Curriculum Vitae
AREAS OF EXPERTISE
-
SECURITY SERVICES SN: DIGITAL FORENSIC, STEGANOGRAPHY, NETWORK SECURITY, PUBLIC KEY INFRASTUCTURE AND BIOMETRICSCloud computing, cyber security
-
INFORMATION SECURITYApplied Cryptography, Applied Steganography
-
COMMUNICATION PROTOCOLSWireless Security, Ad-hoc Network Security, Mobile Communication Security
-
SECURITY PROTOCOLSGroup Communication, Key Management, Wireless Mobile Environments
ACADEMIC QUALIFICATION
- Doctoral Degree (PhD), (Keselamatan Maklumat)Royal Holloway, University of London, United Kingd
- MASTER DEGREE, (Keselamatan Komputer)Royal Holloway, University of London, United Kingd
- PhD (London), (Information Security)Royal Holloway, University of London, United Kingd
- MSc (London), (Information Security)Royal Holloway, University of London, United Kingd
- B.Sc.COMP.SC.(HONS), (SAINS KOMPUTER)Universiti Malaya (UM)
ADMINISTRATIVE DUTIES
- Director15 Jun 2022 - 29 Feb 2024 (Academic Development and Enhancement Centre, Deputy Vice-Chancellor (Academic and International))
- Penasihat Akademik06 Oct 2023 - 31 Dec 2028 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Penyelia Latihan Industri06 Oct 2023 - 31 Dec 2028 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- AJK Sebut Harga PTj09 Aug 2023 - 08 Aug 2025 (University Malaya)
- AJK Kurikulum (Task Force) bagi Program Sarjana Keselamatan Siber (secara Kerja Kursus)03 Mar 2023 - 04 Mar 2025 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Committee Members07 Mar 2022 - 03 Mar 2025 (Faculty)
- Committee Members07 Mar 2022 - 03 Mar 2025 (Faculty)
- Ahli MEIPTA14 Apr 2023 - 31 Dec 2024 (National)
- Ahli Akademik Kanan bagi JK Ijazah Tinggi Fakulti09 Nov 2023 - 31 Dec 2024 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Committee Members02 Jan 2022 - 31 Dec 2024 (Faculty)
- Committee Members17 Dec 2021 - 16 Dec 2024 (University Malaya)
- Committee Members04 Jan 2022 - 16 Dec 2024 (University Malaya)
- Wakil Tetap Fakulti Ke JawatanKuasa Penasihat Akademik, IPS26 Aug 2011 - present (Dean Office, Faculty of Computer Science and Information Technology)
- Jawatankuasa Kerja Audit Program Ijazah Tinggi (JKAPIT)06 Aug 2012 - present (University Malaya)
- Committee Members01 Nov 2022 - 31 Oct 2024 (National)
- Committee Members28 Jan 2022 - 27 Jan 2024 (University Malaya)
- Committee Members01 Jan 2022 - 31 Dec 2023 (Faculty)
- Moderator Examination for Final Examination/Assessment01 Jan 2023 - 31 Dec 2023 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Committee Members01 Jul 2022 - 31 Dec 2023 (University Malaya)
- Ahli Pasukan (Taskforce) Merangka Dokumen MYPORTFOLIO Staf Akademik UM23 Mar 2023 - 31 Dec 2023 (University Malaya)
- AJK JKIK - Program Baru Master of Artificial Intelligence07 Dec 2020 - 06 Dec 2023 (Faculty)
- AJK JKIK - Master of Cybersecurity09 Nov 2020 - 08 Nov 2023 (Faculty)
- Committee Members24 Feb 2022 - 31 Dec 2022 (University Malaya)
- Supervisor14 Oct 2022 - 31 Dec 2022 (Faculty)
- Task Force Member15 Jul 2022 - 31 Dec 2022 (Faculty)
- Wakil Senat - JK Senat Khas Rayuan24 Jul 2020 - 23 Jul 2022 (University Malaya)
- Committee Members24 Feb 2022 - 24 Feb 2022 (University Malaya)
- WAKIL SENAT/AHLI JK PEMILIH KE JAWATAN PROF C25 Jan 2019 - 24 Jan 2022 (University Malaya)
- Deputy Dean of Higher Degree07 Oct 2019 - 31 Dec 2021 (Dean Office, Faculty of Computer Science and Information Technology)
- Ahli Taskforce Penambahbaikan Research Module UMSITs13 Oct 2020 - 31 Dec 2021 (University Malaya)
- AHLI SENAT17 Dec 2018 - 16 Dec 2021 (University Malaya)
- AHLI JK TASKFORCE PENGEMASKINIAN POLISI PENYELIAAN CALON IJAZAH TINGGI08 Oct 2019 - 07 Oct 2021 (University Malaya)
- Profesor yang dilantik - keanggotaan JK Pemeriksa Sarjana Bahagian Penyelidikan05 Sep 2019 - 04 Sep 2021 (Academy of Islamic Studies, Academy of Islamic Studies)
- Timbalan Pengurus Kualiti07 Oct 2019 - 31 Jul 2021 (Faculty)
- Wakil Senate31 Jul 2018 - 25 Jan 2021 (University Malaya)
- AHLI JK PEMILIH CUTI BELAJAR DAN SLAB/SLAI 2019/202001 Jan 2019 - 31 Dec 2020 (University Malaya)
- Panel Penilai FYP - Sem2 2019202001 Feb 2020 - 30 Sep 2020 (Faculty)
- Programme Coordinator07 Aug 2017 - 06 Aug 2020 (Faculty)
- Ahli JK Tapisan (Pelantikan)16 Mar 2017 - 15 Mar 2020 (Faculty)
- Ahli JK Tapisan - Fakulti Sains03 Jul 2017 - 31 Dec 2019 (Dean Office, Faculty of Science)
- Ahli Panel Penemuduga Cuti Belajar dan SLAB/SLAI03 Jan 2017 - 31 Dec 2018 (University Malaya)
- Wakil Senat - JK Induk Pengecualian dan Pemindahan Kredit26 Aug 2016 - 16 Dec 2018 (University Malaya)
- Ahli JK Penilai Luar Program - Bidang Sains Teknologi dan Klinikal01 Jun 2017 - 16 Dec 2018 (University Malaya)
- Wakil Senat - Ahli Jawatankuasa Pemilih01 Aug 2016 - 16 Dec 2018 (University Malaya)
- Wakil Senat - Ahli JK Pengajian (Ijazah Tinggi)01 May 2017 - 16 Dec 2018 (Faculty)
- Senate Member17 Dec 2015 - 16 Dec 2018 (University Malaya)
- Wakil Senat - JK Perpustakaan Universiti26 May 2017 - 16 Dec 2018 (University Malaya)
- AJK Kump Penyelidik ICT Security Research Group13 Dec 2016 - 12 Dec 2018 (Faculty)
- AJK Kump Penyelidik IoT13 Dec 2016 - 12 Dec 2018 (Faculty)
- Pengawai Penilai Prestasi Khas15 May 2017 - 14 May 2018 (University Malaya)
- Ahli JK Penyelidikan10 Aug 2016 - 09 Aug 2017 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Ahli JK Badan Penasihat Dekan15 Aug 2016 - 30 Jun 2017 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Wakil Pengerusi12 Sep 2016 - 11 Jun 2017 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Pengerusi/Panel REMOS.stk25 Nov 2016 - 25 Nov 2016 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Ahli JK Kurikulum Jabatan - Program Sarjana01 Mar 2014 - 28 Feb 2016 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Deputy Dean of Higher Degree01 Jul 2014 - 31 Jul 2014 (Dean Office, Faculty of Computer Science and Information Technology)
- Deputy Dean of Higher Degree01 Jul 2011 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
- AJK Penilaian Slim Geran FRGS & ERGS Peringkat UM21 May 2013 - 31 Dec 2014 (University Malaya)
- Ahli Panel Penemuduga14 Nov 2013 - 13 Nov 2014 (University Malaya)
- PENGERUSI - JK Kurikulum FSKTM (Ijazah Tinggi)01 Jul 2011 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
- Deputy Dean of Higher Degree01 Jul 2011 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
- Ahli JKIT FSKTM01 Jul 2013 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
- AJK Bright Spark FSKTM01 Jul 2012 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
- PENGERUSI - JK Ijazah Tinggi (JKIT)01 Jul 2011 - 30 Jun 2014 (Dean Office, Faculty of Computer Science and Information Technology)
- Acting Dean22 May 2014 - 23 May 2014 (Dean Office, Faculty of Computer Science and Information Technology)
- AJK PGRES FSKTM07 Feb 2013 - 31 Dec 2013 (Dean Office, Faculty of Computer Science and Information Technology)
- Ahli Panel Penemuduga31 Oct 2012 - 30 Oct 2013 (University Malaya)
- Timbalan Pengerusi NADI22 Aug 2011 - 21 Aug 2013 (Dean Office, Faculty of Computer Science and Information Technology)
- Acting Dean05 Jul 2013 - 09 Jul 2013 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Acting Director10 Jan 2013 - 11 Jan 2013 (Dean Office, Faculty of Computer Science and Information Technology)
- AJK PGRES FSKTM22 Feb 2012 - 31 Dec 2012 (Dean Office, Faculty of Computer Science and Information Technology)
- Acting Director29 Nov 2012 - 30 Nov 2012 (Dean Office, Faculty of Computer Science and Information Technology)
- Acting Director26 Sep 2012 - 28 Sep 2012 (Dean Office, Faculty of Computer Science and Information Technology)
- Acting Director22 Sep 2012 - 25 Sep 2012 (Dean Office, Faculty of Computer Science and Information Technology)
- Acting Director28 Aug 2012 - 13 Sep 2012 (Dean Office, Faculty of Computer Science and Information Technology)
- Acting Director17 Jun 2012 - 22 Jun 2012 (Dean Office, Faculty of Computer Science and Information Technology)
- Head of Department13 May 2008 - 31 Aug 2009 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
- Head of Department12 May 2008 - 31 Aug 2009 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
MEMBERSHIPS
- AHLI MAJLIS PROFESOR NEGARA, MEMBERSince 2022 (National)
- MALAYSIAN SOCIETY FOR CRYPTOLOGY RESEARCH (MSCR), MEMBERSince 2017 (National)
- MPN - MAJLIS PROFESOR UNIVERSITI , MEMBERSince 2017 (National)
- AJK SEMAKAN SEMULA SISTEM SAPT UM, MEMBER2021 to 2023 (University)
- ASSOCIATE EDITOR , COMMITTEE MEMBER2021 to 2023 (International)
- AHLI JAWATANKUASA PEMILIH CUTI BELAJAR SLAB/SLAI, MEMBER2021 to 2022 (University)
- PENYELARAS PEMASARAN, MEMBER2021 to 2022 (University)
- WAKIL IPT (CSAM SECRETARIAT) - UM , COMMITTEE MEMBER2021 to 2022 (National)
- AHLI JAWATANKUASA PROGRAM BIDANG SAINS KOMPUTER - IJAZAH SARJANA DAN IJAZAH SARJANA MUDA, MEMBER2020 to 2022 (National)
- PANEL TEMU DUGA PROGRAM PENAJAAN/CUTI BELAJAR BERGAJI PENUH (CBBP) PEGAWAI PENDIDIKAN PENGAJIAN TINGGI (PPPT) DI IPTA, MEMBER2021 to 2021 (National)
- IEEE SENIOR MEMBER, MEMBER2021 to 2021 (International)
- MALAYSIA BOARD OF TECHNOLOGISTS, MEMBER2018 to 2021 (National)
- EC COUNCIL, MEMBER2012 to 2021 (International)
- CENTRE FOR RESEARCH IN INDUSTRY 4.0 (CRI4.0), COMMITTEE MEMBERS2018 to 2020 (National)
- IEEE - SENIOR MEMBER, COMMITTEE MEMBER2016 to 2020 (National)
- IEEE - SENIOR MEMBER, COMMITTEE MEMBER2016 to 2019 (International)
- EC COUNCIL, COMMITTEE MEMBER2012 to 2018 (National)
AWARD AND STEWARDSHIP
- Best Paper AwardCRC2021, 2021 (International)
- GOLD AWARD - INNOVATIONUiTM MELAKA, 2019 (International)
- Instructor 10 Years of ServiceCISCO Academy, 2019 (International)
- FCSIT Innovation Exhibition Competition 2018UM, 2018 (Ptj/ Faculty)
- INTERNATIONAL RESEARCH INNOVATION, INVENTION & SOLUTION EXPOSITION (IRIISE 2018) 14 - 16 August 2018 Dewan Tunku Canselor, University of MalayaUM, 2018 (National)
- Leaders in Innovation Fellowships 2017-2018 Grant AwardNewton Fund, 2018 (International)
- Panel of Jury - UM3MT 2018 - FEA UMFEA UM, 2018 (Ptj/ Faculty)
- Inspiring Professor for Motivational Talk - for 1st class students and AlumniFSKTM UM, 2018 (Ptj/ Faculty)
- SILVER award for IoT Based Eco Friendly Traffic Light ControllerUiTM, 2017 (National)
- GOLD award for Go Green Malaysia - iiDEX 2017UiTM, 2017 (National)
- Leaders in Innovation FellowshipsRoyal Academy of Engineering , 2017 (International)
- KHIDMAT SETIA 20 AWARDUniversity of Malaya, 2017 (University)
- Best Paper AwardIEEE CSS Malaysia Section, 2017 (National)
- Certificate of Appreciation for Keynote SpeechThe Society of Digital Information and Wireless Communications, 2016 (International)
- Student ConsultantIPS UM, 2016 (University)
- Chairperson for PGRES 2016FCSIT UM, 2016 (Ptj/ Faculty)
- EXCELLENCE SERVICE AWARDUniversity of Malaya, 2014 (University)
- CERTIFICATE OF EXCELLENT SERVICEUniversity of Malaya, 2013 (University)
- Instructor Years of ServiceCisco Networking Academy, 2013 (International)
- BEST SESSION PAPER AWARDInternational Research and Innovations in Science, Engineering and Technology (IRISET), 2012 (International)
- UM EXCELLENCE AWARDNAIB CANSELOR, 2011 (University)
- Excellence Award 2011University of Malaya, 2011 (University)
- CERTIFICATE OF EXCELLENT SERVICEUniversity of Malaya, 2010 (University)
- Sijil Perkhidmatan CemerlangUniversity of Malaya, 2010 (University)
PUBLICATIONS
Article in Journal
WoS
-
Mahmood, Atif; Kiah, Miss Laiha Mat; Azizul, Zati Hakim; Azzuhri, Saaidal Razalli (2024). Analysis of Terahertz (THz) Frequency Propagation and Link Design for Federated Learning in 6G Wireless Systems, IEEE ACCESS. 12, 23782-23797. doi:10.1109/ACCESS.2024.3362966
-
Binbeshr, Farid; Por, Lip Yee; Kiah, M. L. Mat; Zaidan, A. A.; Imam, Muhammad (2023). Secure PIN-Entry Method Using One-Time PIN (OTP), IEEE ACCESS. 11, 18121-18133. doi:10.1109/ACCESS.2023.3243114
-
Jimale, Mohamud Ahmed; Abdullah, Nor Aniza; Kiah, Miss Laiha Binti Mat; Idris, Mohd Yamani Idna; Z'Aba, Muhammad Reza; Jamil, Norziana; Rohmad, Mohd Saufy (2023). Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection, IEEE ACCESS. 11, 59661-59674. doi:10.1109/ACCESS.2023.3267161
-
Palanisamy, Rathika; Norman, Azah Anir; Kiah, Miss Laiha Mat (2023). Employees' BYOD Security Policy Compliance in the Public Sector, JOURNAL OF COMPUTER INFORMATION SYSTEMS. . doi:10.1080/08874417.2023.2178038
-
Al-Hussein, Ward Ahmed; Por, Lip Yee; Kiah, Miss Laiha Mat; Zaidan, Bilal Bahaa (2022). Driver Behavior Profiling and Recognition Using Deep-Learning Methods: In Accordance with Traffic Regulations and Experts Guidelines, INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH. 19(3). doi:10.3390/ijerph19031470
-
Alasbali, Nada; Azzuhri, Saaidal Razalli Bin; Salleh, Rosli Bin; Kiah, Miss Laiha Mat; Shariffuddin, Ahmad Aliff A. S. Ahmad; Kamel, Nik Muhammad Izwan bin Nik Mohd; Ismail, Leila (2022). Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization, MOBILE INFORMATION SYSTEMS. 2022. doi:10.1155/2022/9109300
-
Jimale, Mohamud Ahmed; Z'aba, Muhammad Reza; Kiah, Miss Laiha Binti Mat; Idris, Mohd Yamani Idna; Jamil, Norziana; Mohamad, Moesfa Soeheila; Rohmad, Mohd Saufy (2022). Authenticated Encryption Schemes: A Systematic Review, IEEE ACCESS. 10, 14739-14766. doi:10.1109/ACCESS.2022.3147201
-
Jimale, Mohamud Ahmed; Z'aba, Muhammad Reza; Kiah, Miss Laiha Binti Mat; Idris, Mohd Yamani Idna; Jamil, Norziana; Mohamad, Moesfa Soeheila; Rohmad, Mohd Saufy (2022). Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces, IEEE ACCESS. 10, 50819-50838. doi:10.1109/ACCESS.2022.3171853
-
Khan, Burhan Ul Islam; Olanrewaju, Rashidah Funke; Morshidi, Malik Arman; Mir, Roohie Naaz; Kiah, Miss Laiha Binti Mat; Khan, Abdul Mobeen (2022). EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY, MALAYSIAN JOURNAL OF COMPUTER SCIENCE. 35(3), 179-200. doi:10.22452/mjcs.vol35no3.1
-
Mustafa, Mumtaz Begum; Yusoof, Mansoor Ali; Khalaf, Hasan Kahtan; Abushariah, Ahmad Abdel Rahman Mahmoud; Kiah, Miss Laiha Mat; Hua Nong Ting; Muthaiyah, Saravanan (2022). Code-Switching in Automatic Speech Recognition: The Issues and Future Directions, APPLIED SCIENCES-BASEL. 12(19). doi:10.3390/app12199541
-
Olanrewaju, Rashidah Funke; Khan, Burhan Ul Islam; Kiah, Miss Laiha Mat; Abdullah, Nor Aniza; Goh, Khang Wen (2022). Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT, ELECTRONICS. 11(23). doi:10.3390/electronics11233982
-
Al-Hussein, W. A., Kiah, M. L. M., Yee, P. L., & Zaidan, B. B. (2021). A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions. Peerj Computer Science, 7, 50. doi: 10.7717/peerj-cs.632
-
Al-Hussein, Ward Ahmed; Kiah, Miss Laiha Mat; Por, Lip Yee; Zaidan, Bilal Bahaa (2021). Investigating the Effect of Social and Cultural Factors on Drivers in Malaysia: A Naturalistic Driving Study, INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH. 18(22). doi:10.3390/ijerph182211740
-
Binbeshr, F., Kiah, M. L. M., Por, L. Y., & Zaidan, A. A. (2021). A systematic review of PIN-entry methods resistant to shoulder-surfing attacks. Computers & Security, 101, 14. doi: 10.1016/j.cose.2020.102116
-
Hameed, M. M., Ahmad, R., Kiah, M. L. M., & Murtaza, G. (2021). Machine learning-based offline signature verification systems: A systematic review. Signal Processing-Image Communication, 93, 22. doi: 10.1016/j.image.2021.116139
-
Khan, B. U., Anwar, F., Olanrewaju, R. F., Kiah, M., & Mir, R. N. (2021). Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs. IEEE Access, 9, 61778-61792. doi: 10.1109/access.2021.3073343
-
Kolandaisamy, R., Noor, R. M., Kolandaisamy, I., Ahmedy, I., Kiah, M. L. M., Tamil, M. E. M., & Nandy, T. (2021). A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6599-6612. doi: 10.1007/s12652-020-02279-2
-
Mahmood, A., Kiah, M. L. M., Azzuhri, S. R., Kamal, M. M., Eldabi, T., Qureshi, A. N., . . . Z'Aba, M. R. (2021). Wireless backhaul network's capacity optimization using time series forecasting approach. Journal of Ambient Intelligence and Humanized Computing, 12(1), 1407-1418. doi: 10.1007/s12652-020-02209-2
-
Olanrewaju, R. F., Khan, B. U., Morshidi, M. A., Anwar, F., & Kiah, M. (2021). A Frictionless and Secure User Authentication in Web-Based Premium Applications. IEEE Access, 9, 129240-129255. doi: 10.1109/access.2021.3110310
-
Palanisamy, Rathika; Norman, Azah Anir; Kiah, Laiha Mat (2021). BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts, JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE. 31(4), 320-342. doi:10.1080/10919392.2022.2028530
-
Anjum, S. S., Noor, R., Ahmedy, I., Anisi, M. H., Azzuhri, S. R., Kiah, M. L. M., . . . Kumar, P. (2020). An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks. Ad Hoc Sensor Wireless Networks, 46(1-2), 83-112.
-
Anjum, Shaik Shabana; Noor, Rafidah; Ahmedy, Ismail; Anisi, Mohammad Hossein; Azzuhri, Saaidal Razalli; Kiah, Miss Laiha Mat; Lloret, Jaime; Kumar, Pradeep (2020). An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks, AD HOC & SENSOR WIRELESS NETWORKS. 46(1-2), 83-112
-
Hussain, A., Kiah, M. L. M., Anuar, N. B., Noor, R., & Ahmad, M. (2020). Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey. Journal of Medical Imaging and Health Informatics, 10(10), 2404-2420. doi: 10.1166/jmihi.2020.3178
-
Iqbal, S., Kiah, M. L. M., Rehman, A. U., Abbas, Z., & Daghighi, B. (2020). DM-GKM: A key management scheme for dynamic group based applications. Computer Networks, 182, 18. doi: 10.1016/j.comnet.2020.107476
-
Khan, F. A., Noor, R. M., Kiah, M. L. M., Ahmedy, I., Idris, M. Y. I., Soon, T. K., Ahmad, M. (2020). Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things. Sensors, 20(1), 15. doi: 10.3390/s20010283
-
Khan, Fawad Ali; Noor, Rafidah Md; Kiah, Miss Laiha Mat; Ahmedy, Ismail; Idris, Mohd Yamani Idna; Soon, Tey Kok; Ahmad, Muneer (2020). Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things, SENSORS. 20(1). doi:10.3390/s20010283
-
Khurshid, W., Khan, I. A., Kiah, M. L. M., Khalid, O., Madani, S. A. (2020). A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb. Ieee Communications Letters, 24(4), 744-747. doi: 10.1109/lcomm.2020.2966198
-
Khurshid, Waqar; Khan, Imran A.; Kiah, Miss L. M.; Khalid, Osman; Madani, Sajjad A. (2020). A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb, IEEE COMMUNICATIONS LETTERS. 24(4), 744-747. doi:10.1109/LCOMM.2020.2966198
-
Mahmood, A., Kiah, M. L. M., ZAba, M. R., Qureshi, A. N., Kassim, M. S. S., Hasan, Z. H. A., . . . Azzuhri, S. R. (2020). Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting. Ieee Access, 8, 23264-23276. doi: 10.1109/access.2020.2970224
-
Mahmood, Atif; Kiah, Miss Laiha Mat; Z'aba, Muhammad Reza; Qureshi, Adnan N.; Kassim, Muhammad Shahreeza Safiruz; Hasan, Zati Hakim Azizul; Kakarla, Jagadeesh; Amiri, Iraj Sadegh; Azzuhri, Saaidal Razalli (2020). Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting, IEEE ACCESS. 8, 23264-23276. doi:10.1109/ACCESS.2020.2970224
-
Mehrban, S., Nadeem, M. W., Hussain, M., Ahmed, M. M., Hakeem, O., Saqib, S., . . . Khan, M. A. (2020). Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges. Ieee Access, 8, 23391-23406. doi: 10.1109/access.2020.2970430
-
Mehrban, Sobia; Nadeem, Muhammad Waqas; Hussain, Muzammil; Ahmed, Mohammad Masroor; Hakeem, Owais; Saqib, Shazia; Kiah, M. L. Mat; Abbas, Fakhar; Hassan, Mujtaba; Khan, Muhammad Adnan (2020). Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges, IEEE ACCESS. 8, 23391-23406. doi:10.1109/ACCESS.2020.2970430
-
Palanisamy, R., Norman, A. A., & Kiah, M. L. M. (2020). Compliance with bring your own device security policies in organizations: A systematic literature review. Computers & Security, 98, 16. doi: 10.1016/j.cose.2020.101998
-
Palanisamy, Rathika; Norman, Azah Anir; Mat Kiah, Miss Laiha (2020). BYOD Policy Compliance: Risks and Strategies in Organizations, JOURNAL OF COMPUTER INFORMATION SYSTEMS. . doi:10.1080/08874417.2019.1703225
-
Abd Rahim, N. H., Hamid, S., Kiah, M. L. M. (2019). ENHANCEMENT OF CYBERSECURITY AWARENESS PROGRAM ON PERSONAL DATA PROTECTION AMONG YOUNGSTERS IN MALAYSIA: AN ASSESSMENT. Malaysian Journal of Computer Science, 32(3), 221-245. doi:10.22452/mjcs.vol32no3.4
-
Anjum, S. S., Noor, R. M., Aghamohammadi, N., Ahmedy, I., Kiah, M. L. M., Hussin, N., . . . Qureshi, M. A. (2019). Modeling Traffic Congestion Based on Air Quality for Greener Environment: An Empirical Study. Ieee Access, 7, 57100-57119. doi:10.1109/access.2019.2914672
-
Khan, F. A., Noor, R. M., Kiah, M. L. M., Noor, N. M., Altowaijri, S. M., Rahman, A. U. (2019). QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things. Symmetry-Basel, 11(5), 22. doi:10.3390/sym11050634
-
Nandy, T., Bin Idris, M. Y. I., Noor, R. M., Kiah, M. L. M., Lun, L. S., Jumaat, N. B. A., . . . Bhattacharyya, S. (2019). Review on Security of Internet of Things Authentication Mechanism. Ieee Access, 7, 151054-151089. doi:10.1109/access.2019.2947723
-
Talal, M., Zaidan, A. A., Zaidan, B. B., Albahri, O. S., Alsalem, M. A., Albahri, A. S., . . . Alaa, M. (2019). Comprehensive review and analysis of anti-malware apps for smartphones. Telecommunication Systems, 72(2), 285-337. doi:10.1007/s11235-019-00575-7
-
Hussain, Muzammil; Al-Haiqi, Ahmed; Zaidan, A. A.; Zaidan, B. B.; Kiah, M. L. Mat; Anuar, Nor Badrul; Abdulnabi, Mohamed (2016). The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks, PERVASIVE AND MOBILE COMPUTING. 25, 1-25. doi:10.1016/j.pmcj.2015.12.001
-
Kiah, M. L. M., Haiqi, A., Zaidan, B. B., Zaidan, A. A. (2014). Open source EMR software: Profiling, insights and hands-on analysis, Computer Methods and Programs in Biomedicine. 117(2), 360-382
-
Zin, S. M., Anuar, N. B., Kiah, M. L. M., Pathan, A. S. K. (2014). Routing protocol design for secure WSN: Review and open research issues, Journal of Network and Computer Applications. 41, 517-5301084-8045.
-
Khan, A. N., Kiah, M. L. M., Khan, S. U., Madani, S. A. (2013). Towards secure mobile cloud computing: A survey, Future Generation Computer Systems-the International Journal of Grid Computing and Escience. 29(5), 1278-1299
-
Khan, A. N., Kiah, M. L. M., Madani, S. A., Khan, A. U. R., Ali, M. (2013). Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing, Journal of Supercomputing. 66(3), 1687-1706
-
Kiah, M. L. M., Nabi, M. S., Zaidan, B. B., Zaidan, A. A. (2013). An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1, Journal of Medical Systems. 37(50148-5598. )
-
Zakaria, W. Z. A., Kiah, M. L. M. (2013). A review of dynamic and intelligent honeypots, Scienceasia. 39, 1-5
-
Qabajeh, L. K., Kiah, L. M., Qabajeh, M. M. (2011). Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks, Acta Polytechnica Hungarica. 8(6), 191-214
-
Abdulalla, S. M., Kiah, L. M., Zakaria, O. (2010). A biological model to improve PE malware detection: Review, International Journal of the Physical Sciences. 5(15), 2236-2247
-
Al-bakri, S. H., Kiah, M. L. M. (2010). A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael, Scientific Research and Essays. 5(22), 3455-3466
-
Alam, G. M., Kiah, M. L. M., Zaidan, B. B., Zaidan, A. A., Alanazi, H. O. (2010). Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study, Scientific Research and Essays. 5(21), 3254-3260
-
Alanazi, H. O., Kiah, M. L. M., Zaidan, A. A., Zaidan, B. B., Alam, G. M. (2010). Secure Topology for Electronic Medical Record Transmissions, International Journal of Pharmacology. 6(6), 954-958
-
Kiah, L. M., Qabajeh, L. K., Qabajeh, M. M. (2010). Unicast Position-based Routing Protocols for Ad-Hoc Networks, Acta Polytechnica Hungarica. 7(5), 19-46
-
Nabi, M. S. A., Kiah, M. L. M., Zaidan, B. B., Zaidan, A. A., Alam, G. M. (2010). Suitability of Using SOAP Protocol to Secure Electronic Medical Record Databases Transmission, International Journal of Pharmacology. 6(6), 959-964
-
Yee, P. L., Kiah, M. L. M. (2010). SHOULDER SURFING RESISTANCE USING PENUP EVENT AND NEIGHBOURING CONNECTIVITY MANIPULATION, Malaysian Journal of Computer Science. 23(2), 121-140
-
Zaidan, B. B., Zaidan, A. A., Taqa, A., Alam, G. M., Kiah, M. L. M., Jalab, A. H. (2010). StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem, International Journal of the Physical Sciences. 5(11), 1796-1806
-
Qabajeh, L. K., Kiah, M. L. M., Qabajeh, M. M. (2009). A SCALABLE AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS, Malaysian Journal of Computer Science. 22(2), 99-120
Scopus
-
Alshahrani N.M., Kiah M.L.M., Zaidan B.B., Alamoodi A.H., Saif A. (2023). A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations, Computers, Materials and Continua. 75(2), 2833-2858. doi:10.32604/cmc.2023.036138
-
Binbeshr F., Por L.Y., Kiah M.L.M., Zaidan A.A., Imam M. (2023). Secure PIN-Entry Method Using One-Time PIN (OTP), IEEE Access. 11, 18121-18133. doi:10.1109/ACCESS.2023.3243114
Others
-
Ahmed Al-Hussein W, Mat Kiah ML, Lip Yee P, Zaidan BB. 2021. A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions. PeerJ Computer Science 7:e632 https://doi.org/10.7717/peerj-cs.632
-
Mahmood, A., Kiah, M.L.M., Azzuhri, S.R., Kamal, M.M., Eldabi, T., Qureshi, A.N., Azizul, Z.H. and Z aba, M.R., 2021. Wireless backhaul network s capacity optimization using time series forecasting approach. Journal of Ambient Intelligence and Humanized Computing, pp.1-12.
-
Raenu Kolandaisamy, Rafidah Md Noor, Indraah Kolandaisamy, Ismail Ahmedy, Miss Laiha Mat Kiah, Mohd Emran Mohd Tamil, Tarak Nandy, "A stream position performance analysis model based on DDoS attack detection for cluster based routing in VANET", Journal of Ambient Intelligence and Humanized Computing
-
Fawad Ali Khan, Rafidah Md Noor*, Miss Laiha Binti Mat Kiah, Noorzaily Mohd Noor, Saleh M. Altowaijri, Atiq Ur Rahman, QoS Enabled Layered based Clustering for Reactive Flooding in Internet of Things, Symmetry (IF = 1.256 Q2), (2019) (Accepted)
-
Shaik Shabana Anjum, Rafidah Md Noor, Nasrin Aghamohammadi, Ismail Ahmedy, Miss Laiha Mat Kiah, Nornazlita Hussin, Mohammad Hossein Anisi and Muhammad Ahsan Qureshi, Modelling Traffic Congestion based on Air Quality for Greener Environment: An Empirical Study, Vol. 7, Issue 1, December 2019, IEEE Access (IF=3.557,Q1)
-
Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. Kiah, S. Iqbal and Mohamed Abdulnabi. (2018). A security framework for mHealth apps on Android platform. Computers & Security. 75, 191-217. [Q1-ISI]
-
Salman Iqbal, Miss Laiha Mat Kiah & Babak Daghighi. DM-GKM: A key management scheme for dynamic group based applications. Wireless Personal Communications Journal. [UNDER-REVIEW]
-
Salman Iqbal, Miss Laiha Mat Kiah, Aws Alaa & Babak Daghighi. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients. Journal of Health and Technology. Online first on 30 Aug 2018. p1-19.
-
Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, Reza Ismail. (2018). Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey. International Journal on Advanced Science Engineering Information Technology, 8(4-2).
-
Waqar K, Miss Laiha MK, et all. A Comparative Study of Congestion Notification Techniques for Hop-by-Hop Based Flow Control in Data Center Ethernet. IET Networks. [ACCEPTED]
-
Daghighi, B. Mat Kiah, M.L. Iqbal, S. Ur Rehman, M.H. & Martin, K. (2017). Host mobility key management in dynamic secure group communication. Wireless Networks, 23(147), 1-19.
-
Mohamed Abdulnabi, Ahmed Al-Haiqi, M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan, Muzammil Hussain. (2017). A Distributed Framework for Health Information Exchange Using Smartphone Technologies. Journal of Biomedical Informatics, 69, 230-250. [Q1-ISI]
-
Mussab, Alaa. Zaidan, A.A. Zaidan, B.B. Mohammed, Talal & Kiah, M.L.M. (2017). A review of smart home applications based on Internet of Things. Journal of Network and Computer Applications, 97, 48-65.
-
Shu Yun Lim. M.L Mat Kiah. Tan Fong Ang. (2017). Security Issues and Future Challenges of Cloud Service Authentication. Acta Polytechnica Hungarica (Journal of Applied Sciences), 14(2). [ACCEPTED] DOI: 10.12700/APH.14.2.2017.2.4
-
Igbal, S. Mat Kiah, M.L. Daghighi, B. Hussain, M. Khan, S. Khan, M.K. & Choo, K.K.R. 2016. On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications. [Q1-ISI]
-
Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab and Suleman Khan. (2016). Service Delivery Models of Cloud Computing: Security Issues and Open Challenges. Security and Communication Networks.
-
Saybani, M. R., Wah, T. Y., Aghabozorgi, S. R., Shamshirband, S., Kiah, M. L. M., & Balas, V. E. (2015). Diagnosing breast cancer with an improved artificial immune recognition system. Soft Computing, 1-16.
-
Saybani, M.R. Wah, T.Y. Aghabozorgi, S.R. Shamshirband, S. Mat Kiah, M.L. & Balas, V.E. 2015. Diagnosing Breast Cancer with an Improved Artificial Immune Recognition System. Soft Computing. [ISI-Q2]
-
A.A. Zaidan, B.B. Zaidan, Ahmed Al-Haiqi, M.L.M. Kiah, Hussaen Muzamel & Mohamed Abdulnabi. 2015. Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS. Journal of Biomedical Informatics 53:390- 404. [ISI-Q1]
-
A.A. Zaidan, B.B. Zaidan, Muzammil Hussain, Ahmed Haiqi, M.L. Mat Kiah & Mohamed Abdulnabi. 2015. Multi- Criteria Analysis for OS-EMR Software Selection Problem: A Comparative Study. Decision Support Systems 78:15-27. [ISI-Q1]
-
A.A. Zaidan, H.Abdul Karim, N.N. Ahmad, B.B. Zaidan & M.L. Mat Kiah. 2015. Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning. Journal of Circuits, Systems and Computers 24(2). [ISI-Q4]
-
Abdul Nasir Khan, M.L. Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband & Atta ur Rehman Khan. 2015. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. Journal of Grid Computing 13(4):651-675. [ISI-Q1/Q2]
-
Altameem, T. A., Nikolic, V., Shamshirband, S., Petkovic, D., Javidnia, H., Kiah, M. L. M., Gani, A. 2015. Potential of support vector regression for optimization of lens system Computer-Aided Design
-
B.B. Zaidan, Ahmed Haiqi, A.A. Zaidan, Mohamed Abdulnabi, M. L. Mat Kiah & Hussaen Muzamel. 2015. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy. Journal of Medical Systems 39:51. [ISI-Q2]
-
Benyamin Khoshnevisan, Elham Bolandnazar, Shahaboddin Shamshirband, Hanifreza Motamed Shariati, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2015. Decreasing environmental impacts of cropping systems using LCA and multi-objective genetic algorithm. Journal of Cleaner Production 86:67-77. [ISI-Q1]
-
Dalibor Petkovic, Shahaboddin Shamshirband, Nor Badrul Anuar,Sareh Naji, Miss Laiha Mat Kiah & Abdullah Gani. 2015. Adaptive neuro-fuzzy evaluation of wind farm power production as function of wind speed and direction. Stochastic Environmental Research and Risk Assessment 29:793- 802. [ISI-Q1]
-
Mahmoud Reza Saybani, Shahaboddin Shamshirband, Shahram Golzari, Teh Ying Wah, Saeed Reza Aghabozorgi, Miss Laiha Mat Kiah & Valentina Emilia Balas. 2015. RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system. Medical & Biological Engineering & Computing. [Accepted] [ISI-Q2]
-
Milan Proti, Shahaboddin Shamshirband, Dalibor Petkovi, Almas Abbasi, Miss Laiha Mat Kiah, Jawed Akhtar Unar, Ljiljana ivkovi & Miomir Raos. 2015. Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm. Energy 87:343- 351. [ISI-Q1]
-
Muzammil Hussain, Ahmed Al-Haiqi, A.A. Zaidan, B.B. Zaidan, M.L.M. Kiah, Nor Badrul Anuar & Mohamed Abdulnabi. 2015. The Landscape of Research on Smartphone Medical Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations. Computer Methods and Programs in Biomedicine 122 (3):393-408. [Q1-ISI]
-
Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband & Steven Furnell. 2015. A systematic review of approaches to assessing Cybersecurity awareness. Kybernetes 44 (4):606-622. [ISI-Q4]
-
Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ismail Ahmedy. 2015. Survey of secure multipath routing protocols for WSNs. Journal of Network and Computer Applications 55:123-153. [ISI-Q1]
-
Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad A. Madani, Atta ur Rehman Khan & Shahaboddin Shamshirband. 2014. BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment. Journal of Supercomputing 70(2):946-976. [ISI-Q2]
-
Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan & Shahab Shamshirband. 2014. Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment. Journal of Supercomputing 68(2): 624-651. [ISI-Q2]
-
Afshin Jahangirzadeh,Shahaboddin Shamshirband,Saeed Aghabozorgi, Shatirah Akib,Hossein Basser, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier. Neurocomputing 140(22):172-184. [ISI-Q2]
-
Babak Daghighi & Miss Laiha Mat Kiah. 2014. A Group Key Management Scheme in Wireless Mobile Environment. ScienceAsia Journal. [Accepted] [ISI-Q3]
-
Daghighi, B., Kiah, M. L. M., Shamshirband, S., & Rehman, M. H. U. 2014. Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. Journal of Network and Computer Applications 50:1-14. [ISI-Q1]
-
Dalibor Petkovi , Shahaboddin Shamshirband, Javed Iqbal, Nor Badrul Anuar, Nenad D. Pavlovi & Miss Laiha Mat Kiah. 2014. Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper. Applied Soft Computing 22:424-431. [ISI-Q1]
-
Dalibor Petkovi, Shahaboddin Shamshirband, Nenad Pavlovi, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology. Optics and Spectroscopy. [ISI-Q4]
-
Dalibor Petkovic, Shahaboddin Shamshirband, Nenad D. Pavlovic, Abdullah Gani & Miss Laiha Mat Kiah. 2014. Kinetostatic analysis of passively adaptive robotic finger with distributed compliance. Advances in Mechanical Engineering. [ISI-Q2]
-
Ehsan Daryabeigi, Ali Zafari,Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm. International Journal of Electrical Power & Energy Systems 61:326- 334.[ISI-Q1]
-
H.O. Alanazi, A.A. Zaidan, B.B. Zaidan, M.L. Mat Kiah & S.H. Al-Bakri. 2014. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. Journal of medical systems 39:165. [ISI-Q2]
-
M.L.M. Kiah, B.B Zaidan, A.A.Zaidan, Mohamed Nabi & Rabiu Ibraheem. 2014. MIRASS: Medical Informatics Research Activity Support System using Information Mashup Network. Journal of Medical Systems 38 (37):1-15. [ISI-Q2]
-
M.L.Mat Kiah, S.H. Al-Bakri, A.A. Zaidan, B.B. Zaidan & Muzammil Hussain. 2014. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture. Journal of Medical Systems. [ISI-Q2]
-
Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ajith Abraham. 2014. Cooperative Game Theoretic Approach using Fuzzy Q-learning for Detecting and Preventing Intrusions in Wireless Sensor Networks. Engineering Applications of Artificial Intelligence 32:228-241. [ISI-Q1]
-
Shahaboddin Shamshirband, Amineh Amini, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ying Wah Teh & Steven Furnell. 2014. D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55: 212-226. [ISI-Q2]
-
Shahaboddin Shamshirband, Dalibor Petkovi , Nor Badrul Anuar, Miss Laiha Mat Kiah, Shatirah Akib, Abdullah Gani, arko ojba i & Vlastimir Nikoli . 2014. Sensorless estimation of wind speed by adaptive neuro-fuzzy methodology. International Journal of Electrical Power & Energy Systems 62:490- 495. [ISI-Q1]
-
Shahaboddin Shamshirband, Dalibor Petkovi , arko ojba i , Vlastimir Nikoli , Nor Badrul Anuar, Nor Liyana Mohd Shuib, Miss Laiha Mat Kiah & Shatirah Akib. 2014. Adaptive neuro-fuzzy optimization of wind farm project net profit. Energy Conversion and Management. [ISI-Q1]
-
Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Sanjay Misra. 2014. Anomaly Detection using Fuzzy Q-learning Algorithm in Wireless Network. Acta Polytechnica Hungarica. [ISI-Q3]
-
Shahaboddin Shamshirband, Mohd Rashid Mohd Radzi, Saeed Aghabozorgi, Sanjay Misra, Shatirah Akib & Miss Laiha Mat Kiah. 2014. Potential of Support Vector Regression for Forcasting of Stream Flow. Tehnicki Vjesnik 21(5):1017-1024. [ISI-Q3]
-
Shahaboddin Shamshirband, Nor Badrul Anuar, Babak Daghighi, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham. 2014. Co-FQL :Anomaly Detection Using Cooperative Fuzzy Q-learning in Network. Journal of Intelligent Fuzzy Systems. [ISI-Q3]
-
Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovi , Sanjay Misra & Abdul Nasir Khan. 2014. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. Journal of Network and Computer Applications 42:102- 117. [ISI-Q1]
-
Shamshirband S, Hessam S, Javidnia H, Amiribesheli M, Vahdat S, Petkovic D, Gani A, Kiah MLM. 2014. Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System. International Journal of Medical Science. 11(5):508-514. [ISI-Q1]
-
Shamshirband, S., Petkovi , D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., ojba i , ., Nikoli , V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81:520 526. [ISI-Q1]
-
Shamshirband, S., Petkovi, D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., Cojbasic, Z., Nikolic, V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81: 520-526. [ISI-Q1]
-
Shamshirband,S., Petkovic, D., Amini, A., Anuar, N.B., Nikolic, V., Cojbasic, Z., Mat Kiah, M.L. & Gani, A. 2014. Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission. Energy 67:623-630. [ISI-Q1]
-
Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan & Mazhar Ali. 2013. Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing. Journal of Supercomputing 66(3):1687-1706. [ISI-Q2]
-
Dalibor Petkovi , Nenad T. Pavlovi , Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Mohd Yamani Idna Idris. 2013. Adaptive neuro-fuzzy estimation of optimal lens system parameters. Optics and Lasers in Engineering 55:84-93. [ISI-Q2]
-
Dalibor Petkovi, arko jba I, Vlastimir Nikoli, Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Ainuddin Wahid Abdul Wahab. 2013. Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission. Energy 64:868-874. [ISI-Q1]
-
M.L Mat Kiah, Mohamed S.Nabi, B.B Zaidan & A.A Zaidan. 2013. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP-XML and SHA-1. Journal of Medical Systems 37:9971. [ISI-Q2]
-
Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ahmed Patel. 2013. An Appraisal and Design of Multi Agent Systems Based on Cooperative Wireless Intrusion Detection Computational Intelligence Techniques. Engineering Applications of Artificial Intelligence 26(9):2105-2127. [ISI-Q1]
-
Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2013. A review of dynamic and intelligent honeypot. ScienceAsia Journal 39(1):1-5. [ISI-Q3]
-
Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan & Sajjad A. Madani. 2012. Towards Secure Mobile Cloud Computing: A Survey. Future Generation Computer Systems 29(5):1278-1299. [ISI-Q1]
-
Liana Khamis Qabajeh, Miss Laiha Mat Kiah, Mohammad Moustafa Qabajeh. 2012. A More Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. Security and Communication Networks 6(3):286-308. [ISI-Q4]
-
B.B.Zaidan, A.A. Zaidan, M.L. Mat Kiah. 2011. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: Review, Participates Opinion and Expert Concerns. International Journal of Pharmacology 7(3):382-387.[ISI-Q4]
-
M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan, A. Mohammed Ahmed & Sameer Hasan Al-bakri. 2011. A review of audio based steganography and digital watermarking. International Journal of the Physical Sciences 6 (16):3837-3850. [ISI-Q2]
-
Sameer Hasan Al-Bakri, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan & Gazi Mahabubul Alam. 2011. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences 6(4):930-938. [ISI-Q2]
-
Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B. Zaidan and A.A. Zaidan. 2010. A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. Journal of Applied Sciences 10(1): 59-64.
-
Mohamed S. A.Nabi, M.L. Mat Kiah, B.B. Zaidan, A.A. Zaidan & G.M. Alam. 2010. Suitability of SOAP Protocol in Securing Transmissions of EMR Database. International Journal of Pharmacology 6(6):959-964. [ISI-Q4]
-
Por Lip Yee & Miss Laiha Mat Kiah. 2010. Shoulder Surfing Resistance Using PENUP Event and Neighboring Connectivity Manipulation. Malaysian Journal of Computer Science 23(2):121-140.[Q4-SCI][JCR2010]
-
Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks. International Journal of Computer Science and Network Security (IJCSNS) 9(2): 131-140.
-
Mat Kiah, M.L. & Martin, K.M. 2008. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and Its Applications (IJSIA) 2(1):39-52.
Books
- Salman Iqbal & Miss Laiha Mat Kiah. (2017). Secure Group Communication Protocols in Wireless Mobile Environment. LAP LAMBERT Academic Publishing.
- Omar Zakaria and Miss Laiha Mat Kiah (2002), Pengenalan Kepada Keselamatan Komputer (An Introduction to Computer Security), Mc-Graw Hill (M) Sdn Bhd.
Chapter in Books
- Liana K. Qabajeh, Miss Laiha Mat Kiah & Mohammad M. Qabajeh. 2011. A Survey of Position-Based Routing Protocols for Ad-Hoc Networks. (DOI: 10.1007/978-1- 84996-510-1_4). Book chapter in Application and Multidisciplinary Aspects of Wireless Sensor Networks: Concepts, Integration, and Case Studies, Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic and Roman Trobec (ISBN 976-1-84996-509-5), Part 1, pp. 47-83, Springer.
Article in Proceeding
- Atif Mahmood, Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Adnan N. Qureshi. 2018. Wireless Backhaul Network Optimization Using Automated KPIs Monitoring System Based on Time Series Forecasting. World Symposium on Communication Engineering 2018, ISBN 978-1-5386-7985-2.
- Chowdhury, F.Z., Idris, M. Y, Mat Kiah, M.L, Ahsan, M. A. 2017. EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing. In the Proceeding of 8th IEEE Control and System Graduate Research Colloquium, 4-5th Aug 2017 Shah Alam, Selangor, Malaysia.
- M.L.M. Kiah, Ahmed Haiqi, B.B. Zaidan, A.A. Zaidan & Mohamed Abdulnabi. 2015. Open Source EMR Software: How to Select the Best Software?. Proceeding of 3rd International Conference on Information and Computer Networks (ICICN).
- Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani. 2013. A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments. IEEE Symposium on Wireless Technology and Applications (ISWTA 2013), September 22-25, 2013, at Pullman Kuching Hotel, Malaysia.
- Nabi, M. S., Mat Kiah, M. L., Zaidan, A. A., & Zaidan, B. B. 2013. Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. In Future Generation Communication Technology (FGCT), 2013 Second International IEEE Conference. 93- 97.
- Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2013. Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning. Kaspersky s CyberSecurity for the Next Generation, National University of Singapore, Republic of Singapore, 21 - 23 March 2013.
- Hossein Javidnia,Shahaboddin Shamshirband & Miss Laiha Mat Kiah. 2012. Cooperative Multi-agent System Based on Fuzzy Quantum Cryptography. International Conference on Electrical, Computer, Electronics & Biomedical Engineering(ICECEBE 2012). Bangkok, Thailand.
- S. M. Abdulla, M. L. Mat Kiah & O. Zakaria. 2012. Minimizing Errors in Identifying Malicious API to Detect PE Malwares Using Artificial Costimulation. International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE'2012), pg. 49-54.
- Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2012. A Review on Artificial Intelligence Techniques for Developing Intelligent Honeypot. International Conference on Next Generation Information Technology (ICNIT2012). Seoul, Korea.
- Mat Kiah, M.L., Daghighi, B.,& Albakri, S. 2011. An Implementation of Group Key Management in a Wireless Environment. International Conference on Electronics, Networks and Computer (ICENC 2011), Kuala Lumpur, Malaysia.
- Daghighi, B., Mat Kiah, M.L.& Afkhami, S. 2010. Group Key Management Using Public Key Exchange. International Conference on Intelligent network & Computing, Malaysia.
- Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2010. A Scalable and Secure Position- Based Routing Protocol for MANETs. Proceedings of the Annual International Conference on Network Technologies & Communication (NTC 2010), 29-30th November, Phuket Beach Resort, Thailand, pp. N7-N12.
- Daghighi, B.,& Mat Kiah, M.L. 2009. Secure Group Communication Using Public Key Exchange. In the Proceeding of 3rd International Conference on Informatics and Technology, 27 - 28th Oct 2009 Kuala Lumpur, Malaysia.
- L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable Secure Routing Protocol for MANETs. Proceedings of The International Conference on Computer Technology and Development (ICCTD 2009), pp.143-147, 13-15 Nov, Kota Kinabalu, Malaysia. (Indexed by Ei Compendex and ISI)
- L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable, Distributed and Secure Routing Protocol for MANETs. Proceedings of the International Conference on Computer Engineering and Applications (ICCEA 2009), pp. 51-56, 6-8 June 2009, Manila, Philippine. (Indexed by Ei Compendex and Thomson ISI)
- Mohamed Elsadig Eltahir, Miss Laiha Mat Kiah, Bilal Bahaa Zaidan & Aos Alaa Zaidan. 2009. High Rate Video Streaming Steganography. International Conference on Future Computer and Communication, pp 550-553.(Indexed by EI Compendex, INSPEC, Thomson ISI, IEEE XploreTM,IEEE Computer Society digital libraries)
- Nor Aniza Abdullah, Safinaz Mustapha, Miss Laiha Mat Kiah. 2009. A Requirement Framework For Livestock Farming Web Service Application. Proceeding of the 3rd International Conference on Informatics and Technology, 27 - 28th October, Kuala Lumpur Malaysia.
- Miss L. Mat Kiah and Keith M. Martin. 2007. Secure Multicast: Investigating the Different Challenges between Internet and Mobile Environments. In Proceeding of M2USIC 2007, 19 & 20th Nov 2007, Hilton Hotel PJ, Malaysia.
- Miss Laiha Mat Kiah & Keith Martin. 2007. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. Proceeding of International Conference on Future Generation Communication Networking,06-08 Dec 2007, Jeju Island South Korea, Vol. 1, pg 99-106.
- MatKiah, M. L. and Martin, K. M. (2006). A generic group key management framework for group communication in wireless mobile environments. In Proceedings of the Sixth International Network Conference (INC2006), pp. 347-354.
- MatKiah, M. L. and Martin, K. M. (2005). Group communication: Design challenges in the development of key management frameworks in wireless mobile environments. In Proceedings of International Conference on Security and Management (SAM'05), pp. 385-390. Las Vegas, USA.
Other Publications
- Hussain, A., Luqman, W., Anuar, N. B., Kiah, M. L. M., & Kumar, S. (2018). Digital Rights Management for Cloud Based Storage Providers. Technical Report. Universiti Malaya, Kuala Lumpur, Malaysia. - Technical Report
- Zamanian, A., Feizollah, A., Anuar, NB., Kiah, M. L. M., Srikanth, K., and Kumar, S. (2017). Anomaly Detection in Policy Authorisation Activity Log. Technical Report, Universiti Malaya, Kuala Lumpur, Malaysia. - Technical Report
RESEARCH INTEREST
- Network Security (secure routing, wireless and mobile security, cybersecurity)
- Security Systems (security protocols, key management, group communication)
- Information Security (security management, cryptography, authentication)
RESEARCH PROJECT
National
- 2019 - 2023, Fundamental Research Grant Scheme (FRGS)Security Of Service-oriented Vehicular Cloud Network Using Group Signatures For Intelligent Transportation Systems ( Co-Researcher)
- 2019 - 2023, Fundamental Research Grant Scheme (FRGS)An Improved Solution On Sidechain Manipulation For Secure And Scalable Ethereum's Blockchain ( Principal Investigator(PI))
- 2019 - 2023, Fundamental Research Grant Scheme (FRGS)A Secure And Flexible Authenticated Encryption Schemes ( Co-Researcher)
- 2020 - 2023, Fundamental Research Grant Scheme (FRGS)A Framework For A Multilingual Language Identification In Conversational Speech ( Co-Researcher)
- 2021 - 2023, Others MOHESmall Medium Enterprise's Internet Of Things (iot) Threats Landscape, Talent Development And Strategic Framework ( Principal Investigator(PI))
- 2019 - 2022, Fundamental Research Grant Scheme (FRGS)Bring Your Own Device (byod) Security Policy Compliance Framework For The Malaysia Public Sector ( Co-Researcher)
- 2018 - 2021, RU Geran - Fakulti ProgramHealthcare Meets Big Data: Security And Privacy Protection ( Co-Researcher)
- 2019 - 2021, Fundamental Research Grant Scheme (FRGS)Prevent Password Reconstruction Attack For Cyber Security Authentication Using Knowledge-based Method ( Co-Researcher)
- 2019 - 2021, Government AgencyCentre For Reseach In Industry 4.0 (cr14.0) ( Co-Researcher)
- 2020 - 2021, KW PNC(JIM)Mobile Patient Health Record (mphr) ( Principal Investigator(PI))
- 2018 - 2020, Partnership GrantSmart And Security Enhanced Transportation Ecosystem For A Future Sustainable Smart City ( Co-Researcher)
- 2018 - 2020, Bantuan Kecil Penyelidikan (BKP)Wireless Backhaul Network Planning and Optimization Techniques Based on Deep Learning Algorithms ( Co-Researcher)
- 2018 - 2019, Partnership GrantAnomaly Detection in Policy Authorization Activity Logs ( Principal Investigator(PI))
- 2018 - 2019, UM Community Campus-Manage by UMCARESDecentralization Of Laboratory Exercise Via Remote Application: A State-of-the-art Approach Toward Efficient Educational Facility Resource And Energy Management In Academic Institutions ( Co-Researcher)
- 2018 - 2019, RU Geran - Fakulti ProgramDynamic Value Approach to Address Factory Default and Reset Vulnerabilities on IoT Devices ( Principal Investigator(PI))
- 2018 - 2019, RU Geran - Fakulti ProgramThe Investigation into Permutation Property of Block Ciphers ( Co-Researcher)
- 2015 - 2018, Grand Challenge - SUS (Sustainability Science)Modelling And Governing Traffic Congestion: Air Quality,emission, & Traffic Use ( Co-Researcher)
- 2013 - 2016, MOSTI-Science FundSecure Group Communication For Critical National Information Infrastructur (cnii) ( Principal Investigator(PI))
- 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG)AN IMPLEMENTION OF SECURE GROUP COMMUNICATION ( Principal Investigator(PI))
- 2010 - 2011, Postgraduate Research Grant (PPP) - ResearchA SCALABLE, DISTRIBUTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS
- 2009 - 2010, Postgraduate Research Grant (PPP) - ResearchA SCALABLE, DISTRIBTED AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS
- 2009 - 2010, Postgraduate Research Grant (PPP) - ResearchPUBLIC KEY INFRASTRUCTURE FOR SECURE MOBILE MESSAGIN USING ELLIPTIC CURVE CRYPTOSYSTEM
- 2013 - 2016, ScienceFundSecure Group Communication for Critical National Information Infrastructure ( Principal Investigator(PI))
- 2012 - 2015, High Impact Research (HIR)Implementation of Secure Framework for Electronic Medical Records (EMRs) ( Principal Investigator(PI))
- 2011 - 2013, Geran Penyelidikan Universiti Malaya (UMRG)Deployment of Virtual Honeypots ( Principal Investigator(PI))
- 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG)An Implemetation of Secure Group Communication ( Principal Investigator(PI))
- 2010 - 2011, Special FundInformation and Communication Security ( Principal Investigator(PI))
- 2008 - 2010, Short Term Research Fund (Vote F)(PJP)Secure Routing Protocols for Large Mobile Ad-Hoc Networks ( Principal Investigator(PI))
Private
- 2017 - 2019, Private FundingDrm For Cloud Based Storage Providers ( Principal Investigator(PI))
- 2017 - 2019, Private FundingAnomaly Detection In Policy Authorization Activity Logs ( Co-Researcher)
International
- 2019 - 2022, International FundingImplementation And Utilites Of Rdap For Wider Usability Among Internet Stakeholders ( Principal Investigator(PI))
- 2019 - 2022, Fundamental Research Grant Scheme (FRGS)Security of Service-Oriented Vehicular Cloud Network using Group Signatures for Intelligent Transportation Systems ( Consultant)
- 2018 - 2020, Faculty Research Grant (FRG)Healthcare meets Big Data: Security and Privacy Protection ( Consultant)
CONSULTANCY PROJECT
- Cisco Netriders Competition 2011, TAR College01 Apr 2011 - 01 Apr 2011 (National)
- Ahli Akademik Sebagai Panel Penemuduga Hlp Sessi 2012, JPA01 Apr 2011 - 01 Apr 2011 (National)
- Cisco Competition 2009, UniKL01 Dec 2009 - 01 Dec 2009 (National)
PAPER PRESENTED
PLENARY SPEAKER
- Towards Realizing My-Health Nationwide System: A Proposal on Health Information Exchange (HIE), Fifth World Congress of Computing, Engineering and Technology (WCET) and Society of Digital Information and Wireless Communications (SDIWC), The Society of Digital Information and Wireless Communications (International) (06 Sep 2016 - 08 Sep 2016)
INVITED SPEAKER
- Threat Modelling, CYBER SECURITY TECHNICAL RESEARCH WORKSHOP SEBAGAI PANEL SUBJECT MATTER EXPERT , UNITEN (University) (19 Feb 2020 - 19 Feb 2020)
- Technical Writing for High Impact Publication, Bengkel Penulisan Manuskrip dan Penerbitan Berimpak Tinggi, FSKTM UPM (University) (23 Dec 2019 - 24 Dec 2019)
- Writing Impact Papers, Bengkel Penulisan Jurnal Fakulti Teknologi dan Sains Maklumat, FTSM UKM (University) (19 Apr 2019 - 19 Apr 2019)
- How to Keep Motivated as First Class Students?, Motivational Seminar for First Class Students, FSKTM (Others) (02 Nov 2018 - 02 Nov 2018)
- Enriching Supervision Skills: What makes a good research supervisor?, Supervision and Academic Writing Workshop, Multimedia Unit, FSKTM (Others) (23 Mar 2018 - 23 Mar 2018)
- How to Write an Effective Technical Paper, Technical Writing Workshop 2017, CSM (National) (28 Mar 2017 - 28 Mar 2017)
ORAL PRESENTER
- Smart Contract Evaluation By Multi-Criteria Analysis: Selection Challenges And Open Issues, a Review, eSmarTA2023, Taiz University (International) (10 Oct 2023 - 11 Oct 2023)
- ETHEREUM BLOCKCHAIN IN HEALTHCARE: AN IMPROVED FRAMEWORK, eTELEMED 2023, IARIA (International) (24 Apr 2023 - 28 Apr 2023)
- A MALAY-ENGLISH CODE-SWITCHING BILINGUAL ASR SYSTEM, International Conference on Language Computing and Speech Processing (ICLCSP-23), Institute for Scientific and Engineering Research (ISER) (International) (07 Apr 2023 - 07 Apr 2023)
- Mobile Personal Health Record - SPHERE, PROGRAM MyTECH PITCH BIL. 8/2021 KEMENTERIAN SAINS, TEKNOLOGI DAN INOVASI (MOSTI), MOSTI (National) (07 Dec 2021 - 07 Dec 2021)
POSTER PRESENTER
- A Scientific Search Engine Based on Data Mashup, The Digital Education Show Asia 2014, MDEC  (International) (27 May 2014 - 28 May 2014)
PRESENTER
- mPhR - Mobile Personal Health Record via Smartphone Technology, Progress Report Presentation UMDT Programme, UMCIC (UMDT Programme) (University) (28 Sep 2020 - 28 Sep 2020)
- mPhR: Mobile Personal Health Records using Smartphone Technology, UM Start-up Co-Founder Search Day, UMCIC UM (University) (09 Mar 2020 - 09 Mar 2020)
- Open Source EMR Software: How to Select the Best Software?, 3rd International Conference on Information and Computer Networks (ICICN 2015), ICICN (International) (19 Mar 2015 - 20 Mar 2015)
- Suitability of Adopting S/MIME and OpenPGP Email Messages Protocol to Secure Electronic Medical Records, Second International Conference on Future Generation Communication Technologies, British Computer Society (International) (12 Dec 2013 - 14 Dec 2013)
OTHERS
- Leaders in Innovation Fellowships Programme for Commercialization & Enterpreneurship, Leaders in Innovation Fellowships, Royal Academy of Engineering & Newton Fund (International) (04 Dec 2017 - 15 Dec 2017)
- EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing, 8th IEEE Control and System Graduate Research Colloquium, UiTM (International) (04 Aug 2017 - 05 Aug 2017)
- Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning, Kaspersky s CyberSecurity for the Next Generation, FIRA (International) (26 Sep 2013 - 27 Dec 2013)
ACADEMIC/PROF. SERVICES
Evaluation
- (2024) Penilai Luar Program Sains Komputer & Rangkaian, National, (External Assessor)
- (2024) AJK Tapisan Fsss Kenaikan Pangkat (Vk7&Ds54), University, (External Evaluator)
- (2024) Academic Advisor for Phd Programme, National, (External Assessor)
- (2024) Panel Assessor for Programme Accreditation, National, (External Assessor)
- (2024) Peer Committee for Promotion Exercise - Academic, National, (External Assessor)
- (2024) AJK Penasihat Luar Program Akademik Sarjana Muda (Keselamatan Siber), National, (External Evaluator)
- (2024) AJK Pengajian Program (Jkpp) Master Keselamatan Maklumat, National, (External Assessor)
- (2024) Member of Board of Studies - Bachelor of Cs Programme, National, (External Assessor)
- (2024) External Assessor of Academic Programme Master of Protective Security Management, National, (External Assessor)
- (2023) Judge for Preliminary Round of Blockchain for Social Good Hackaton Event, National, (External Evaluator)
- (2023) Panel Penilai Bagi Kenaikan Pangkat Ds54, National, (External Assessor)
- (2023) Panel Penilai Bagi Kenaikan Pangkat Vk7, National, (External Assessor)
- (2023) Panel Penilai Bagi Kenaikan Pangkat Ds54, National, (External Assessor)
- (2023) Secure Access Control Using Modified Ciphertext Policy Attribute-Based Encryption With Performance Optimization in Cloud Computing, National, (External Examiner)
- (2023) Panel Penilai Geran Frgs (ICT), National, (External Assessor)
- (2023) External Examiner for Bcs Data Science Programme, National, (External Assessor)
- (2023) AJK Kesepakaran Bagi Kenaikan Pangkat Vk7 & Ds54, National, (External Assessor)
- (2023) Chief Assessor for Master of it Programme, National, (External Assessor)
- (2023) Panel of Assessor for Academic Programme - Mit, National, (External Assessor)
- (2023) Pemeriksa Luar Program Ijazah Sarjana Muda Sains Komp (Keselamatan Komputer), National, (External Assessor)
- (2023) Penilai Luar Akademik, National, (External Assessor)
- (2022) Penilai Luar Kertas Soalan Exam dan Skrip Peperiksaan Akhir Program Sarjana Muda dan Diploma, National, (External Assessor)
- (2022) Peer Review Matching Grant UM-Just, University, (Reviewer)
- (2022) Trusted Task Offloading Using Fog Computing for Internet of Vehicles, University, (Internal Examiner)
- (2022) A Protection Behaviour Model for Bring Your Own Device, National, (External Examiner)
- (2022) Modelling and Designing Internet of Things Security Solution for E-Commerce, National, (External Examiner)
- (2022) Penilai Luar Kenaikan Pangkat Profesor, National, (External Assessor)
- (2022) External Evaluator for Professorship Appointment - Candidate 2, International, (External Evaluator)
- (2022) External Evaluator for Professorship Appointment - Candidate 4, International, (External Evaluator)
- (2022) External Evaluator for Professorship Appointment - Candidate 7, International, (External Evaluator)
- (2022) External Evaluator for Professorship Appointment - Candidate 6, International, (External Evaluator)
- (2022) External Evaluator for Professorship Appointment - Candidate 1, International, (External Evaluator)
- (2022) External Evaluator for Professorship Appointment - Candidate 3, International, (External Evaluator)
- (2022) External Evaluator for Professorship Appointment - Candidate 5, International, (External Evaluator)
- (2022) Locpass: a Graphical Password Method to Prevent Shoulder Surfing, University, (Internal Examiner)
- (2022) Design of Improved Vulnerability Prediction Framework for Known Vulnerabilities With Machine Learning Approaches, National, (External Examiner)
- (2022) Reliable Epidemic Outbreak Prevention in Opportunistic Iot Based On Optimized Block Chain, National, (External Assessor)
- (2022) Design of a Smart Portable Farming Kit for Indoor Cultivation Using Raspberry Pi Platform, National, (External Assessor)
- (2022) AJK Kesepakaran Kenaikan Pangkat, National, (External Assessor)
- (2022) Exam Moderator Sem2 2021/2022, University, (Internal Evaluator)
- (2022) Internal Examiner for Sem2 2021/2022 Examination, University, (Internal Examiner)
- (2022) Development of Secure Lightweight Block Cipher Based On 3d Rotation Method for Data Protection On Mobile Application, National, (External Examiner)
- (2022) Panel Judge Um3mt Competition Faculty Level, University, (Internal Evaluator)
- (2022) Panel Penilai Geran Proposal Frgs Kpt 2022, National, (External Evaluator)
- (2022) Panel Penilai Geran Prgs 2022, National, (External Evaluator)
- (2022) A Lightweight Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things, University, (Internal Examiner)
- (2022) Internal Examiner for Research Project Trends of Ddos Attack During Covid-19 Pandemic, University, (Internal Examiner)
- (2022) Penilai Luar Kenaikan Pangkat Vk7, National, (External Assessor)
- (2022) Internal Evaluator for Mosti R&D Funds - Ted 1, University, (Internal Evaluator)
- (2022) Pemeriksa Luar Program Sarjana Sains (Jaminan Maklumat), National, (External Assessor)
- (2022) Panel Penilai Jk Penilaian Dana Penyelidikan Kpt 2022, National, (External Evaluator)
- (2022) Pakar Akademik Dalam Negara Bagi Program Bidang Sains Komputer, National, (External Assessor)
- (2021) Penilai Soalan Peperiksaan Akhir Sem1 2021/2022, National, (External Assessor)
- (2021) Phd Thesis, National, (External Examiner)
- (2021) Panel Penilai Geran Frgs, University, (Internal Evaluator)
- (2020) BAGI PROGRAM IJAZAH SARJANA MUDA SAINS KOMPUTER (KESELAMATAN KOMPUTER) DENGAN KEPUJIAN , (External Examiner)
- (2019) Improving the Accuracy of User Authentication is Public Cloud Computing Through Adoption of Electronic Personal Synthesis Behavior (EPSB), (External Examiner)
- (2019) REAL-TIME ANOMALY DETECTION USING CLUSTERING-AWARE OF BIG DATA TECHNOLOGIES, (Internal Examiner)
- (2017) 2017 CSM Technical Colloquim (Unpublished Category) , (Reviewer)
- (2017) External Assessor for academic promotion to Assoc Prof/Professor , (External Assessor)
- (2017) For Academic promotion to Associate Professor/Professor , (External Assessor)
- (2017) MILP-Based Approach To Evaluation Of Tweak-Aes-128 Bits Resistant To Related-Key Differential And Boomerang Attacks, (Reviewer)
- (2017) External Examiner for Academic Program - Foundation in Computing and Diploma in IT, (External Examiner)
- (2017) 2017 CSM Technical Colloquim (Published Category) , (Reviewer)
- (2017) Evaluation Panel for Newton-Ungku Omar Fund - Project Research Proposal (2) , (Evaluation Panel)
- (2017) Evaluation Panel for Newton-Ungku Omar Fund Research Project Proposal , (Evaluation Panel)
- (2017) SECURE DATA COLLECTION USING MOBILE SENSORS IN STATICALLY DEPLOYED SENSOR NETWORKS, (Reviewer)
- (2016) Reviewer for JICT (Journal of Information and Communication Technology), (Reviewer)
- (2016) Esciencefund proposals, (Panel Penilai Jemputan)
- (2016) Expert Panel for Doctoral Consortium, (Expert Panel)
- (2016) SECURED IMAGE ENCRYPTION USING RANDOM NUMBERS AND REVERSIBLE DATA HIDING, (External Examiner)
- (2016) FRGS proposals, (Panel Penilai Jemputan)
- (2016) Paper Reviewer for CSM 2016 Technical Colloquium, (Reviewer)
- (2016) Risk Assessment Model for Organizational Information Security, (External Examiner)
- (2014) Paper titled 'Study the Reality and Future of the Affordable and Secure Mobile Cloud Computing (SMCC)', (Reviewer)
- (2014) PhD thesis on 'Traffic Aware Backoff Scheduling of Low Data Rate Applications in Wireless Body Area Networks', (External Examiner)
- (2014) Paper titled 'PROTECTING WIRELESS DATA TRANSMISSION USING WATERMARKING TECHNIQUE APPROACH', (Reviewer)
- (2014) Paper titled "Path Loss Simulation in Different Radio Propagation Models with 1.8GHz and 2.6GHz Bands", (Reviewer)
- (2014) Master Thesis (Full Research) titled 'SENIBINA KESELAMATAN MULTI-AGEN UNTUK E-LELONG PATUH SYARIAH', (External Examiner)
- (2014) Paper titled "Issues Affecting the Adoption of IPv6", (Reviewer)
- (2013) PhD Thesis on 'Enhancing Security in Mobile IPv6 with Private Key-based Binding Update Key Protocol', (Internal Examiner)
- (2013) Phd Thesis on 'Infrastructure Based Management And Optimization For NEMO Correspondent Registration' , (External Examiner)
- (2013) Master Thesis on 'Key Authentication in Closed Communities Using Images', (External Examiner)
- (2013) Master Thesis on 'Parallel Chaotic Hash Function Based on the Shuffle-Exchange Network', (External Examiner)
- (2013) Master Thesis on 'Kajian Perbandingan Model Gelombang Penyebaran Radio Terhadap Rangkaian 4G' , (External Examiner)
- (2012) Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique - Re-Examination, (Internal Examiner)
- (2012) M-XKMS: Adaptation of XKMS for Mobile Devices to Secure Short Message Service Using XML Key Management Specification, (Reviewer)
- (2012) Research Project for MCS candidate - A Framework to Support Cross-Platform Application Development for Mobile Devices , (Internal Examiner)
- (2012) A Generic Relation to Assess Interdependency of QoE and QoS, (Internal Examiner)
- (2012) Development of High Secure Data Hiding System Using Least Significant Bit Algorithm, (External Examiner)
- (2012) SECURITY ANALYSIS OF WATERMARKING PROTOCOLS AND SCHEMES BASED ON SINGULAR VALUE DECOMPOSITION , (External Examiner)
- (2012) Research Project for MCS candidate - Improving DSR Routing Protocol Using TTL-Based in Mobile Ad Hoc Network (MANET), (Internal Examiner)
- (2011) A PROXY-ASSISTED ROUTING FOR EFFICIENT DATA TRANSMISSION IN MOBILE AD HOC NETWORKS , (Internal Examiner)
- (2011) An Approach The Implementation Of Access Control Policy And Identity Management In The Public Sector Agency , (External Examiner)
- (2011) Designing a Low Cost Implementation of E‐Commerce Security by Optimizing the Parameters of NTRU Cryptosystem Algorithm for Inderscience Publishers Ltd. , (Reviewer)
- (2011) A Reservation‐Based Multiple Access Scheme with Adaptive Permission Probability for Wireless Systems Journal of King Saud University ‐ Computer and Information Sciences, (Reviewer)
- (2011) Paper on A NEW IDENTITY BASED GROUP SIGNATURE SCHEME, (Reviewer)
- (2010) Master Dissertation on Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme, (Internal Examiner)
- (2010) Paper on BIOMETRIC ENCRYPTION THROUGH MODIFIED HILL CIPHER TECHNIQUE , (Reviewer)
- (2010) Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique, (Internal Examiner)
- (2010) Master Dissertation on Throughput Optimization of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), (Internal Examiner)
- (2009) Master Dissertation on Implementation of Elliptic Curve Cryptography Using Biometric Features to Enhance Security Services, (Internal Examiner)
- (2007) For paper publications of Malaysian Journal of Computer Science (MJCS) , (Editor)
Contribution to external organisation
- (2024) Visiting Professor At Institute of Informatics & Computing in Energy (Iice), National, (Adjunct/Visiting Professors)
- (2023) Participation in Feedback Workshop for a Proposed Maturity Model in Cybersecurity Incident Response, National, (Expert Advisor)
- (2023) Juri Anugerah Iucel 2023, National, (Technical Advisor)
- (2023) Ahli Kumpulan Fokus Myseal, National, (Expert Advisor)
- (2017) Panellist for HLAF Scholarship Interview, Human Life Advancement Foundation
- (2017) TWG ICT FGD Workshop , EPU Jabatan Perdana Menteri
- (2016) Panellist for Human Life Advancement Foundation (HLAF) Scholarships Interview, Human Life Advancement Foundation
- (2016) Focus Group Member for MySEAL project Cybersecurity, Cybersecurity Malaysia
- (2014) Panel Viva Voce - Master of Info Tech (Full Research), Fakulti Teknologi dan Sains Maklumat UKM
- (2014) PANEL PENILAI BAGI SESI PEMBENTANGAN KERTAS CADANGAN SKIM GERAN PENYELIDIKAN PEMBANGUNAN PROTOTAIP (PRGS) FASA 1/2014 , IPPP Universiti Malaya
- (2013) Panel for Viva Voce - Phd Degree Candidate, Faculty of Information Science & Technology, UKM
- (2013) Panel for Viva Voce - Phd Degree Candidate, Faculty of Computer Science & Info. Tech., University of Malaya
- (2010) Reviewers for ACTA Press Journal, ACTA Press Journal Canada
- (2008) Panel Advisor for Competency Standards for Polytechnic Graduates, Jabatan Pengajian Politeknik dan Kolej Komuniti Kementerian Pengajian Tinggi Malaysia
- (2008) A Speaker for Technical Writing Workshop 2017, CyberSecurity Malaysia
- (2008) Technical Committee, 2017 International Conference on Biometric Engineering and Forensics
Contribution to event
- (2021) Participant to Pitch On Mphr Project, National, (Participant)
Mentoring
- (2022) Penceramah Untuk Program Promotion Interview Coaching Session', National, (Mentor)
SUPERVISION
Postgraduate Student
PhD/ Doctoral
-
(2024) method of secured tacit knowledge transfer with the implementation of steganography, Mohd Hilal Muhammad
-
(2024) Anomaly based Intrusion Detection System Perspective to Data Center: Applying Machine Learning Approaches, MD RAWSHAN ALAM
-
(2024) Securing Internet of Things (IoT) from Human Misbehavior, NAEEM AL-SHUKAILI
-
(2024) Analysis of Cryptography Techniques in Cloud Computing, MOHAMMED RAFEET
-
(2024) Internet of Things (IoT): Architectural, MARWAH ALABBOODI
-
(2024) Security Control Assessment Efficiency Framework, NOOR ASHITAH BINTI ABU OTHMAN
-
(2024) A Framework for Smart Contract Evaluation and Selection Using Multi Criteria Analysis, NORAH MOHAMMAD R ALSHAHRANI
-
(2024) Blockchain Eligibility Assessment Processing (Beap) Framework In Federal Government For New Blockchain Dapps Implementatiom By Government Agencies In The Context Of Malaysia, SIVAMOHAN A/L V SHUNMUGAM
-
(2024) Efficient Energy Management Model for IoT Using Public Key Encryption, ABDUL WAHID SOOMRO
-
(2024) TRACEABILITY IN THE HALAL FOOD SUPPLY CHAIN ON BLOCKCHAIN TECHNOLOGY WITH HARMONIZED SMART CONTRACT BASED ON MULTIPLICITY OF HALAL STANDARDS, MOHD RIZAL BIN KADIS
-
(2023) SOFTWARE BASE FOG-ENABLE GATEWAY FOR VULNERABILITY ASSESSMENT FOR IOT SYSTEM, MANIMARAN MANIKAM
-
(2023) Cross-Silo Implementation of Federated Learning in Healthcare for 6G: Leveraging VPN-Based Wireless Backhaul Networks, ATIF MAHMOOD
-
(2022) Behavioral System Analysis Model for Ransomware Detection at Early Stage using Machine Learning, Tan Joco Guan Min
-
(2022) AN ACQUISITION AND A MODULATED RECOGNITION SYSTEM FOR DRIVER PROFILING IN MALAYSIA, WARD AHMED ALAULDDIN AL-HUSSEIN
-
(2022) BYOD SECURITY POLICY COMPLIANCE FRAMEWORK IN MALAYSIAN PUBLIC SECTOR, RATHIKA A/P PRAMMY SAMY @ PALANISAMY
-
(2022) Cryptanalysis of Some Public-Key Cryptosystems Using Heuristic Methods, DIAN RACHMAWATI ERI
-
(2022) OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification, MUHAMMAD MUZAFFAR HAMEED
-
(2022) Parallel Sponge-Based Authenticated Encryption with Side-Channel Protection and Adversary-Invisible Nonces, MOHAMUD AHMED JIMALE
-
(2022) A SECURE PIN-ENTRY METHOD RESISTANT TO SHOULDER-SURFING AND RECORDING ATTACKS, FARID SALEM SAEED BINBESHR
-
(2021) TRUST MODEL OF IOT:TRUST IS COMBINATION OF SECURITY, PRIVACY AND CONFIDENTIALITY IN AN IOT ENVIRONMENT, MOHAMMAD KHALIQUR RAHMAN
-
(2021) QoS ENABLED CROSS-LAYERED CLUSTERING FOR MITIGATING FLOODING QUERIES IN INTERNET OF THING NETWORKS, FAWAD ALI KHAN
-
(2017) -, FAZIDAH BINTI OTHMAN
-
(2016) A Secure Multipath Routing Protocol for Wireless Sensor Network (WSN), SHAZANA BINTI MD ZIN
-
(2014) -, ABDUL MUEED KHALID
-
(2013) A Security Framework For Mobile Health Applications On Android Platform, MUZAMMIL HUSSAIN
-
(2012) Network Security, Salman Iqbal Malik
-
(2012) Information Security, Noor Hayani Binti Abd Rahim
-
(2012) Computer Security, Mohamed Shabbir Hamza Abdulnabi
-
(2012) Computer Forensic, Nordiana Binti Rahim
-
(2012) Assessment of Cybersecurity Awareness Program On Personal Data Protection Among Youngsters in Malaysia, NOOR HAYANI BINTI ABD RAHIM
-
(2012) An Artificial Co-stimulation Classifier for Malicious API calls classification in Portable Executable Malwares, SAMAN MIRZA ABDULLA
-
(2011) Wireless Security, Shazana Binti Md Zin
-
(2011) Secure Group Communication, Babak Daghighi
-
(2011) Network Security, Shahaboddin Shamshirband
-
(2011) Network Security, Lim Shu Yun
-
(2011) Network Security, Abdul Nasir Khan
-
(2011) Energy Efficient Data Security Schemes for Mobile Users in Cloud Environment, ABDUL NASIR KHAN
-
(2011) COOPERATIVE MULTI AGENTS FOR INTELLIGENT INSTRUSION DETECTION AND PREVENTION SYSTEMS, SHAHABODDIN SHAMSHIRBAND
-
(2011) A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, LIANA K. M. QABAJEH
-
(2009) Network Security, Abdul Mueed Khalid
-
(2008) Secure Group Communication, Fazidah binti Othman
-
(2008) A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, LIANA K. M. QABAJEH
-
(2008) A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, Liana Khamis Qabajeh
-
(2008) An Artificial Co-stimulation Classifier of Malicious API calls classification in Portable Executable Malwares, Saman Mirza Abdulla
-
(2008) An Artificial Co-stimulation Classifier for Malicious API calls classification in Portable Executable Malwares, SAMAN MIRZA ABDULLA
Master
-
(2024) Blockchain Technology on Cybersecurity Innovation, NG ZHENG HUI
-
(2024) An Alternative Statistical Feature Set to Reduce Model Accuracy Degradation Over Time for IoT Device Identification Using Random Forest, NIK AHMAD AQIL BIN NIK AZEMI
-
(2023) An Improved Solution on Sidechains for Scalable Ethereum's Blockchain, IQRA SADIA
-
(2022) Fuzzy-Based Classification with a Three-tier Fog Computing Architecture for Minimizing Latency in IoT Healthcare System, SAIKET JAMAN ALAMIN
-
(2022) An Approach for Improving Configuration Management System for Data Privacy In Multi Cloud Environment, REBEN DALSHAD IBRAHIM
-
(2021) A COMPARATIVE ANALYSIS ON CLASS IMBALANCE TECHNIQUES IN NETWORK TRAFFIC CLASSIFICATION, SHOVON DATTA RONY
-
(2020) Flexible Content Authorization Using Digital Rights Management in Cloud Computing, ALI HUSSAIN
-
(2019) Personalized Employment-Oriented Recommender System Using Content-Based User Profiling, SADRA SHOKOUHI
-
(2019) Wireless Backhaul Network Optimization Using Network's Capacity Utilization based on Deep Learning Algorithms, ATIF MAHMOOD
-
(2018) Implementation of Fully Homomorphic Encryption for Privacy-Preserving QRS Detection in Electrocardiogram Data, JESSE EPPERSON
-
(2016) A Game Theoretic Approach to Mitigate Economic Denial of Sustainability, FAHAD ZAMAN CHOWDHURY
-
(2011) An Anti-SMS Spam Enegihe, HAZHIR HAJIAN
-
(2010) Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, MOHAMED SHABBIR HAMZA ABDULNABI
-
(2010) A Case Based Reasoning Approach for Dynamic Honeypot, WIRA ZANORAMY ANSIRY BIN ZAKARIA
-
(2010) A Case Based Reasoning Approach for Dynamic Honeypot, Wira Zanoramy
-
(2009) Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-bit Encoding Audio Steganagraphy Technique, MOHAMMED A AHMED
-
(2009) Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, Mohamed Shabbir Hamza Abdulnabi
-
(2009) Hybrid Techniques of NTRU and AES for Improving the Security of Electronic Medical Records, Alanazi, Hamdan Owaid R
-
(2009) An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, SAMER HASAN SAIF
-
(2008) Key Management for Secure Group Communication in a Wireless Environment, BABAK DAGHIGHI
-
(2008) Implementation of Wireless Security on Virtual WiFi, MOHAMMAD YASIN ARASHPOUR
-
(2008) High Capacity Image Steganography Algorithm Based on Artificial Neural Network, HAMSAH AHMED GHALEB AL-JBARA
-
(2008) An Implementation of Video Steganography Using the LSB Method, MOHAMED ELSADIQ ELTAHIR AHMED
-
(2008) An Image Steganography Using Texture Analysis for High Rate Data Hiding, ANAS MAGEED HAMID
-
(2007) Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-Bit Encoding Audio Steganography Technique, Mohammed-A-Ahmed
-
(2007) Implementation of Wireless Security on Virtual WIFI, Mohammad Yasin Arashpour
-
(2007) Implementation of End-To-End Secure SMS Using Elliptic Curve Cryptography, ADDY MAJED ABDALKAREM ALQURAAN
-
(2007) High Capacity Image Steganography Algorithm Based on Artificial Neural Network, Hamsah Ahmed Ghaleb Al-Jbara
-
(2007) An Image Steganography Using Texture Analysis for High Rate Data Hiding, Anas Mageed Hamid
-
(2007) An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, Samer Hasan Saif Qaid
-
(2006) The Implementation of Secure Group Communication in Wireless and Mobile Environment, Babak Daghighi
-
(2006) Implementation of End-to-End Secure SMS Using Elliptic Curve Cryptography, Addy Majed Abdalkarem Alquraan
-
(2006) An Implementation of Video Steganography Using the LSB Method, Mohamed El Sadiq El Tahir Ahmed
TEACHING
Master
- (2009) WRGA6312 - Computer Network Security
- (2007) WRGA6312 - Computer Network Security
Bachelor
- (2022) WIC3002 - Cryptography
- (2021) WIC3002 - Cryptography
- (2021) WIA1005 - Network Technology Foundation
- (2012) WRES2110 - Fundamentals of Network Technology
- (2012) WRES2111 - Fundamentals of Network Technology
- (2011) WRES2111 - Fundamentals of Network Technology
- (2011) WRES3301 - Cryptography
- (2010) WRES2108 - Advance Network Technology
- (2010) WRES2110 - Fundamentals of Network Technology
- (2009) WRES2110 - Fundamentals of Network Technology
- (2008) WRES3307 - Computer Security
- (2008) WRES3313 - Wireless Network Security
- (2007) WXET3141 - Introduction to Computer System
PATENT/IPR
- Aggregating Device And Method For Search Engine-Based Data Mash-Up Of Medical Informatics Research ActivityPATENT
- LOW COST POWERED UPPER LIMB PROSTHESISPATENT
- Data for Driver Profiling in MalaysiaCOPYRIGHT
- EMERALD Research & Supervision Training ModuleCOPYRIGHT
- METHOD AND SYSTEM FOR DIGITAL VIDEO INPAINTING DETECTIONPATENT
- Implementation MATLAB Toolbox of Registration Data Access Protocol (RDAP) for Wider Usability Among Internet StakeholdersCOPYRIGHT
- Implementation Browser Utilities for Registration Data Access Protocol (RDAP) for Wider Usability Among Internet StakeholdersCOPYRIGHT
- Smart and Security Enhanced Transportation Ecosystem for a Future Sustainable Smart City FrameworkCOPYRIGHT
- GSceeNQUIRE : Green Screen Video Identification ModulePATENT
- A FRAMEWORK AND RELATED METHODS FOR HEALTH INFORMATION EXCHANGE USING MOBILE PERSONAL HEALTH RECORDSPatent (National)
- SECURE VIDEO CONFERENCING FRAMEWORK FOR REAL TIME APPLICATION: METHODOLOGY AND SYSTEMPatent (International)
- A Scientific Search Engine Based on Data MashupPatent (International)
SOCIAL RESPONSIBILITY ACTIVITIES
- Interviewed for Promoting On Product Commercialization - Via UMCIC for Website and Youtube Channels, (28 Feb 2020 - 28 Feb 2020)
- AJK Induk Pemilihan Mppum Sesi 2012/2013, (18 Sep 2012)
- Executive Editor for Malaysian Journal of Computer Science, (01 Aug 2007 - 01 Aug 2008)
COURSE ATTENDED
Internal / External Course
EXTERNAL COURSE
-
ANDROID APPLICATION DEVELOPMENT -LEVEL 1, Mdec's Knowledge Worker Development Centre (27 Sep 2016 - 29 Sep 2016)
-
BENGKEL KUMPULAN FOKUS MYSEAL, Putrajaya (24 Jan 2017 - 24 Jan 2017)
-
BENGKEL MYSEAL, Putrajaya (22 Dec 2016 - 22 Dec 2016)
-
BENGKEL PENILAIAN FASA PERTAMA UNTUK MEMUKTAMADKAN AKSA MYSEAL, Putrajaya Mariott (08 Jun 2017 - 08 Jun 2017)
-
BENGKEL PENILAIAN FASA PERTAMA MYSEAL, Putrajaya (04 Apr 2017 - 06 Apr 2017)
-
RESEARCH LEAVE - SKYDRM & IOT SECURITY, Fsktm (01 Nov 2017 - 31 Dec 2017)
-
LEADERS IN INNOVATION FELLOWSHIPS, The Hoxton, Shoreditch, London (04 Dec 2017 - 15 Dec 2017)
-
CYBER CRIME PREVENTION & DETECTION, Suite C-08-05 Wisma Goshen Plaza Pantai, Bangsar Trade Center No 5, Jalan4/83a, Off, Jalan Pantai Baharu, Bangsar 59200 Kl (16 Apr 2021 - 18 Apr 2021)
-
BENGKEL KUMPULAN FOKUS MYSEAL, Avillion Hotel Port Dickson (01 Sep 2016 - 03 Sep 2016)
-
BENGKEL CISCO NETWORKING ACADEMY 2012, Hard Rock Cafe Hotel, Penang (03 Oct 2012 - 05 Oct 2012)
-
CERTIFIED ETHICAL HACKER & CERTIFIED ECCOUNCIL INSTRUCTOR TRAINING, Kuala Lumpur (17 Dec 2012 - 21 Dec 2012)
-
LEADERSHIP TRAINING FOR MANAGERS, Kampus Akept Bandar Enstek (17 Sep 2013 - 19 Sep 2013)
-
BENGKEL PENYEDIAAN HIGH LEVEL STRATEGIC ICT BLUE PRINT BERSAMA GREAT MINDS ICT KPT, Puteri Resort Ayer Keroh Melaka (08 Mar 2013 - 10 Mar 2013)
-
BENGKEL KAJIAN SEMULA NATIONAL BIOINFORMATICS ROADMAP, Sirim Berhad, Shah Alam, Selangor (07 Aug 2008 - 08 Aug 2008)
-
MYREN TECHNICAL SEMINAR 'TOWARDS DNSSEC & IPV6', Msc Malaysia Innovation Centre, Cyberjaya (14 Jan 2010 - 14 Jan 2010)
-
KURSUS SPSS WORKSHOP PART 1, Akademi Pengajian Islam, Universiti Malaya (18 May 2011 - 19 May 2011)
-
PRACTICAL CASE STUDY BASED DATA INSECURITY WORKSHOP, Kuala Lumpur (13 Feb 2012 - 15 Feb 2012)
-
CERTIFIED ETHICAL HACKER, Kuala Lumpur (25 Jun 2012 - 29 Jun 2012)
-
BENGKEL BAGI MEMBINCANGKAN PELAN PEMBANGUNAN SENARAI ALGORITMA KRIPTOGRAFI NEGARA (MYSEAL), Hotel Bangi-Putrajaya (07 Apr 2016 - 08 Apr 2016)
-
RESEARCH SUPERVISOR TRAINING WORKSHOP, Institut Pengajian Siswazah UM (20 Jul 2011 - 20 Jul 2011)
-
AWARENESS PROGRAM : INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS)ISO/IEC 27001, Cyberjaya (14 Apr 2011 - 14 Apr 2011)
-
BENGKEL KE ARAH KOLABORASI PENYELIDIKAN TRISTED COMPUTING, Mimos Berhad, Technology Park Malaysia, Kuala Lumpur (05 Aug 2008 - 05 Aug 2008)
COURSES ORGANIZED BY PTJ
-
SPECTRUM (CONDUCTING PEER ASSESSMENT USING WORKSHOP ACTIVITY, Makmal Komputer, Fakulti Sains (30 Jun 2016 - 30 Jun 2016)
-
SPECTRUM (WEB 2.0), Makmal Komputer, Fakulti Sains (15 Jun 2016 - 15 Jun 2016)
-
CONFLICT MANAGEMENT WORKSHOP, Seminar Room a & B , Ips (13 May 2010 - 13 May 2010)
-
WORKSHOP ON BASIC COACHING SKILLS, Bilik Latihan 14-1 Wisma R&D (21 Feb 2014 - 21 Feb 2014)
-
BENGKEL PEMBANGUNAN KEPIMPINAN, Petaling Jaya Hilton (16 Oct 2008 - 16 Oct 2008)
RESEARCH
-
BLOCKCHAIN TECHNOLOGY, (14 Feb 2022 - 13 Mar 2022)
-
SECURE GROUP COMMUNICATION IN WIRELESS MOBILE ENVIRONMENT, (01 May 2010 - 01 Jul 2010)
-
(1) SECURE FRAMEWORK FOR EMR - HIR FUND (2) SECURE GROUP COMMUNICATION - ESCIENCE FUND, (01 Dec 2013 - 20 Dec 2013)
CONFERENCE
-
CISCO NETWORKING ACADEMY PARTNER SUMMIT, Hard Rock Hotel (03 Oct 2012 - 05 Oct 2012)
-
2015 THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER NETWORKS (ICICN 2015) , Florence (18 Mar 2015 - 21 Mar 2015)
-
SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGIES (FGCT 2013), City Conference Center, Holborn Viaduct, London (11 Dec 2013 - 15 Dec 2013)
-
COLLABORATION VISIT AND MEETING WITH SCH UNIVERSITY - IOT RESEARCH, Sch Uni, Korea (17 Jun 2022 - 26 Jun 2022)