2019, Private Funding
    Drm For Cloud Based Storage Providers ( Principal Investigator(PI))
  2. 2017 - 2019, Private Funding
    Anomaly Detection In Policy Authorization Activity Logs ( Co-Researcher)
International
  1. 2019 - 2022, International Funding
    Implementation And Utilites Of Rdap For Wider Usability Among Internet Stakeholders ( Principal Investigator(PI))
  2. 2019 - 2022, Fundamental Research Grant Scheme (FRGS)
    Security of Service-Oriented Vehicular Cloud Network using Group Signatures for Intelligent Transportation Systems ( Consultant)
  3. 2018 - 2020, Faculty Research Grant (FRG)
    Healthcare meets Big Data: Security and Privacy Protection ( Consultant)

CONSULTANCY PROJECT


  • Cisco Netriders Competition 2011, TAR College
    01 Apr 2011 - 01 Apr 2011 (National)
  • Ahli Akademik Sebagai Panel Penemuduga Hlp Sessi 2012, JPA
    01 Apr 2011 - 01 Apr 2011 (National)
  • Cisco Competition 2009, UniKL
    01 Dec 2009 - 01 Dec 2009 (National)

PAPER PRESENTED


PLENARY SPEAKER
  1. Towards Realizing My-Health Nationwide System: A Proposal on Health Information Exchange (HIE), Fifth World Congress of Computing, Engineering and Technology (WCET) and Society of Digital Information and Wireless Communications (SDIWC), The Society of Digital Information and Wireless Communications (International) (06 Sep 2016 - 08 Sep 2016)
INVITED SPEAKER
  1. Threat Modelling, CYBER SECURITY TECHNICAL RESEARCH WORKSHOP SEBAGAI PANEL SUBJECT MATTER EXPERT , UNITEN (University) (19 Feb 2020 - 19 Feb 2020)
  2. Technical Writing for High Impact Publication, Bengkel Penulisan Manuskrip dan Penerbitan Berimpak Tinggi, FSKTM UPM (University) (23 Dec 2019 - 24 Dec 2019)
  3. Writing Impact Papers, Bengkel Penulisan Jurnal Fakulti Teknologi dan Sains Maklumat, FTSM UKM (University) (19 Apr 2019 - 19 Apr 2019)
  4. How to Keep Motivated as First Class Students?, Motivational Seminar for First Class Students, FSKTM (Others) (02 Nov 2018 - 02 Nov 2018)
  5. Enriching Supervision Skills: What makes a good research supervisor?, Supervision and Academic Writing Workshop, Multimedia Unit, FSKTM (Others) (23 Mar 2018 - 23 Mar 2018)
  6. How to Write an Effective Technical Paper, Technical Writing Workshop 2017, CSM (National) (28 Mar 2017 - 28 Mar 2017)
ORAL PRESENTER
  1. Smart Contract Evaluation By Multi-Criteria Analysis: Selection Challenges And Open Issues, a Review, eSmarTA2023, Taiz University (International) (10 Oct 2023 - 11 Oct 2023)
  2. ETHEREUM BLOCKCHAIN IN HEALTHCARE: AN IMPROVED FRAMEWORK, eTELEMED 2023, IARIA (International) (24 Apr 2023 - 28 Apr 2023)
  3. A MALAY-ENGLISH CODE-SWITCHING BILINGUAL ASR SYSTEM, International Conference on Language Computing and Speech Processing (ICLCSP-23), Institute for Scientific and Engineering Research (ISER) (International) (07 Apr 2023 - 07 Apr 2023)
  4. Mobile Personal Health Record - SPHERE, PROGRAM MyTECH PITCH BIL. 8/2021 KEMENTERIAN SAINS, TEKNOLOGI DAN INOVASI (MOSTI), MOSTI (National) (07 Dec 2021 - 07 Dec 2021)
POSTER PRESENTER
  1. A Scientific Search Engine Based on Data Mashup, The Digital Education Show Asia 2014, MDEC  (International) (27 May 2014 - 28 May 2014)
PRESENTER
  1. mPhR - Mobile Personal Health Record via Smartphone Technology, Progress Report Presentation UMDT Programme, UMCIC (UMDT Programme) (University) (28 Sep 2020 - 28 Sep 2020)
  2. mPhR: Mobile Personal Health Records using Smartphone Technology, UM Start-up Co-Founder Search Day, UMCIC UM (University) (09 Mar 2020 - 09 Mar 2020)
  3. Open Source EMR Software: How to Select the Best Software?, 3rd International Conference on Information and Computer Networks (ICICN 2015), ICICN (International) (19 Mar 2015 - 20 Mar 2015)
  4. Suitability of Adopting S/MIME and OpenPGP Email Messages Protocol to Secure Electronic Medical Records, Second International Conference on Future Generation Communication Technologies, British Computer Society (International) (12 Dec 2013 - 14 Dec 2013)
OTHERS
  1. Leaders in Innovation Fellowships Programme for Commercialization & Enterpreneurship, Leaders in Innovation Fellowships, Royal Academy of Engineering & Newton Fund (International) (04 Dec 2017 - 15 Dec 2017)
  2. EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing, 8th IEEE Control and System Graduate Research Colloquium, UiTM (International) (04 Aug 2017 - 05 Aug 2017)
  3. Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning, Kaspersky s CyberSecurity for the Next Generation, FIRA (International) (26 Sep 2013 - 27 Dec 2013)

ACADEMIC/PROF. SERVICES


Evaluation
  1. (2024) Penilai Luar Program Sains Komputer & Rangkaian, National, (External Assessor)
  2. (2024) AJK Tapisan Fsss Kenaikan Pangkat (Vk7&Ds54), University, (External Evaluator)
  3. (2024) Panel Assessor for Programme Accreditation, National, (External Assessor)
  4. (2024) Academic Advisor for Phd Programme, National, (External Assessor)
  5. (2024) Peer Committee for Promotion Exercise - Academic, National, (External Assessor)
  6. (2024) AJK Penasihat Luar Program Akademik Sarjana Muda (Keselamatan Siber), National, (External Evaluator)
  7. (2024) AJK Pengajian Program (Jkpp) Master Keselamatan Maklumat, National, (External Assessor)
  8. (2024) Member of Board of Studies - Bachelor of Cs Programme, National, (External Assessor)
  9. (2024) External Assessor of Academic Programme Master of Protective Security Management, National, (External Assessor)
  10. (2023) Judge for Preliminary Round of Blockchain for Social Good Hackaton Event, National, (External Evaluator)
  11. (2023) Panel Penilai Bagi Kenaikan Pangkat Vk7, National, (External Assessor)
  12. (2023) Panel Penilai Bagi Kenaikan Pangkat Ds54, National, (External Assessor)
  13. (2023) Panel Penilai Bagi Kenaikan Pangkat Ds54, National, (External Assessor)
  14. (2023) Secure Access Control Using Modified Ciphertext Policy Attribute-Based Encryption With Performance Optimization in Cloud Computing, National, (External Examiner)
  15. (2023) Panel Penilai Geran Frgs (ICT), National, (External Assessor)
  16. (2023) Chief Assessor for Master of it Programme, National, (External Assessor)
  17. (2023) AJK Kesepakaran Bagi Kenaikan Pangkat Vk7 & Ds54, National, (External Assessor)
  18. (2023) External Examiner for Bcs Data Science Programme, National, (External Assessor)
  19. (2023) Panel of Assessor for Academic Programme - Mit, National, (External Assessor)
  20. (2023) Pemeriksa Luar Program Ijazah Sarjana Muda Sains Komp (Keselamatan Komputer), National, (External Assessor)
  21. (2023) Penilai Luar Akademik, National, (External Assessor)
  22. (2022) Penilai Luar Kertas Soalan Exam dan Skrip Peperiksaan Akhir Program Sarjana Muda dan Diploma, National, (External Assessor)
  23. (2022) Peer Review Matching Grant UM-Just, University, (Reviewer)
  24. (2022) Trusted Task Offloading Using Fog Computing for Internet of Vehicles, University, (Internal Examiner)
  25. (2022) A Protection Behaviour Model for Bring Your Own Device, National, (External Examiner)
  26. (2022) Modelling and Designing Internet of Things Security Solution for E-Commerce, National, (External Examiner)
  27. (2022) Penilai Luar Kenaikan Pangkat Profesor, National, (External Assessor)
  28. (2022) External Evaluator for Professorship Appointment - Candidate 2, International, (External Evaluator)
  29. (2022) External Evaluator for Professorship Appointment - Candidate 1, International, (External Evaluator)
  30. (2022) External Evaluator for Professorship Appointment - Candidate 7, International, (External Evaluator)
  31. (2022) External Evaluator for Professorship Appointment - Candidate 3, International, (External Evaluator)
  32. (2022) External Evaluator for Professorship Appointment - Candidate 4, International, (External Evaluator)
  33. (2022) External Evaluator for Professorship Appointment - Candidate 6, International, (External Evaluator)
  34. (2022) External Evaluator for Professorship Appointment - Candidate 5, International, (External Evaluator)
  35. (2022) Locpass: a Graphical Password Method to Prevent Shoulder Surfing, University, (Internal Examiner)
  36. (2022) Design of Improved Vulnerability Prediction Framework for Known Vulnerabilities With Machine Learning Approaches, National, (External Examiner)
  37. (2022) Design of a Smart Portable Farming Kit for Indoor Cultivation Using Raspberry Pi Platform, National, (External Assessor)
  38. (2022) Reliable Epidemic Outbreak Prevention in Opportunistic Iot Based On Optimized Block Chain, National, (External Assessor)
  39. (2022) AJK Kesepakaran Kenaikan Pangkat, National, (External Assessor)
  40. (2022) Exam Moderator Sem2 2021/2022, University, (Internal Evaluator)
  41. (2022) Internal Examiner for Sem2 2021/2022 Examination, University, (Internal Examiner)
  42. (2022) Development of Secure Lightweight Block Cipher Based On 3d Rotation Method for Data Protection On Mobile Application, National, (External Examiner)
  43. (2022) Panel Judge Um3mt Competition Faculty Level, University, (Internal Evaluator)
  44. (2022) Panel Penilai Geran Proposal Frgs Kpt 2022, National, (External Evaluator)
  45. (2022) Panel Penilai Geran Prgs 2022, National, (External Evaluator)
  46. (2022) A Lightweight Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things, University, (Internal Examiner)
  47. (2022) Internal Examiner for Research Project Trends of Ddos Attack During Covid-19 Pandemic, University, (Internal Examiner)
  48. (2022) Penilai Luar Kenaikan Pangkat Vk7, National, (External Assessor)
  49. (2022) Internal Evaluator for Mosti R&D Funds - Ted 1, University, (Internal Evaluator)
  50. (2022) Pemeriksa Luar Program Sarjana Sains (Jaminan Maklumat), National, (External Assessor)
  51. (2022) Panel Penilai Jk Penilaian Dana Penyelidikan Kpt 2022, National, (External Evaluator)
  52. (2022) Pakar Akademik Dalam Negara Bagi Program Bidang Sains Komputer, National, (External Assessor)
  53. (2021) Penilai Soalan Peperiksaan Akhir Sem1 2021/2022, National, (External Assessor)
  54. (2021) Phd Thesis, National, (External Examiner)
  55. (2021) Panel Penilai Geran Frgs, University, (Internal Evaluator)
  56. (2020) BAGI PROGRAM IJAZAH SARJANA MUDA SAINS KOMPUTER (KESELAMATAN KOMPUTER) DENGAN KEPUJIAN , (External Examiner)
  57. (2019) Improving the Accuracy of User Authentication is Public Cloud Computing Through Adoption of Electronic Personal Synthesis Behavior (EPSB), (External Examiner)
  58. (2019) REAL-TIME ANOMALY DETECTION USING CLUSTERING-AWARE OF BIG DATA TECHNOLOGIES, (Internal Examiner)
  59. (2017) 2017 CSM Technical Colloquim (Unpublished Category) , (Reviewer)
  60. (2017) External Assessor for academic promotion to Assoc Prof/Professor , (External Assessor)
  61. (2017) For Academic promotion to Associate Professor/Professor , (External Assessor)
  62. (2017) MILP-Based Approach To Evaluation Of Tweak-Aes-128 Bits Resistant To Related-Key Differential And Boomerang Attacks, (Reviewer)
  63. (2017) External Examiner for Academic Program - Foundation in Computing and Diploma in IT, (External Examiner)
  64. (2017) 2017 CSM Technical Colloquim (Published Category) , (Reviewer)
  65. (2017) Evaluation Panel for Newton-Ungku Omar Fund - Project Research Proposal (2) , (Evaluation Panel)
  66. (2017) Evaluation Panel for Newton-Ungku Omar Fund Research Project Proposal , (Evaluation Panel)
  67. (2017) SECURE DATA COLLECTION USING MOBILE SENSORS IN STATICALLY DEPLOYED SENSOR NETWORKS, (Reviewer)
  68. (2016) Reviewer for JICT (Journal of Information and Communication Technology), (Reviewer)
  69. (2016) Esciencefund proposals, (Panel Penilai Jemputan)
  70. (2016) Expert Panel for Doctoral Consortium, (Expert Panel)
  71. (2016) SECURED IMAGE ENCRYPTION USING RANDOM NUMBERS AND REVERSIBLE DATA HIDING, (External Examiner)
  72. (2016) FRGS proposals, (Panel Penilai Jemputan)
  73. (2016) Paper Reviewer for CSM 2016 Technical Colloquium, (Reviewer)
  74. (2016) Risk Assessment Model for Organizational Information Security, (External Examiner)
  75. (2014) Paper titled 'Study the Reality and Future of the Affordable and Secure Mobile Cloud Computing (SMCC)', (Reviewer)
  76. (2014) PhD thesis on 'Traffic Aware Backoff Scheduling of Low Data Rate Applications in Wireless Body Area Networks', (External Examiner)
  77. (2014) Paper titled 'PROTECTING WIRELESS DATA TRANSMISSION USING WATERMARKING TECHNIQUE APPROACH', (Reviewer)
  78. (2014) Paper titled "Path Loss Simulation in Different Radio Propagation Models with 1.8GHz and 2.6GHz Bands", (Reviewer)
  79. (2014) Master Thesis (Full Research) titled 'SENIBINA KESELAMATAN MULTI-AGEN UNTUK E-LELONG PATUH SYARIAH', (External Examiner)
  80. (2014) Paper titled "Issues Affecting the Adoption of IPv6", (Reviewer)
  81. (2013) PhD Thesis on 'Enhancing Security in Mobile IPv6 with Private Key-based Binding Update Key Protocol', (Internal Examiner)
  82. (2013) Phd Thesis on 'Infrastructure Based Management And Optimization For NEMO Correspondent Registration' , (External Examiner)
  83. (2013) Master Thesis on 'Key Authentication in Closed Communities Using Images', (External Examiner)
  84. (2013) Master Thesis on 'Parallel Chaotic Hash Function Based on the Shuffle-Exchange Network', (External Examiner)
  85. (2013) Master Thesis on 'Kajian Perbandingan Model Gelombang Penyebaran Radio Terhadap Rangkaian 4G' , (External Examiner)
  86. (2012) Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique - Re-Examination, (Internal Examiner)
  87. (2012) M-XKMS: Adaptation of XKMS for Mobile Devices to Secure Short Message Service Using XML Key Management Specification, (Reviewer)
  88. (2012) Research Project for MCS candidate - A Framework to Support Cross-Platform Application Development for Mobile Devices , (Internal Examiner)
  89. (2012) A Generic Relation to Assess Interdependency of QoE and QoS, (Internal Examiner)
  90. (2012) Development of High Secure Data Hiding System Using Least Significant Bit Algorithm, (External Examiner)
  91. (2012) SECURITY ANALYSIS OF WATERMARKING PROTOCOLS AND SCHEMES BASED ON SINGULAR VALUE DECOMPOSITION , (External Examiner)
  92. (2012) Research Project for MCS candidate - Improving DSR Routing Protocol Using TTL-Based in Mobile Ad Hoc Network (MANET), (Internal Examiner)
  93. (2011) A PROXY-ASSISTED ROUTING FOR EFFICIENT DATA TRANSMISSION IN MOBILE AD HOC NETWORKS , (Internal Examiner)
  94. (2011) An Approach The Implementation Of Access Control Policy And Identity Management In The Public Sector Agency , (External Examiner)
  95. (2011) Designing a Low Cost Implementation of E‐Commerce Security by Optimizing the Parameters of NTRU Cryptosystem Algorithm for Inderscience Publishers Ltd. , (Reviewer)
  96. (2011) A Reservation‐Based Multiple Access Scheme with Adaptive Permission Probability for Wireless Systems Journal of King Saud University ‐ Computer and Information Sciences, (Reviewer)
  97. (2011) Paper on A NEW IDENTITY BASED GROUP SIGNATURE SCHEME, (Reviewer)
  98. (2010) Master Dissertation on Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme, (Internal Examiner)
  99. (2010) Paper on BIOMETRIC ENCRYPTION THROUGH MODIFIED HILL CIPHER TECHNIQUE , (Reviewer)
  100. (2010) Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique, (Internal Examiner)
  101. (2010) Master Dissertation on Throughput Optimization of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), (Internal Examiner)
  102. (2009) Master Dissertation on Implementation of Elliptic Curve Cryptography Using Biometric Features to Enhance Security Services, (Internal Examiner)
  103. (2007) For paper publications of Malaysian Journal of Computer Science (MJCS) , (Editor)
Contribution to external organisation
  1. (2024) Visiting Professor At Institute of Informatics & Computing in Energy (Iice), National, (Adjunct/Visiting Professors)
  2. (2023) Participation in Feedback Workshop for a Proposed Maturity Model in Cybersecurity Incident Response, National, (Expert Advisor)
  3. (2023) Juri Anugerah Iucel 2023, National, (Technical Advisor)
  4. (2023) Ahli Kumpulan Fokus Myseal, National, (Expert Advisor)
  5. (2017) Panellist for HLAF Scholarship Interview, Human Life Advancement Foundation
  6. (2017) TWG ICT FGD Workshop , EPU Jabatan Perdana Menteri
  7. (2016) Panellist for Human Life Advancement Foundation (HLAF) Scholarships Interview, Human Life Advancement Foundation
  8. (2016) Focus Group Member for MySEAL project Cybersecurity, Cybersecurity Malaysia
  9. (2014) Panel Viva Voce - Master of Info Tech (Full Research), Fakulti Teknologi dan Sains Maklumat UKM
  10. (2014) PANEL PENILAI BAGI SESI PEMBENTANGAN KERTAS CADANGAN SKIM GERAN PENYELIDIKAN PEMBANGUNAN PROTOTAIP (PRGS) FASA 1/2014 , IPPP Universiti Malaya
  11. (2013) Panel for Viva Voce - Phd Degree Candidate, Faculty of Information Science & Technology, UKM
  12. (2013) Panel for Viva Voce - Phd Degree Candidate, Faculty of Computer Science & Info. Tech., University of Malaya
  13. (2010) Reviewers for ACTA Press Journal, ACTA Press Journal Canada
  14. (2008) Panel Advisor for Competency Standards for Polytechnic Graduates, Jabatan Pengajian Politeknik dan Kolej Komuniti Kementerian Pengajian Tinggi Malaysia
  15. (2008) A Speaker for Technical Writing Workshop 2017, CyberSecurity Malaysia
  16. (2008) Technical Committee, 2017 International Conference on Biometric Engineering and Forensics
Contribution to event
  1. (2021) Participant to Pitch On Mphr Project, National, (Participant)
Mentoring
  1. (2022) Penceramah Untuk Program Promotion Interview Coaching Session', National, (Mentor)

SUPERVISION


Postgraduate Student
PhD/ Doctoral
  1. (2023) method of secured tacit knowledge transfer with the implementation of steganography, Mohd Hilal Muhammad
  2. (2023) TRACEABILITY IN THE HALAL FOOD SUPPLY CHAIN ON BLOCKCHAIN TECHNOLOGY WITH HARMONIZED SMART CONTRACT BASED ON MULTIPLICITY OF HALAL STANDARDS, MOHD RIZAL BIN KADIS
  3. (2023) SOFTWARE BASE FOG-ENABLE GATEWAY FOR VULNERABILITY ASSESSMENT FOR IOT SYSTEM, MANIMARAN MANIKAM
  4. (2023) Efficient Energy Management Model for IoT Using Public Key Encryption, ABDUL WAHID SOOMRO
  5. (2023) Anomaly based Intrusion Detection System Perspective to Data Center: Applying Machine Learning Approaches, MD RAWSHAN ALAM
  6. (2023) Internet of Things (IoT): Architectural, MARWAH ALABBOODI
  7. (2023) Securing Internet of Things (IoT) from Human Misbehavior, NAEEM AL-SHUKAILI
  8. (2023) Analysis of Cryptography Techniques in Cloud Computing, MOHAMMED RAFEET
  9. (2023) Cross-Silo Implementation of Federated Learning in Healthcare for 6G: Leveraging VPN-Based Wireless Backhaul Networks, ATIF MAHMOOD
  10. (2023) Security Control Assessment Efficiency Framework, NOOR ASHITAH BINTI ABU OTHMAN
  11. (2023) Blockchain Eligibility Assessment Processing (Beap) Framework In Federal Government For New Blockchain Dapps Implementatiom By Government Agencies In The Context Of Malaysia, SIVAMOHAN A/L V SHUNMUGAM
  12. (2023) A Framework for Smart Contract Standardization and Selection Using Multi Criteria Analysis, NORAH MOHAMMAD R ALSHAHRANI
  13. (2022) Cryptanalysis of Some Public-Key Cryptosystems Using Heuristic Methods, DIAN RACHMAWATI ERI
  14. (2022) OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification, MUHAMMAD MUZAFFAR HAMEED
  15. (2022) A SECURE PIN-ENTRY METHOD RESISTANT TO SHOULDER-SURFING AND RECORDING ATTACKS, FARID SALEM SAEED BINBESHR
  16. (2022) Behavioral System Analysis Model for Ransomware Detection at Early Stage using Machine Learning, Tan Joco Guan Min
  17. (2022) AN ACQUISITION AND A MODULATED RECOGNITION SYSTEM FOR DRIVER PROFILING IN MALAYSIA, WARD AHMED ALAULDDIN AL-HUSSEIN
  18. (2022) Parallel Sponge-Based Authenticated Encryption with Side-Channel Protection and Adversary-Invisible Nonces, MOHAMUD AHMED JIMALE
  19. (2022) BYOD SECURITY POLICY COMPLIANCE FRAMEWORK IN MALAYSIAN PUBLIC SECTOR, RATHIKA A/P PRAMMY SAMY @ PALANISAMY
  20. (2021) TRUST MODEL OF IOT:TRUST IS COMBINATION OF SECURITY, PRIVACY AND CONFIDENTIALITY IN AN IOT ENVIRONMENT, MOHAMMAD KHALIQUR RAHMAN
  21. (2021) QoS ENABLED CROSS-LAYERED CLUSTERING FOR MITIGATING FLOODING QUERIES IN INTERNET OF THING NETWORKS, FAWAD ALI KHAN
  22. (2017) -, FAZIDAH BINTI OTHMAN
  23. (2016) A Secure Multipath Routing Protocol for Wireless Sensor Network (WSN), SHAZANA BINTI MD ZIN
  24. (2014) -, ABDUL MUEED KHALID
  25. (2013) A Security Framework For Mobile Health Applications On Android Platform, MUZAMMIL HUSSAIN
  26. (2012) Network Security, Salman Iqbal Malik
  27. (2012) Information Security, Noor Hayani Binti Abd Rahim
  28. (2012) Computer Security, Mohamed Shabbir Hamza Abdulnabi
  29. (2012) Computer Forensic, Nordiana Binti Rahim
  30. (2012) Assessment of Cybersecurity Awareness Program On Personal Data Protection Among Youngsters in Malaysia, NOOR HAYANI BINTI ABD RAHIM
  31. (2012) An Artificial Co-stimulation Classifier for Malicious API calls classification in Portable Executable Malwares, SAMAN MIRZA ABDULLA
  32. (2011) WIRELESS SECURITY, SHAZANA BINTI MD ZIN
  33. (2011) Secure Group Communication, Babak Daghighi
  34. (2011) Network Security, Shahaboddin Shamshirband
  35. (2011) Network Security, Lim Shu Yun
  36. (2011) Network Security, Abdul Nasir Khan
  37. (2011) Energy Efficient Data Security Schemes for Mobile Users in Cloud Environment, ABDUL NASIR KHAN
  38. (2011) COOPERATIVE MULTI AGENTS FOR INTELLIGENT INSTRUSION DETECTION AND PREVENTION SYSTEMS, SHAHABODDIN SHAMSHIRBAND
  39. (2011) A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, LIANA K. M. QABAJEH
  40. (2009) Network Security, Abdul Mueed Khalid
  41. (2008) Secure Group Communication, Fazidah binti Othman
  42. (2008) A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, LIANA K. M. QABAJEH
  43. (2008) A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, Liana Khamis Qabajeh
  44. (2008) An Artificial Co-stimulation Classifier of Malicious API calls classification in Portable Executable Malwares, Saman Mirza Abdulla
  45. (2008) An Artificial Co-stimulation Classifier for Malicious API calls classification in Portable Executable Malwares, SAMAN MIRZA ABDULLA
Master
  1. (2023) Iot vulnerability assessment, NIK AHMAD AQIL BIN NIK AZEMI
  2. (2023) Blockchain Technology on Cybersecurity Innovation, NG ZHENG HUI
  3. (2023) An Improved Solution on Sidechains for Scalable Ethereum's Blockchain, IQRA SADIA
  4. (2022) Fuzzy-Based Classification with a Three-tier Fog Computing Architecture for Minimizing Latency in IoT Healthcare System, SAIKET JAMAN ALAMIN
  5. (2022) An Approach for Improving Configuration Management System for Data Privacy In Multi Cloud Environment, REBEN DALSHAD IBRAHIM
  6. (2021) A COMPARATIVE ANALYSIS ON CLASS IMBALANCE TECHNIQUES IN NETWORK TRAFFIC CLASSIFICATION, SHOVON DATTA RONY
  7. (2020) Flexible Content Authorization Using Digital Rights Management in Cloud Computing, ALI HUSSAIN
  8. (2019) Personalized Employment-Oriented Recommender System Using Content-Based User Profiling, SADRA SHOKOUHI
  9. (2019) Wireless Backhaul Network Optimization Using Network's Capacity Utilization based on Deep Learning Algorithms, ATIF MAHMOOD
  10. (2018) Implementation of Fully Homomorphic Encryption for Privacy-Preserving QRS Detection in Electrocardiogram Data, JESSE EPPERSON
  11. (2016) A Game Theoretic Approach to Mitigate Economic Denial of Sustainability, FAHAD ZAMAN CHOWDHURY
  12. (2011) An Anti-SMS Spam Enegihe, HAZHIR HAJIAN
  13. (2010) Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, MOHAMED SHABBIR HAMZA ABDULNABI
  14. (2010) A Case Based Reasoning Approach for Dynamic Honeypot, WIRA ZANORAMY ANSIRY BIN ZAKARIA
  15. (2010) A Case Based Reasoning Approach for Dynamic Honeypot, Wira Zanoramy
  16. (2009) Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-bit Encoding Audio Steganagraphy Technique, MOHAMMED A AHMED
  17. (2009) Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, Mohamed Shabbir Hamza Abdulnabi
  18. (2009) Hybrid Techniques of NTRU and AES for Improving the Security of Electronic Medical Records, Alanazi, Hamdan Owaid R
  19. (2009) An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, SAMER HASAN SAIF
  20. (2008) Key Management for Secure Group Communication in a Wireless Environment, BABAK DAGHIGHI
  21. (2008) Implementation of Wireless Security on Virtual WiFi, MOHAMMAD YASIN ARASHPOUR
  22. (2008) High Capacity Image Steganography Algorithm Based on Artificial Neural Network, HAMSAH AHMED GHALEB AL-JBARA
  23. (2008) An Implementation of Video Steganography Using the LSB Method, MOHAMED ELSADIQ ELTAHIR AHMED
  24. (2008) An Image Steganography Using Texture Analysis for High Rate Data Hiding, ANAS MAGEED HAMID
  25. (2007) Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-Bit Encoding Audio Steganography Technique, Mohammed-A-Ahmed
  26. (2007) Implementation of Wireless Security on Virtual WIFI, Mohammad Yasin Arashpour
  27. (2007) Implementation of End-To-End Secure SMS Using Elliptic Curve Cryptography, ADDY MAJED ABDALKAREM ALQURAAN
  28. (2007) High Capacity Image Steganography Algorithm Based on Artificial Neural Network, Hamsah Ahmed Ghaleb Al-Jbara
  29. (2007) An Image Steganography Using Texture Analysis for High Rate Data Hiding, Anas Mageed Hamid
  30. (2007) An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, Samer Hasan Saif Qaid
  31. (2006) The Implementation of Secure Group Communication in Wireless and Mobile Environment, Babak Daghighi
  32. (2006) Implementation of End-to-End Secure SMS Using Elliptic Curve Cryptography, Addy Majed Abdalkarem Alquraan
  33. (2006) An Implementation of Video Steganography Using the LSB Method, Mohamed El Sadiq El Tahir Ahmed

TEACHING


Bachelor
  1. (2022) WIC3002 - Cryptography
  2. (2021) WIC3002 - Cryptography
  3. (2021) WIA1005 - Network Technology Foundation
  4. (2010) WRES2108 - Advance Network Technology

PATENT/IPR


  • LOW COST POWERED UPPER LIMB PROSTHESIS
    PATENT
  • Aggregating Device And Method For Search Engine-Based Data Mash-Up Of Medical Informatics Research Activity
    PATENT
  • Data for Driver Profiling in Malaysia
    COPYRIGHT
  • EMERALD Research & Supervision Training Module
    COPYRIGHT
  • METHOD AND SYSTEM FOR DIGITAL VIDEO INPAINTING DETECTION
    PATENT
  • Implementation MATLAB Toolbox of Registration Data Access Protocol (RDAP) for Wider Usability Among Internet Stakeholders
    COPYRIGHT
  • Implementation Browser Utilities for Registration Data Access Protocol (RDAP) for Wider Usability Among Internet Stakeholders
    COPYRIGHT
  • Smart and Security Enhanced Transportation Ecosystem for a Future Sustainable Smart City Framework
    COPYRIGHT
  • GSceeNQUIRE : Green Screen Video Identification Module
    PATENT
  • A FRAMEWORK AND RELATED METHODS FOR HEALTH INFORMATION EXCHANGE USING MOBILE PERSONAL HEALTH RECORDS
    Patent (National)
  • SECURE VIDEO CONFERENCING FRAMEWORK FOR REAL TIME APPLICATION: METHODOLOGY AND SYSTEM
    Patent (International)
  • A Scientific Search Engine Based on Data Mashup
    Patent (International)

SOCIAL RESPONSIBILITY ACTIVITIES


  • Interviewed for Promoting On Product Commercialization - Via UMCIC for Website and Youtube Channels, (28 Feb 2020 - 28 Feb 2020)
  • AJK Induk Pemilihan Mppum Sesi 2012/2013, (18 Sep 2012)
  • Executive Editor for Malaysian Journal of Computer Science, (01 Aug 2007 - 01 Aug 2008)

COURSE ATTENDED


Internal / External Course
EXTERNAL COURSE
  1. ANDROID APPLICATION DEVELOPMENT -LEVEL 1, Mdec's Knowledge Worker Development Centre (27 Sep 2016 - 29 Sep 2016)
  2. BENGKEL KUMPULAN FOKUS MYSEAL, Putrajaya (24 Jan 2017 - 24 Jan 2017)
  3. BENGKEL MYSEAL, Putrajaya (22 Dec 2016 - 22 Dec 2016)
  4. BENGKEL PENILAIAN FASA PERTAMA UNTUK MEMUKTAMADKAN AKSA MYSEAL, Putrajaya Mariott (08 Jun 2017 - 08 Jun 2017)
  5. BENGKEL PENILAIAN FASA PERTAMA MYSEAL, Putrajaya (04 Apr 2017 - 06 Apr 2017)
  6. RESEARCH LEAVE - SKYDRM & IOT SECURITY, Fsktm (01 Nov 2017 - 31 Dec 2017)
  7. LEADERS IN INNOVATION FELLOWSHIPS, The Hoxton, Shoreditch, London (04 Dec 2017 - 15 Dec 2017)
  8. CYBER CRIME PREVENTION & DETECTION, Suite C-08-05 Wisma Goshen Plaza Pantai, Bangsar Trade Center No 5, Jalan4/83a, Off, Jalan Pantai Baharu, Bangsar 59200 Kl (16 Apr 2021 - 18 Apr 2021)
  9. BENGKEL KUMPULAN FOKUS MYSEAL, Avillion Hotel Port Dickson (01 Sep 2016 - 03 Sep 2016)
  10. BENGKEL CISCO NETWORKING ACADEMY 2012, Hard Rock Cafe Hotel, Penang (03 Oct 2012 - 05 Oct 2012)
  11. CERTIFIED ETHICAL HACKER & CERTIFIED ECCOUNCIL INSTRUCTOR TRAINING, Kuala Lumpur (17 Dec 2012 - 21 Dec 2012)
  12. LEADERSHIP TRAINING FOR MANAGERS, Kampus Akept Bandar Enstek (17 Sep 2013 - 19 Sep 2013)
  13. BENGKEL PENYEDIAAN HIGH LEVEL STRATEGIC ICT BLUE PRINT BERSAMA GREAT MINDS ICT KPT, Puteri Resort Ayer Keroh Melaka (08 Mar 2013 - 10 Mar 2013)
  14. BENGKEL KAJIAN SEMULA NATIONAL BIOINFORMATICS ROADMAP, Sirim Berhad, Shah Alam, Selangor (07 Aug 2008 - 08 Aug 2008)
  15. MYREN TECHNICAL SEMINAR 'TOWARDS DNSSEC & IPV6', Msc Malaysia Innovation Centre, Cyberjaya (14 Jan 2010 - 14 Jan 2010)
  16. KURSUS SPSS WORKSHOP PART 1, Akademi Pengajian Islam, Universiti Malaya (18 May 2011 - 19 May 2011)
  17. PRACTICAL CASE STUDY BASED DATA INSECURITY WORKSHOP, Kuala Lumpur (13 Feb 2012 - 15 Feb 2012)
  18. CERTIFIED ETHICAL HACKER, Kuala Lumpur (25 Jun 2012 - 29 Jun 2012)
  19. BENGKEL BAGI MEMBINCANGKAN PELAN PEMBANGUNAN SENARAI ALGORITMA KRIPTOGRAFI NEGARA (MYSEAL), Hotel Bangi-Putrajaya (07 Apr 2016 - 08 Apr 2016)
  20. RESEARCH SUPERVISOR TRAINING WORKSHOP, Institut Pengajian Siswazah UM (20 Jul 2011 - 20 Jul 2011)
  21. AWARENESS PROGRAM : INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS)ISO/IEC 27001, Cyberjaya (14 Apr 2011 - 14 Apr 2011)
  22. BENGKEL KE ARAH KOLABORASI PENYELIDIKAN TRISTED COMPUTING, Mimos Berhad, Technology Park Malaysia, Kuala Lumpur (05 Aug 2008 - 05 Aug 2008)
COURSES ORGANIZED BY PTJ
  1. SPECTRUM (CONDUCTING PEER ASSESSMENT USING WORKSHOP ACTIVITY, Makmal Komputer, Fakulti Sains (30 Jun 2016 - 30 Jun 2016)
  2. SPECTRUM (WEB 2.0), Makmal Komputer, Fakulti Sains (15 Jun 2016 - 15 Jun 2016)
  3. CONFLICT MANAGEMENT WORKSHOP, Seminar Room a & B , Ips (13 May 2010 - 13 May 2010)
  4. WORKSHOP ON BASIC COACHING SKILLS, Bilik Latihan 14-1 Wisma R&D (21 Feb 2014 - 21 Feb 2014)
  5. BENGKEL PEMBANGUNAN KEPIMPINAN, Petaling Jaya Hilton (16 Oct 2008 - 16 Oct 2008)
RESEARCH
  1. BLOCKCHAIN TECHNOLOGY, (14 Feb 2022 - 13 Mar 2022)
  2. SECURE GROUP COMMUNICATION IN WIRELESS MOBILE ENVIRONMENT, (01 May 2010 - 01 Jul 2010)
  3. (1) SECURE FRAMEWORK FOR EMR - HIR FUND (2) SECURE GROUP COMMUNICATION - ESCIENCE FUND, (01 Dec 2013 - 20 Dec 2013)
CONFERENCE
  1. CISCO NETWORKING ACADEMY PARTNER SUMMIT, Hard Rock Hotel (03 Oct 2012 - 05 Oct 2012)
  2. 2015 THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER NETWORKS (ICICN 2015) , Florence (18 Mar 2015 - 21 Mar 2015)
  3. SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGIES (FGCT 2013), City Conference Center, Holborn Viaduct, London (11 Dec 2013 - 15 Dec 2013)
  4. COLLABORATION VISIT AND MEETING WITH SCH UNIVERSITY - IOT RESEARCH, Sch Uni, Korea (17 Jun 2022 - 26 Jun 2022)