Curriculum Vitae

PERSONAL DETAILS

PROF. DR. MISS LAIHA BINTI MAT KIAH

  • Professor

  • Department of Computer System & Technology
    Faculty of Computer Science & Information Technology
  •    +603-79676354
  •   misslaiha@um.edu.my

ADMINISTRATIVE DUTIES
(Role),(Level),(Duration)
  • Deputy Dean of Higher Degree, UNIVERSITI MALAYA, 07/10/2019 to present
  • WAKIL SENAT/AHLI JK PEMILIH KE JAWATAN PROF C, University Malaya, 25/01/2019 to present
  • AHLI SENAT, University Malaya, 17/12/2018 to present
  • AHLI JK PEMILIH CUTI BELAJAR DAN SLAB/SLAI 2019/2020, University Malaya, 01/01/2019 to 31/12/2020
  • Programme Coordinator, Faculty, 07/08/2017 to 06/08/2020
  • Ahli JK Tapisan (Pelantikan), Faculty, 16/03/2017 to 15/03/2020
  • Ahli JK Tapisan - Fakulti Sains, Faculty, 03/07/2017 to 31/12/2019
  • Ahli JK Penilai Luar Program - Bidang Sains Teknologi dan Klinikal, University Malaya, 01/06/2017 to 16/12/2018
  • Wakil Senat - JK Perpustakaan Universiti, University Malaya, 26/05/2017 to 16/12/2018
  • Pengawai Penilai Prestasi Khas, University Malaya, 15/05/2017 to 14/05/2018
  • Wakil Senat - Ahli JK Pengajian (Ijazah Tinggi), Faculty, 01/05/2017 to 16/12/2018
  • Ahli Panel Penemuduga Cuti Belajar dan SLAB/SLAI, University Malaya, 03/01/2017 to 31/12/2018
  • AJK Kump Penyelidik ICT Security Research Group, Faculty, 13/12/2016 to 12/12/2018
  • AJK Kump Penyelidik IoT, Faculty, 13/12/2016 to 12/12/2018
  • Wakil Senat - JK Induk Pengecualian dan Pemindahan Kredit, University Malaya, 26/08/2016 to 16/12/2018
  • Wakil Senat - Ahli Jawatankuasa Pemilih, University Malaya, 01/08/2016 to 16/12/2018
  • Senate Member, University Malaya, 17/12/2015 to 16/12/2018
  • Wakil Pengerusi, Faculty, 12/09/2016 to 11/06/2017
  • Ahli JK Badan Penasihat Dekan, Faculty, 15/08/2016 to 30/06/2017
  • Ahli JK Penyelidikan, Faculty, 10/08/2016 to 09/08/2017
  • Pengerusi/Panel REMOS.stk, Faculty, 25/11/2016 to 25/11/2016
  • Ahli JK Kurikulum Jabatan - Program Sarjana, Faculty, 01/03/2014 to 28/02/2016
  • Deputy Dean of Higher Degree, UNIVERSITI MALAYA, 01/07/2014 to 31/07/2014
  • Deputy Dean of Higher Degree, UNIVERSITI MALAYA, 01/07/2011 to 30/06/2014
  • Acting Dean, Faculty, 22/05/2014 to 23/05/2014
  • Ahli Panel Penemuduga, University Malaya, 14/11/2013 to 13/11/2014
  • Ahli JKIT FSKTM, Faculty, 01/07/2013 to 30/06/2014
  • AJK Penilaian Slim Geran FRGS & ERGS Peringkat UM, University Malaya, 21/05/2013 to 31/12/2014
  • AJK Bright Spark FSKTM, Faculty, 01/07/2012 to 30/06/2014
  • PENGERUSI - JK Kurikulum FSKTM (Ijazah Tinggi), Faculty, 01/07/2011 to 30/06/2014
  • Deputy Dean of Higher Degree, Faculty, 01/07/2011 to 30/06/2014
  • PENGERUSI - JK Ijazah Tinggi (JKIT), Faculty, 01/07/2011 to 30/06/2014
  • Acting Dean, Faculty, 05/07/2013 to 09/07/2013
  • AJK PGRES FSKTM, Faculty, 07/02/2013 to 31/12/2013
  • Acting Director, Faculty, 10/01/2013 to 11/01/2013
  • Ahli Panel Penemuduga, University Malaya, 31/10/2012 to 30/10/2013
  • Timbalan Pengerusi NADI, Faculty, 22/08/2011 to 21/08/2013
  • Acting Director, Faculty, 29/11/2012 to 30/11/2012
  • Acting Director, Faculty, 26/09/2012 to 28/09/2012
  • Acting Director, Faculty, 22/09/2012 to 25/09/2012
  • Acting Director, Faculty, 28/08/2012 to 13/09/2012
  • Jawatankuasa Kerja Audit Program Ijazah Tinggi (JKAPIT), University Malaya, 06/08/2012 to present
  • Acting Director, Faculty, 17/06/2012 to 22/06/2012
  • AJK PGRES FSKTM , Faculty, 22/02/2012 to 31/12/2012
  • Wakil Tetap Fakulti Ke JawatanKuasa Penasihat Akademik, IPS, Faculty, 26/08/2011 to present
  • Head of Department, UNIVERSITI MALAYA, 13/05/2008 to 31/08/2009
  • Head of Department, Faculty, 12/05/2008 to 31/08/2009
ACADEMIC QUALIFICATION
(Qualification),(Field),(Institution),(Year)
  • Doctoral Degree (PhD), KESELAMATAN MAKLUMAT, ROYAL HOLLOWAY, UNIVERSITY OF LONDON, UNITED KINGD
  • MASTER DEGREE, KESELAMATAN KOMPUTER, ROYAL HOLLOWAY, UNIVERSITY OF LONDON, UNITED KINGD
  • PhD (London), INFORMATION SECURITY, ROYAL HOLLOWAY, UNIVERSITY OF LONDON, UNITED KINGD
  • MSc (London), INFORMATION SECURITY, ROYAL HOLLOWAY, UNIVERSITY OF LONDON, UNITED KINGD
  • B.Sc.COMP.SC.(HONS), SAINS KOMPUTER, UNIVERSITI MALAYA (UM)
MEMBERSHIPS
(Organisation),(Role),(Duration),(Level)
  • AJK Semakan Semula Sistem SAPT UM, Member, 2021 to present (University)
  • Associate Editor , Committee Member, 2021 to present (International)
  • Panel Temu Duga Program Penajaan/Cuti Belajar Bergaji Penuh (CBBP) Pegawai Pendidikan Pengajian Tinggi (PPPT) di IPTA, Member, 2021 to 2021 (National)
  • Ahli Jawatankuasa Pemilih Cuti Belajar SLAB/SLAI, Member, 2021 to present (University)
  • WAKIL IPT (CSAM Secretariat) - UM , Committee Member, 2021 to present (National)
  • Penyelaras Pemasaran, Member, 2021 to present (University)
  • IEEE Senior Member, Member, 2021 to 2021 (International)
  • Ahli Jawatankuasa Program Bidang Sains Komputer - Ijazah Sarjana dan Ijazah Sarjana Muda, Member, 2020 to present (National)
  • Malaysia Board of Technologists, Member, 2018 to 2021 (National)
  • Malaysian Society for Cryptology Research (MSCR), Member, Since 2017 (National)
  • MPN - Majlis Profesor Universiti , Member, Since 2017 (National)
  • EC Council, Member, 2012 to 2021 (International)
  • Centre for Research in Industry 4.0 (CRI4.0), Committee Members, 2018 to 2020 (National)
  • IEEE - Senior Member, Committee Member, 2016 to 2020 (National)
  • IEEE - Senior Member, Committee Member, 2016 to 2019 (International)
  • EC Council, Committee Member, 2012 to 2018 (National)
SPECIALIZATION
(Area)
Area of Expertise
  • SECURITY SERVICES SN: DIGITAL FORENSIC, STEGANOGRAPHY, NETWORK SECURITY, PUBLIC KEY INFRASTUCTURE AND BIOMETRICS (Cloud computing, cyber security)
  • Information Security (Applied Cryptography, Applied Steganography)
  • COMMUNICATION PROTOCOLS (Wireless Security, Ad-hoc Network Security, Mobile Communication Security)
  • SECURITY PROTOCOLS (Group Communication, Key Management, Wireless Mobile Environments)
  • Research Interest
  • Network Security (secure routing, wireless and mobile security, cybersecurity)
  • Security Systems (security protocols, key management, group communication)
  • Information Security (security management, cryptography, authentication)
  • TEACHING
    (Course Title),(Level of Study),(Institution),(Academic Session)
    Teaching
  • WRES2108 - Advance Network Technology, First Degree, UNIVERSITY MALAYA (2009/2010)
  • WRES2110 - Fundamentals of Network Technology, First Degree, UNIVERSITY MALAYA (2010/2011)
  • WRES2111 - Fundamentals of Network Technology, First Degree, UNIVERSITY MALAYA (2012/2013)
  • WRES2111 - Fundamentals of Network Technology, First Degree, UNIVERSITY MALAYA (2011/2012)
  • WRES2111 - Fundamentals of Network Technology, First Degree, UNIVERSITY MALAYA (2013/2014)
  • PUBLICATIONS
    (Title of publication in APA style)
    Refereed Journals
    2021
    • Mahmood, A., Kiah, M.L.M., Azzuhri, S.R., Kamal, M.M., Eldabi, T., Qureshi, A.N., Azizul, Z.H. and Z aba, M.R., 2021. Wireless backhaul network s capacity optimization using time series forecasting approach. Journal of Ambient Intelligence and Humanized Computing, pp.1-12. (WoS)
    2020
    • Shaik Shabana Anjum, Rafidah Md Noor, Ismail Ahmedy, Mohammad Hossein Anisi, Saaidal Razalli Azzuhri, Miss Laiha Mat Kiah, Jaime Lloret, Pradeep Kumar, An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks, Ad Hoc & Sensor Wireless Networks (F=0.948, Q4), 2020 (Accepted) (WoS)
    • Iqbal, S., Mat Kiah, M. L., Rehman, A., Abbas, Z., & Daghighi, B. (2020). DM-GKM: A key management scheme for dynamic group based applications. Computer Networks, vol.182, 107476, ISSN 1389-1286. https://doi.org/10.1016/j.comnet.2020.107476 (WoS)
    2019
    • Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Miss Laiha Mat Kiah, Lau Sian Lun, Nor Badrul Annuar Juma'at, Ismail Ahmedy, Norjihan Abdul Ghani and Sananda Bhattacharyya, Review on Security of Internet of Things Authentication Mechanism, IEEE Access (IF=4.098, Q1), Volume: 7, Issue:1, DECEMBER 2019, DOI 10.1109/ACCESS.2019.2947723 (WoS)
    • Shaik Shabana Anjum, Rafidah Md Noor, Nasrin Aghamohammadi, Ismail Ahmedy, Miss Laiha Mat Kiah, Nornazlita Hussin, Mohammad Hossein Anisi and Muhammad Ahsan Qureshi, Modelling Traffic Congestion based on Air Quality for Greener Environment: An Empirical Study, Vol. 7, Issue 1, December 2019, IEEE Access (IF=3.557,Q1) (WoS)
    • Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah. (2019). Enhancement of Cybersecurity Awareness Program on Personal Data Protection Among Youngsters in Malaysia: An Assessment. Malaysian Journal of Computer Science. 32 (3). (WoS)
    • Fawad Ali Khan, Rafidah Md Noor*, Miss Laiha Binti Mat Kiah, Noorzaily Mohd Noor, Saleh M. Altowaijri, Atiq Ur Rahman, QoS Enabled Layered based Clustering for Reactive Flooding in Internet of Things, Symmetry (IF = 1.256 Q2), (2019) (Accepted) (WoS)
    • Talal, M., Zaidan, A.A., Zaidan, B.B., O. S. Albahri, A. H. Alamoodi, M. A. Alsalem, A. S. Albahri, M. L. M. Kiah, F. M. Jumaah & Mussab Alaa. 2019. Comprehensive review and analysis of anti-malware apps for smartphones. Telecommun Syst 72, 285 337. [Q3-ISI, IF=1.707] (WoS)
    2018
    • Salman Iqbal, Miss Laiha Mat Kiah & Babak Daghighi. DM-GKM: A key management scheme for dynamic group based applications. Wireless Personal Communications Journal. [UNDER-REVIEW] (WoS)
    • Salman Iqbal, Miss Laiha Mat Kiah, Aws Alaa & Babak Daghighi. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients. Journal of Health and Technology. Online first on 30 Aug 2018. p1-19. (WoS)
    • Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. Kiah, S. Iqbal and Mohamed Abdulnabi. (2018). A security framework for mHealth apps on Android platform. Computers & Security. 75, 191-217. [Q1-ISI] (WoS)
    • Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, Reza Ismail. (2018). Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey. International Journal on Advanced Science Engineering Information Technology, 8(4-2). (SCOPUS)
    2017
    • Mohamed Abdulnabi, Ahmed Al-Haiqi, M.L.M. Kiah, A.A. Zaidan, B.B. Zaidan, Muzammil Hussain. (2017). A Distributed Framework for Health Information Exchange Using Smartphone Technologies. Journal of Biomedical Informatics, 69, 230-250. [Q1-ISI] (WoS)
    • Shu Yun Lim. M.L Mat Kiah. Tan Fong Ang. (2017). Security Issues and Future Challenges of Cloud Service Authentication. Acta Polytechnica Hungarica (Journal of Applied Sciences), 14(2). [ACCEPTED] DOI: 10.12700/APH.14.2.2017.2.4 (WoS)
    • Daghighi, B. Mat Kiah, M.L. Iqbal, S. Ur Rehman, M.H. & Martin, K. (2017). Host mobility key management in dynamic secure group communication. Wireless Networks, 23(147), 1-19. (WoS)
    • Mussab, Alaa. Zaidan, A.A. Zaidan, B.B. Mohammed, Talal & Kiah, M.L.M. (2017). A review of smart home applications based on Internet of Things. Journal of Network and Computer Applications, 97, 48-65. (WoS)
    2016
    • Muzammil Hussain, Ahmed Al-Haiqi, A.A. Zaidan, B.B. Zaidan, M.L. Mat Kiah, Nor Badrul Anuar & Mohamed Abdulnabi. 2016. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive and Mobile Computing 25(c):1-25. [Q1-ISI] (WoS)
    • Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab and Suleman Khan. (2016). Service Delivery Models of Cloud Computing: Security Issues and Open Challenges. Security and Communication Networks. (WoS)
    • Igbal, S. Mat Kiah, M.L. Daghighi, B. Hussain, M. Khan, S. Khan, M.K. & Choo, K.K.R. 2016. On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications. [Q1-ISI] (WoS)
    • Saybani, M.R. Wah, T.Y. Aghabozorgi, S.R. Shamshirband, S. Mat Kiah, M.L. & Balas, V.E. 2015. Diagnosing Breast Cancer with an Improved Artificial Immune Recognition System. Soft Computing. [ISI-Q2] (WoS)
    2015
    • A.A. Zaidan, B.B. Zaidan, Muzammil Hussain, Ahmed Haiqi, M.L. Mat Kiah & Mohamed Abdulnabi. 2015. Multi- Criteria Analysis for OS-EMR Software Selection Problem: A Comparative Study. Decision Support Systems 78:15-27. [ISI-Q1] (WoS)
    • Muzammil Hussain, Ahmed Al-Haiqi, A.A. Zaidan, B.B. Zaidan, M.L.M. Kiah, Nor Badrul Anuar & Mohamed Abdulnabi. 2015. The Landscape of Research on Smartphone Medical Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations. Computer Methods and Programs in Biomedicine 122 (3):393-408. [Q1-ISI] (WoS)
    • Abdul Nasir Khan, M.L. Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband & Atta ur Rehman Khan. 2015. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. Journal of Grid Computing 13(4):651-675. [ISI-Q1/Q2] (WoS)
    • B.B. Zaidan, Ahmed Haiqi, A.A. Zaidan, Mohamed Abdulnabi, M. L. Mat Kiah & Hussaen Muzamel. 2015. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy. Journal of Medical Systems 39:51. [ISI-Q2] (WoS)
    • Milan Proti, Shahaboddin Shamshirband, Dalibor Petkovi, Almas Abbasi, Miss Laiha Mat Kiah, Jawed Akhtar Unar, Ljiljana ivkovi & Miomir Raos. 2015. Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm. Energy 87:343- 351. [ISI-Q1] (WoS)
    • Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband & Steven Furnell. 2015. A systematic review of approaches to assessing Cybersecurity awareness. Kybernetes 44 (4):606-622. [ISI-Q4] (WoS)
    • Mahmoud Reza Saybani, Shahaboddin Shamshirband, Shahram Golzari, Teh Ying Wah, Saeed Reza Aghabozorgi, Miss Laiha Mat Kiah & Valentina Emilia Balas. 2015. RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system. Medical & Biological Engineering & Computing. [Accepted] [ISI-Q2] (WoS)
    • Benyamin Khoshnevisan, Elham Bolandnazar, Shahaboddin Shamshirband, Hanifreza Motamed Shariati, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2015. Decreasing environmental impacts of cropping systems using LCA and multi-objective genetic algorithm. Journal of Cleaner Production 86:67-77. [ISI-Q1] (WoS)
    • A.A. Zaidan, B.B. Zaidan, Ahmed Al-Haiqi, M.L.M. Kiah, Hussaen Muzamel & Mohamed Abdulnabi. 2015. Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS. Journal of Biomedical Informatics 53:390- 404. [ISI-Q1] (WoS)
    • A.A. Zaidan, H.Abdul Karim, N.N. Ahmad, B.B. Zaidan & M.L. Mat Kiah. 2015. Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning. Journal of Circuits, Systems and Computers 24(2). [ISI-Q4] (WoS)
    • Dalibor Petkovic, Shahaboddin Shamshirband, Nor Badrul Anuar,Sareh Naji, Miss Laiha Mat Kiah & Abdullah Gani. 2015. Adaptive neuro-fuzzy evaluation of wind farm power production as function of wind speed and direction. Stochastic Environmental Research and Risk Assessment 29:793- 802. [ISI-Q1] (WoS)
    • Altameem, T. A., Nikolic, V., Shamshirband, S., Petkovic, D., Javidnia, H., Kiah, M. L. M., Gani, A. 2015. Potential of support vector regression for optimization of lens system Computer-Aided Design (WoS)
    • Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ismail Ahmedy. 2015. Survey of secure multipath routing protocols for WSNs. Journal of Network and Computer Applications 55:123-153. [ISI-Q1] (WoS)
    2014
    • Daghighi, B., Kiah, M. L. M., Shamshirband, S., & Rehman, M. H. U. 2014. Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. Journal of Network and Computer Applications 50:1-14. [ISI-Q1] (WoS)
    • Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ajith Abraham. 2014. Cooperative Game Theoretic Approach using Fuzzy Q-learning for Detecting and Preventing Intrusions in Wireless Sensor Networks. Engineering Applications of Artificial Intelligence 32:228-241. [ISI-Q1] (WoS)
    • Shahaboddin Shamshirband, Dalibor Petkovi , arko ojba i , Vlastimir Nikoli , Nor Badrul Anuar, Nor Liyana Mohd Shuib, Miss Laiha Mat Kiah & Shatirah Akib. 2014. Adaptive neuro-fuzzy optimization of wind farm project net profit. Energy Conversion and Management. [ISI-Q1] (WoS)
    • Babak Daghighi & Miss Laiha Mat Kiah. 2014. A Group Key Management Scheme in Wireless Mobile Environment. ScienceAsia Journal. [Accepted] [ISI-Q3] (WoS)
    • Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah & Al-Sakib Khan Pathan. 2014. Routing protocol design for secure WSN: Review and open research issues. Journal of Network and Computer Applications 41:517- 530. [ISI-Q1] (WoS)
    • Shamshirband, S., Petkovi, D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., Cojbasic, Z., Nikolic, V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81: 520-526. [ISI-Q1] (WoS)
    • Shamshirband, S., Petkovi , D., Saboohi, H., Anuar, N.B., Inayat, I., Akib, S., ojba i , ., Nikoli , V., Mat Kiah, M.L. & Gani, A. 2014. Wind turbine power coefficient estimation by soft computing methodologies: Comparative study. Energy Conversion and Management 81:520 526. [ISI-Q1] (WoS)
    • Shamshirband S, Hessam S, Javidnia H, Amiribesheli M, Vahdat S, Petkovic D, Gani A, Kiah MLM. 2014. Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System. International Journal of Medical Science. 11(5):508-514. [ISI-Q1] (WoS)
    • M.L.M. Kiah, B.B Zaidan, A.A.Zaidan, Mohamed Nabi & Rabiu Ibraheem. 2014. MIRASS: Medical Informatics Research Activity Support System using Information Mashup Network. Journal of Medical Systems 38 (37):1-15. [ISI-Q2] (WoS)
    • Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Sanjay Misra. 2014. Anomaly Detection using Fuzzy Q-learning Algorithm in Wireless Network. Acta Polytechnica Hungarica. [ISI-Q3] (WoS)
    • Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovi , Sanjay Misra & Abdul Nasir Khan. 2014. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. Journal of Network and Computer Applications 42:102- 117. [ISI-Q1] (WoS)
    • M.L.M Kiah, Ahmed Haiqi, B.B Zaidan & A.A Zaidan. 2014. Open Source EMR Software: Profiling, Insights and Hands-on Analysis. Computer Methods and Programs in Biomedicine. [ISI-Q1] (WoS)
    • Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad A. Madani, Atta ur Rehman Khan & Shahaboddin Shamshirband. 2014. BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment. Journal of Supercomputing 70(2):946-976. [ISI-Q2] (WoS)
    • M.L.Mat Kiah, S.H. Al-Bakri, A.A. Zaidan, B.B. Zaidan & Muzammil Hussain. 2014. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture. Journal of Medical Systems. [ISI-Q2] (WoS)
    • Shahaboddin Shamshirband, Nor Badrul Anuar, Babak Daghighi, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham. 2014. Co-FQL :Anomaly Detection Using Cooperative Fuzzy Q-learning in Network. Journal of Intelligent Fuzzy Systems. [ISI-Q3] (WoS)
    • H.O. Alanazi, A.A. Zaidan, B.B. Zaidan, M.L. Mat Kiah & S.H. Al-Bakri. 2014. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. Journal of medical systems 39:165. [ISI-Q2] (WoS)
    • Ehsan Daryabeigi, Ali Zafari,Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm. International Journal of Electrical Power & Energy Systems 61:326- 334.[ISI-Q1] (WoS)
    • Afshin Jahangirzadeh,Shahaboddin Shamshirband,Saeed Aghabozorgi, Shatirah Akib,Hossein Basser, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier. Neurocomputing 140(22):172-184. [ISI-Q2] (WoS)
    • Dalibor Petkovi , Shahaboddin Shamshirband, Javed Iqbal, Nor Badrul Anuar, Nenad D. Pavlovi & Miss Laiha Mat Kiah. 2014. Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper. Applied Soft Computing 22:424-431. [ISI-Q1] (WoS)
    • Shahaboddin Shamshirband, Amineh Amini, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ying Wah Teh & Steven Furnell. 2014. D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55: 212-226. [ISI-Q2] (WoS)
    • Shamshirband,S., Petkovic, D., Amini, A., Anuar, N.B., Nikolic, V., Cojbasic, Z., Mat Kiah, M.L. & Gani, A. 2014. Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission. Energy 67:623-630. [ISI-Q1] (WoS)
    • Shahaboddin Shamshirband, Mohd Rashid Mohd Radzi, Saeed Aghabozorgi, Sanjay Misra, Shatirah Akib & Miss Laiha Mat Kiah. 2014. Potential of Support Vector Regression for Forcasting of Stream Flow. Tehnicki Vjesnik 21(5):1017-1024. [ISI-Q3] (WoS)
    • Dalibor Petkovic, Shahaboddin Shamshirband, Nenad D. Pavlovic, Abdullah Gani & Miss Laiha Mat Kiah. 2014. Kinetostatic analysis of passively adaptive robotic finger with distributed compliance. Advances in Mechanical Engineering. [ISI-Q2] (WoS)
    • Dalibor Petkovi, Shahaboddin Shamshirband, Nenad Pavlovi, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2014. Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology. Optics and Spectroscopy. [ISI-Q4] (WoS)
    • Shahaboddin Shamshirband, Dalibor Petkovi , Nor Badrul Anuar, Miss Laiha Mat Kiah, Shatirah Akib, Abdullah Gani, arko ojba i & Vlastimir Nikoli . 2014. Sensorless estimation of wind speed by adaptive neuro-fuzzy methodology. International Journal of Electrical Power & Energy Systems 62:490- 495. [ISI-Q1] (WoS)
    • Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan & Shahab Shamshirband. 2014. Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment. Journal of Supercomputing 68(2): 624-651. [ISI-Q2] (WoS)
    2013
    • Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan & Mazhar Ali. 2013. Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing. Journal of Supercomputing 66(3):1687-1706. [ISI-Q2] (WoS)
    • M.L Mat Kiah, Mohamed S.Nabi, B.B Zaidan & A.A Zaidan. 2013. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP-XML and SHA-1. Journal of Medical Systems 37:9971. [ISI-Q2] (WoS)
    • Dalibor Petkovi , Nenad T. Pavlovi , Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Mohd Yamani Idna Idris. 2013. Adaptive neuro-fuzzy estimation of optimal lens system parameters. Optics and Lasers in Engineering 55:84-93. [ISI-Q2] (WoS)
    • Dalibor Petkovi, arko jba I, Vlastimir Nikoli, Shahaboddin Shamshirband, Miss Laiha Mat Kiah, Nor Badrul Anuar & Ainuddin Wahid Abdul Wahab. 2013. Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission. Energy 64:868-874. [ISI-Q1] (WoS)
    • Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah & Ahmed Patel. 2013. An Appraisal and Design of Multi Agent Systems Based on Cooperative Wireless Intrusion Detection Computational Intelligence Techniques. Engineering Applications of Artificial Intelligence 26(9):2105-2127. [ISI-Q1] (WoS)
    • Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2013. A review of dynamic and intelligent honeypot. ScienceAsia Journal 39(1):1-5. [ISI-Q3] (WoS)
    2012
    • Liana Khamis Qabajeh, Miss Laiha Mat Kiah, Mohammad Moustafa Qabajeh. 2012. A More Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. Security and Communication Networks 6(3):286-308. [ISI-Q4] (WoS)
    • Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan & Sajjad A. Madani. 2012. Towards Secure Mobile Cloud Computing: A Survey. Future Generation Computer Systems 29(5):1278-1299. [ISI-Q1] (WoS)
    2011
    • Sameer Hasan Al-Bakri, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan & Gazi Mahabubul Alam. 2011. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences 6(4):930-938. [ISI-Q2] (WoS)
    • B.B.Zaidan, A.A. Zaidan, M.L. Mat Kiah. 2011. Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: Review, Participates Opinion and Expert Concerns. International Journal of Pharmacology 7(3):382-387.[ISI-Q4] (WoS)
    • M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan, A. Mohammed Ahmed & Sameer Hasan Al-bakri. 2011. A review of audio based steganography and digital watermarking. International Journal of the Physical Sciences 6 (16):3837-3850. [ISI-Q2] (WoS)
    • Qabajeh, L., Mat Kiah, M. L. & Qabajeh, M. 2011. Secure Unicast Position-Based Routing Protocols for Ad- Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences) 8(6):191-214. [ISI-Q3] (WoS)
    2010
    • Por Lip Yee & Miss Laiha Mat Kiah. 2010. Shoulder Surfing Resistance Using PENUP Event and Neighboring Connectivity Manipulation. Malaysian Journal of Computer Science 23(2):121-140.[Q4-SCI][JCR2010] (WoS)
    • B. B. Zaidan, A. A. Zaidan, Alaa Taqa, Gazi Mahabubul Alam, M. L. Mat Kiah & Hamid Jalab. 2010. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. International Journal of the Physical Sciences 5(11):1796-1806. [ISI-Q2] (WoS)
    • Gazi Mahabubul Alam, M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan and Hamdan O. Alanazi. 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Scientific Research and Essays 5(21):3254-3260.[ISI-Q3] (WoS)
    • Hamdan O. Alanizi, M. L. Mat Kiah, A.A.Zaidan, B.B.Zaidan & G.M. Alam. 2010. Secure Topology for Electronic Medical Record Transmissions. International Journal of Pharmacology 6(6):954-958. [ISI-Q4] (WoS)
    • Mohamed S. A.Nabi, M.L. Mat Kiah, B.B. Zaidan, A.A. Zaidan & G.M. Alam. 2010. Suitability of SOAP Protocol in Securing Transmissions of EMR Database. International Journal of Pharmacology 6(6):959-964. [ISI-Q4] (WoS)
    • Miss Laiha Mat Kiah, Liana Khamis Qabajeh, Mohammad Moustafa Qabajeh. 2010. Unicast Position-Based Routing Protocols for Ad-Hoc Networks. Acta Polytechnica Hungarica (Journal of Applied Sciences, ISSN: 17858860)7(5):19-46.[Q3-SCI][JCR2010] (WoS)
    • Saman Mirza Abdulalla, Laiha Mat Kiah & Omar Zakaria. 2010. A biological model to improve PE malware detection: Review. International Journal of the Physical Sciences 5(15): 2236-2247. [Q2-SCI][JCR2010] (WoS)
    • Sameer Hasan Al-bakri & M. L. Mat Kiah. 2010. A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Scientific Research and Essays 5(22):3455-3466.[ISI- Q3] (WoS)
    • Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B. Zaidan and A.A. Zaidan. 2010. A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. Journal of Applied Sciences 10(1): 59-64. (WoS/SCOPUS)
    2009
    • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Scalable and Secure Position- Based Routing Protocol for Ad-Hoc Networks. Malaysian Journal of Computer Science (ISSN 0127- 9084) 22(2):99- 120. [Q4-SCI] (WoS)
    • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2009. A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks. International Journal of Computer Science and Network Security (IJCSNS) 9(2): 131-140. (Non-WoS/Non-SCOPUS)
    2008
    • Mat Kiah, M.L. & Martin, K.M. 2008. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and Its Applications (IJSIA) 2(1):39-52. (SCOPUS)
    Book
    2017
    • Salman Iqbal & Miss Laiha Mat Kiah. (2017). Secure Group Communication Protocols in Wireless Mobile Environment. LAP LAMBERT Academic Publishing.
    2002
    • Omar Zakaria and Miss Laiha Mat Kiah (2002), Pengenalan Kepada Keselamatan Komputer (An Introduction to Computer Security), Mc-Graw Hill (M) Sdn Bhd.
    Book Chapter
    2011
    • Liana K. Qabajeh, Miss Laiha Mat Kiah & Mohammad M. Qabajeh. 2011. A Survey of Position-Based Routing Protocols for Ad-Hoc Networks. (DOI: 10.1007/978-1- 84996-510-1_4). Book chapter in Application and Multidisciplinary Aspects of Wireless Sensor Networks: Concepts, Integration, and Case Studies, Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic and Roman Trobec (ISBN 976-1-84996-509-5), Part 1, pp. 47-83, Springer.
    Article in Proceedings
    2018
    • Atif Mahmood, Miss Laiha Binti Mat Kiah, Saaidal Razalli Bin Azzuhri, Adnan N. Qureshi. 2018. Wireless Backhaul Network Optimization Using Automated KPIs Monitoring System Based on Time Series Forecasting. World Symposium on Communication Engineering 2018, ISBN 978-1-5386-7985-2. (Non-WoS/Non-SCOPUS)
    2017
    • Chowdhury, F.Z., Idris, M. Y, Mat Kiah, M.L, Ahsan, M. A. 2017. EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing. In the Proceeding of 8th IEEE Control and System Graduate Research Colloquium, 4-5th Aug 2017 Shah Alam, Selangor, Malaysia. (WoS)
    2015
    • M.L.M. Kiah, Ahmed Haiqi, B.B. Zaidan, A.A. Zaidan & Mohamed Abdulnabi. 2015. Open Source EMR Software: How to Select the Best Software?. Proceeding of 3rd International Conference on Information and Computer Networks (ICICN). (WoS/SCOPUS)
    2013
    • Nabi, M. S., Mat Kiah, M. L., Zaidan, A. A., & Zaidan, B. B. 2013. Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. In Future Generation Communication Technology (FGCT), 2013 Second International IEEE Conference. 93- 97. (WoS)
    • Abdul Nasir Khan, M. L. Mat Kiah, Sajjad A. Madani. 2013. A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments. IEEE Symposium on Wireless Technology and Applications (ISWTA 2013), September 22-25, 2013, at Pullman Kuching Hotel, Malaysia. (WoS/SCOPUS)
    • Shahaboddin Shamshirband, Nor Badrul Anuar & Miss Laiha Mat Kiah. 2013. Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning. Kaspersky s CyberSecurity for the Next Generation, National University of Singapore, Republic of Singapore, 21 - 23 March 2013. (WoS/SCOPUS)
    2012
    • Wira Zanoramy Ansiry Zakaria & Miss Laiha Mat Kiah. 2012. A Review on Artificial Intelligence Techniques for Developing Intelligent Honeypot. International Conference on Next Generation Information Technology (ICNIT2012). Seoul, Korea. (Non-WoS/Non-SCOPUS)
    • Hossein Javidnia,Shahaboddin Shamshirband & Miss Laiha Mat Kiah. 2012. Cooperative Multi-agent System Based on Fuzzy Quantum Cryptography. International Conference on Electrical, Computer, Electronics & Biomedical Engineering(ICECEBE 2012). Bangkok, Thailand. (Non-WoS/Non-SCOPUS)
    • S. M. Abdulla, M. L. Mat Kiah & O. Zakaria. 2012. Minimizing Errors in Identifying Malicious API to Detect PE Malwares Using Artificial Costimulation. International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE'2012), pg. 49-54.
    2011
    • Mat Kiah, M.L., Daghighi, B.,& Albakri, S. 2011. An Implementation of Group Key Management in a Wireless Environment. International Conference on Electronics, Networks and Computer (ICENC 2011), Kuala Lumpur, Malaysia. (WoS/SCOPUS)
    2010
    • Liana Khamis Qabajeh, Miss Laiha Mat Kiah & Mohammad Moustafa Qabajeh. 2010. A Scalable and Secure Position- Based Routing Protocol for MANETs. Proceedings of the Annual International Conference on Network Technologies & Communication (NTC 2010), 29-30th November, Phuket Beach Resort, Thailand, pp. N7-N12.
    • Daghighi, B., Mat Kiah, M.L.& Afkhami, S. 2010. Group Key Management Using Public Key Exchange. International Conference on Intelligent network & Computing, Malaysia. (WoS/SCOPUS)
    2009
    • Mohamed Elsadig Eltahir, Miss Laiha Mat Kiah, Bilal Bahaa Zaidan & Aos Alaa Zaidan. 2009. High Rate Video Streaming Steganography. International Conference on Future Computer and Communication, pp 550-553.(Indexed by EI Compendex, INSPEC, Thomson ISI, IEEE XploreTM,IEEE Computer Society digital libraries)
    • Daghighi, B.,& Mat Kiah, M.L. 2009. Secure Group Communication Using Public Key Exchange. In the Proceeding of 3rd International Conference on Informatics and Technology, 27 - 28th Oct 2009 Kuala Lumpur, Malaysia.
    • L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable, Distributed and Secure Routing Protocol for MANETs. Proceedings of the International Conference on Computer Engineering and Applications (ICCEA 2009), pp. 51-56, 6-8 June 2009, Manila, Philippine. (Indexed by Ei Compendex and Thomson ISI)
    • L. K. Qabajeh, M. L. Mat Kiah, M. M. Qabajeh. 2009. A Scalable Secure Routing Protocol for MANETs. Proceedings of The International Conference on Computer Technology and Development (ICCTD 2009), pp.143-147, 13-15 Nov, Kota Kinabalu, Malaysia. (Indexed by Ei Compendex and ISI)
    • Nor Aniza Abdullah, Safinaz Mustapha, Miss Laiha Mat Kiah. 2009. A Requirement Framework For Livestock Farming Web Service Application. Proceeding of the 3rd International Conference on Informatics and Technology, 27 - 28th October, Kuala Lumpur Malaysia.
    2007
    • Miss Laiha Mat Kiah & Keith Martin. 2007. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. Proceeding of International Conference on Future Generation Communication Networking,06-08 Dec 2007, Jeju Island South Korea, Vol. 1, pg 99-106.
    • Miss L. Mat Kiah and Keith M. Martin. 2007. Secure Multicast: Investigating the Different Challenges between Internet and Mobile Environments. In Proceeding of M2USIC 2007, 19 & 20th Nov 2007, Hilton Hotel PJ, Malaysia.
    2006
    • MatKiah, M. L. and Martin, K. M. (2006). A generic group key management framework for group communication in wireless mobile environments. In Proceedings of the Sixth International Network Conference (INC2006), pp. 347-354.
    2005
    • MatKiah, M. L. and Martin, K. M. (2005). Group communication: Design challenges in the development of key management frameworks in wireless mobile environments. In Proceedings of International Conference on Security and Management (SAM'05), pp. 385-390. Las Vegas, USA.
    Case Study/Tech. Report
    2018
    • Hussain, A., Luqman, W., Anuar, N. B., Kiah, M. L. M., & Kumar, S. (2018). Digital Rights Management for Cloud Based Storage Providers. Technical Report. Universiti Malaya, Kuala Lumpur, Malaysia.
    2017
    • Zamanian, A., Feizollah, A., Anuar, NB., Kiah, M. L. M., Srikanth, K., and Kumar, S. (2017). Anomaly Detection in Policy Authorisation Activity Log. Technical Report, Universiti Malaya, Kuala Lumpur, Malaysia.
    RESEARCH PROJECT
    (Project title),(Role),(Duration),(Level)
    ScienceFund
  • Secure Group Communication for Critical National Information Infrastructure , Principal Investigator(PI), 2013 - 2016 (National)
  • High Impact Research (HIR)
  • Implementation of Secure Framework for Electronic Medical Records (EMRs), Principal Investigator(PI), 2012 - 2015
  • Geran Penyelidikan Universiti Malaya (UMRG)
  • Deployment of Virtual Honeypots , Principal Investigator(PI), 2011 - 2013 (National)
  • An Implemetation of Secure Group Communication , Principal Investigator(PI), 2009 - 2011 (National)
  • Special Fund
  • Information and Communication Security , Principal Investigator(PI), 2010 - 2011 (National)
  • Short Term Research Fund (Vote F)(PJP)
  • Secure Routing Protocols for Large Mobile Ad-Hoc Networks , Principal Investigator(PI), 2008 - 2010 (National)
  • SUPERVISION
    Academic Adviser
    (Total of Student),(No. of Contact Hours),(Academic Session)
  • 2, 13, 2008/2009
  • 3, 12, 2009/2010
  • 3, 13, 2008/2009
  • 2, 9, 2010/2011
  • 3, 12, 2009/2010
  • 2, 10, 2010/2011
  • 4, 7, 2011/2012
  • 4, 7, 2011/2012
  • 2, 4, 2012/2013
  • 4, 7, 2012/2013
  • Postgraduate Student
    (Title of Thesis),(Name of Candidates),(Institution),(Academic Level)
    Ongoing
    • -, FAZIDAH BINTI OTHMAN, University of Malaya (UM) (Post Graduate Student)
    • A Security Framework For Mobile Health Applications On Android Platform, MUZAMMIL HUSSAIN, University of Malaya (UM) (Post Graduate Student)
    • Network Security, Lim Shu Yun, University of Malaya (UM) (Post Graduate Student)
    • WIRELESS SECURITY, SHAZANA BINTI MD ZIN, University of Malaya (UM) (Post Graduate Student)
    • Assessment of Cybersecurity Awareness Program On Personal Data Protection Among Youngsters in Malaysia, NOOR HAYANI BINTI ABD RAHIM, University of Malaya (UM) (Post Graduate Student)
    • Network Security, Salman Iqbal Malik, University of Malaya (UM) (Post Graduate Student)
    • Computer Security, Mohamed Shabbir Hamza Abdulnabi, University of Malaya (UM) (Post Graduate Student)
    • Computer Forensic, Nordiana Binti Rahim, University of Malaya (UM) (Post Graduate Student)
    • Wireless Security, Shazana Binti Md Zin, University of Malaya (UM) (Post Graduate Student)
    • Secure Group Communication, Babak Daghighi, University of Malaya (UM) (Post Graduate Student)
    • Network Security, Shahaboddin Shamshirband, University of Malaya (UM) (Post Graduate Student)
    • Network Security, Abdul Nasir Khan, University of Malaya (UM) (Post Graduate Student)
    • Information Security, Noor Hayani Binti Abd Rahim, University of Malaya (UM) (Post Graduate Student)
    • A Case Based Reasoning Approach for Dynamic Honeypot, Wira Zanoramy, University of Malaya (UM) (Post Graduate Student)
    • Secure Group Communication, Fazidah binti Othman, University of Malaya (UM) (Post Graduate Student)
    • Network Security, Abdul Mueed Khalid, University of Malaya (UM) (Post Graduate Student)
    Completed
    • An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, SAMER HASAN SAIF, University of Malaya (UM) (Post Graduate Student)
    • Key Management for Secure Group Communication in a Wireless Environment, BABAK DAGHIGHI, University of Malaya (UM) (Post Graduate Student)
    • An Artificial Co-stimulation Classifier of Malicious API calls classification in Portable Executable Malwares, Saman Mirza Abdulla, University of Malaya (UM) (Post Graduate Student)
    • An Image Steganography Using Texture Analysis for High Rate Data Hiding, ANAS MAGEED HAMID, University of Malaya (UM) (Post Graduate Student)
    • High Capacity Image Steganography Algorithm Based on Artificial Neural Network, HAMSAH AHMED GHALEB AL-JBARA, University of Malaya (UM) (Post Graduate Student)
    • Energy Efficient Data Security Schemes for Mobile Users in Cloud Environment, ABDUL NASIR KHAN, University of Malaya (UM) (Post Graduate Student)
    • COOPERATIVE MULTI AGENTS FOR INTELLIGENT INSTRUSION DETECTION AND PREVENTION SYSTEMS, SHAHABODDIN SHAMSHIRBAND, University of Malaya (UM) (Post Graduate Student)
    • A Case Based Reasoning Approach for Dynamic Honeypot, WIRA ZANORAMY ANSIRY BIN ZAKARIA, University of Malaya (UM) (Post Graduate Student)
    • A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, Liana Khamis Qabajeh, University of Malaya (UM) (Post Graduate Student)
    • An Implementation of Video Steganography Using the LSB Method, MOHAMED ELSADIQ ELTAHIR AHMED, University of Malaya (UM) (Post Graduate Student)
    • Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, MOHAMED SHABBIR HAMZA ABDULNABI, University of Malaya (UM) (Post Graduate Student)
    • An Artificial Co-stimulation Classifier for Malicious API calls classification in Portable Executable Malwares, SAMAN MIRZA ABDULLA, University of Malaya (UM) (Post Graduate Student)
    • Implementation of End-To-End Secure SMS Using Elliptic Curve Cryptography, ADDY MAJED ABDALKAREM ALQURAAN, University of Malaya (UM) (Post Graduate Student)
    • Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-bit Encoding Audio Steganagraphy Technique, MOHAMMED A AHMED, University of Malaya (UM) (Post Graduate Student)
    • Secure Transmission of Electronic Medical Records in Soap/XML using Hybird Techniques of AES and SHA-1, Mohamed Shabbir Hamza Abdulnabi, University of Malaya (UM) (Post Graduate Student)
    • An Implementation of Video Steganography Using the LSB Method, Mohamed El Sadiq El Tahir Ahmed, University of Malaya (UM) (Post Graduate Student)
    • Implementation of Wireless Security on Virtual WiFi, MOHAMMAD YASIN ARASHPOUR, University of Malaya (UM) (Post Graduate Student)
    • Implementation of End-to-End Secure SMS Using Elliptic Curve Cryptography, Addy Majed Abdalkarem Alquraan, University of Malaya (UM) (Post Graduate Student)
    • The Implementation of Secure Group Communication in Wireless and Mobile Environment, Babak Daghighi, University of Malaya (UM) (Post Graduate Student)
    • Using Noise Gate Software Logic Algorithm to Increase the Capacity and Robustness of Low-Bit Encoding Audio Steganography Technique, Mohammed-A-Ahmed, University of Malaya (UM) (Post Graduate Student)
    • An Image Steganography Using Texture Analysis for High Rate Data Hiding, Anas Mageed Hamid, University of Malaya (UM) (Post Graduate Student)
    • Implementation of Wireless Security on Virtual WIFI, Mohammad Yasin Arashpour, University of Malaya (UM) (Post Graduate Student)
    • An End-To-End Short Message Service (SMS) Security Using A Hybrid Technique of NTRU and AES-Rijndael, Samer Hasan Saif Qaid, University of Malaya (UM) (Post Graduate Student)
    • High Capacity Image Steganography Algorithm Based on Artificial Neural Network, Hamsah Ahmed Ghaleb Al-Jbara, University of Malaya (UM) (Post Graduate Student)
    • A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks, LIANA K. M. QABAJEH, University of Malaya (UM) (Post Graduate Student)
    • Hybrid Techniques of NTRU and AES for Improving the Security of Electronic Medical Records, Alanazi, Hamdan Owaid R, University of Malaya (UM) (Post Graduate Student)
    PATENT/IPR
    (Product Name),(Type),(Level)
    • A FRAMEWORK AND RELATED METHODS FOR HEALTH INFORMATION EXCHANGE USING MOBILE PERSONAL HEALTH RECORDS, Patent (National)
    • SECURE VIDEO CONFERENCING FRAMEWORK FOR REAL TIME APPLICATION: METHODOLOGY AND SYSTEM, Patent (International)
    • A Scientific Search Engine Based on Data Mashup , Patent (International)
    SOCIAL RESPONSIBILITY ACTIVITIES
    (Contribution to Society),(Duration),(Level)
    • AJK Induk Pemilihan MPPUM Sesi 2012/2013, 2012
    • Executive Editor for Malaysian Journal of Computer Science, 01/08/2007 to 01/08/2008
    COURSE ATTENDED
    (Course Title),(Venue),(Duration),(Level)
    Internal / External Course
  • CYBER CRIME PREVENTION & DETECTION, Suite C-08-05 Wisma Goshen Plaza Pantai, Bangsar Trade Center No 5, Jalan4/83a, Off, Jalan Pantai Baharu, Bangsar 59200 Kl, 16/04/2021 to 18/04/2021
  • LEADERS IN INNOVATION FELLOWSHIPS, The Hoxton, Shoreditch, London, 04/12/2017 to 15/12/2017
  • RESEARCH LEAVE - SKYDRM & IOT SECURITY, Fsktm, 01/11/2017 to 31/12/2017
  • BENGKEL PENILAIAN FASA PERTAMA UNTUK MEMUKTAMADKAN AKSA MYSEAL, Putrajaya Mariott, 08/06/2017 to 08/06/2017
  • BENGKEL PENILAIAN FASA PERTAMA MYSEAL, Putrajaya, 04/04/2017 to 06/04/2017
  • BENGKEL KUMPULAN FOKUS MYSEAL, Putrajaya, 24/01/2017 to 24/01/2017
  • ACADEMIC/PROFESSIONAL SERVICES
    Academic/Professional Services
    (Contribution),(Duration),(Level),(Role)
  • Penilai Luar Akademik, 23/03/2021 to 22/03/2023, National, (External Assessor)
  • PARTICIPANT TO PITCH ON MPHR PROJECT, 27/02/2021 to 27/02/2021, National, (Participant)
  • Phd Thesis, 04/02/2021 to 04/05/2021, National, (External Examiner)
  • Panel Penilai Geran FRGS, 01/02/2021 to 01/03/2021, University, (Internal Evaluator)
  • Evaluation Activity
    (Activity),(Duration),(Category)
  • BAGI PROGRAM IJAZAH SARJANA MUDA SAINS KOMPUTER (KESELAMATAN KOMPUTER) DENGAN KEPUJIAN , 2020 to 2021
  • Improving the Accuracy of User Authentication is Public Cloud Computing Through Adoption of Electronic Personal Synthesis Behavior (EPSB), 2019 to 2019 (Thesis)
  • REAL-TIME ANOMALY DETECTION USING CLUSTERING-AWARE OF BIG DATA TECHNOLOGIES, 2019 to 2019 (Thesis)
  • 2017 CSM Technical Colloquim (Unpublished Category) , 2017 to 2017 (Article in Proceeding)
  • External Assessor for academic promotion to Assoc Prof/Professor , 2017 to 2017 (Academic promotion)
  • For Academic promotion to Associate Professor/Professor , 2017 to 2017 (Academic promotion)
  • MILP-Based Approach To Evaluation Of Tweak-Aes-128 Bits Resistant To Related-Key Differential And Boomerang Attacks, 2017 to 2017 (Article in Journal)
  • External Examiner for Academic Program - Foundation in Computing and Diploma in IT, 2017 to 2019 (Academic Program External Examiner)
  • 2017 CSM Technical Colloquim (Published Category) , 2017 to 2017 (Article in Proceeding)
  • Evaluation Panel for Newton-Ungku Omar Fund - Project Research Proposal (2) , 2017 to 2017 (Project)
  • Evaluation Panel for Newton-Ungku Omar Fund Research Project Proposal , 2017 to 2017 (Project)
  • SECURE DATA COLLECTION USING MOBILE SENSORS IN STATICALLY DEPLOYED SENSOR NETWORKS, 2017 to 2017 (Article in Journal)
  • Reviewer for JICT (Journal of Information and Communication Technology), 2016 to 2016 (Article in Journal)
  • Esciencefund proposals, 2016 to 2016 (Permohonan Geran Penyelidikan Sciencefund)
  • Expert Panel for Doctoral Consortium, 2016 to 2016 (Doctoral Consortium)
  • SECURED IMAGE ENCRYPTION USING RANDOM NUMBERS AND REVERSIBLE DATA HIDING, 2016 to 2016 (Thesis)
  • FRGS proposals, 2016 to 2016 (Permohonan Geran FRGS)
  • Paper Reviewer for CSM 2016 Technical Colloquium, 2016 to 2016 (Article in Proceeding)
  • Risk Assessment Model for Organizational Information Security, 2016 to 2016 (Thesis)
  • Paper titled 'Study the Reality and Future of the Affordable and Secure Mobile Cloud Computing (SMCC)', 2014 (Article in Journal)
  • PhD thesis on 'Traffic Aware Backoff Scheduling of Low Data Rate Applications in Wireless Body Area Networks', 2014 (Thesis)
  • Paper titled 'PROTECTING WIRELESS DATA TRANSMISSION USING WATERMARKING TECHNIQUE APPROACH', 2014 (Article in Journal)
  • Paper titled "Path Loss Simulation in Different Radio Propagation Models with 1.8GHz and 2.6GHz Bands", 2014 (Article in Proceeding)
  • Master Thesis (Full Research) titled 'SENIBINA KESELAMATAN MULTI-AGEN UNTUK E-LELONG PATUH SYARIAH', 2014 (Thesis)
  • Paper titled "Issues Affecting the Adoption of IPv6", 2014 (Article in Proceeding)
  • PhD Thesis on 'Enhancing Security in Mobile IPv6 with Private Key-based Binding Update Key Protocol', 2013 (Thesis)
  • Phd Thesis on 'Infrastructure Based Management And Optimization For NEMO Correspondent Registration' , 2013 (Thesis)
  • Master Thesis on 'Key Authentication in Closed Communities Using Images', 2013 (Thesis)
  • Master Thesis on 'Parallel Chaotic Hash Function Based on the Shuffle-Exchange Network', 2013 (Thesis)
  • Master Thesis on 'Kajian Perbandingan Model Gelombang Penyebaran Radio Terhadap Rangkaian 4G' , 2013 (Thesis)
  • Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique - Re-Examination, 2012 to 2012 (Thesis)
  • M-XKMS: Adaptation of XKMS for Mobile Devices to Secure Short Message Service Using XML Key Management Specification, 2012 to 2012 (Article in Journal)
  • Research Project for MCS candidate - A Framework to Support Cross-Platform Application Development for Mobile Devices , 2012 to 2012 (Project)
  • A Generic Relation to Assess Interdependency of QoE and QoS, 2012 to 2012 (Thesis)
  • Development of High Secure Data Hiding System Using Least Significant Bit Algorithm, 2012 to 2012 (Thesis)
  • SECURITY ANALYSIS OF WATERMARKING PROTOCOLS AND SCHEMES BASED ON SINGULAR VALUE DECOMPOSITION , 2012 to 2012 (Thesis)
  • Research Project for MCS candidate - Improving DSR Routing Protocol Using TTL-Based in Mobile Ad Hoc Network (MANET), 2012 to 2012 (Project)
  • A PROXY-ASSISTED ROUTING FOR EFFICIENT DATA TRANSMISSION IN MOBILE AD HOC NETWORKS , 2011 to 2011 (Thesis)
  • An Approach The Implementation Of Access Control Policy And Identity Management In The Public Sector Agency , 2011 (Thesis)
  • Designing a Low Cost Implementation of E‐Commerce Security by Optimizing the Parameters of NTRU Cryptosystem Algorithm for Inderscience Publishers Ltd. , 2011 to 2011 (Article in Journal)
  • A Reservation‐Based Multiple Access Scheme with Adaptive Permission Probability for Wireless Systems Journal of King Saud University ‐ Computer and Information Sciences, 2011 to 2011 (Article in Journal)
  • Paper on A NEW IDENTITY BASED GROUP SIGNATURE SCHEME, 2011 (Article in Journal)
  • Master Dissertation on Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme, 2010 (Thesis)
  • Paper on BIOMETRIC ENCRYPTION THROUGH MODIFIED HILL CIPHER TECHNIQUE , 2010 (Article in Journal)
  • Master Dissertation on Managing Spam in Email Marketing Using Signature-Based Anti Spam Technique, 2010 (Thesis)
  • Master Dissertation on Throughput Optimization of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), 2010 (Thesis)
  • Master Dissertation on Implementation of Elliptic Curve Cryptography Using Biometric Features to Enhance Security Services, 2009 (Thesis)
  • For paper publications of Malaysian Journal of Computer Science (MJCS) , 2007 to 2008 (Article in Journal)
  • Academic/Technical Contribution
    (Activity),(Organisation),(Duration),(Role)
  • Panellist for HLAF Scholarship Interview, Human Life Advancement Foundation, 2017 - 2017 (Panellist)
  • TWG ICT FGD Workshop , EPU Jabatan Perdana Menteri, 2017 - 2017 (Focus Group Member)
  • Panellist for Human Life Advancement Foundation (HLAF) Scholarships Interview, Human Life Advancement Foundation , 2016 - 2016 (Panellist)
  • Focus Group Member for MySEAL project Cybersecurity, Cybersecurity Malaysia, 2016 - 2016 (Committee Member)
  • Panel Viva Voce - Master of Info Tech (Full Research), Fakulti Teknologi dan Sains Maklumat UKM, 2014 - 2014 (Member Of Board Of Examiner)
  • PANEL PENILAI BAGI SESI PEMBENTANGAN KERTAS CADANGAN SKIM GERAN PENYELIDIKAN PEMBANGUNAN PROTOTAIP (PRGS) FASA 1/2014 , IPPP Universiti Malaya , 2014 - 2014 (Panel Penilai)
  • Panel for Viva Voce - Phd Degree Candidate, Faculty of Information Science & Technology, UKM, 2013 - 2013 (Member Of Board Of Examiners)
  • Panel for Viva Voce - Phd Degree Candidate, Faculty of Computer Science & Info. Tech., University of Malaya, 2013 - 2013 (Member Of Board Of Examiner)
  • Reviewers for ACTA Press Journal, ACTA Press Journal Canada , 2010 - Present
  • Panel Advisor for Competency Standards for Polytechnic Graduates, Jabatan Pengajian Politeknik dan Kolej Komuniti Kementerian Pengajian Tinggi Malaysia, 2008 - 2009 (Committee Member)
  • A Speaker for Technical Writing Workshop 2017, CyberSecurity Malaysia,  (Speaker)
  • Technical Committee, 2017 International Conference on Biometric Engineering and Forensics,  (Committee Member)
  • AWARD AND STEWARDSHIP
    (Name of Award/Stewardship),(Awarding Institution),(Year Awarded),(Type of Award)
    • Best Paper Award, CRC2021, 2021 (BEST PAPER AWARD)
    • Instructor 10 Years of Service, CISCO Academy, 2019 (SERVICES)
    • GOLD AWARD - INNOVATION, UiTM MELAKA, 2019 (EXHIBITION AWARD)
    • FCSIT Innovation Exhibition Competition 2018, UM, 2018 (COMPETITION)
    • INTERNATIONAL RESEARCH INNOVATION, INVENTION & SOLUTION EXPOSITION (IRIISE 2018) 14 - 16 August 2018 Dewan Tunku Canselor, University of Malaya, UM, 2018 (RESEARCH)
    • Leaders in Innovation Fellowships 2017-2018 Grant Award, Newton Fund, 2018 (RESEARCH)
    • Panel of Jury - UM3MT 2018 - FEA UM, FEA UM, 2018 (COMPETITION)
    • Inspiring Professor for Motivational Talk - for 1st class students and Alumni, FSKTM UM, 2018 (SERVICES)
    • Leaders in Innovation Fellowships, Royal Academy of Engineering , 2017 (RESEARCH)
    • Best Paper Award, IEEE CSS Malaysia Section, 2017 (RESEARCH)
    • GOLD award for Go Green Malaysia - iiDEX 2017, UiTM, 2017 (EXHIBITION AWARD)
    • SILVER award for IoT Based Eco Friendly Traffic Light Controller, UiTM, 2017 (EXHIBITION AWARD)
    • Certificate of Appreciation for Keynote Speech, The Society of Digital Information and Wireless Communications, 2016 (RESEARCH)
    • Student Consultant, IPS UM, 2016 (SERVICES)
    • Chairperson for PGRES 2016, FCSIT UM, 2016 (SERVICES)
    • EXCELLENCE SERVICE AWARD, University of Malaya, 2014 (CERTIFICATE)
    • CERTIFICATE OF EXCELLENT SERVICE, University of Malaya, 2013 (CERTIFICATE)
    • Instructor Years of Service, Cisco Networking Academy, 2013 (SPECIAL)
    • BEST SESSION PAPER AWARD, International Research and Innovations in Science, Engineering and Technology (IRISET), 2012 (RESEARCH)
    • UM EXCELLENCE AWARD, NAIB CANSELOR, 2011 (CERTIFICATE)
    • Excellence Award 2011, University of Malaya, 2011 (RESEARCH)
    • CERTIFICATE OF EXCELLENT SERVICE, University of Malaya, 2010 (CERTIFICATE)
    • Sijil Perkhidmatan Cemerlang, University of Malaya, 2010 (SPECIAL)
    CONSULTANCY PROJECT
    (Project title),(Organisation),(Duration),(Role),(Level)
    • Ahli Akademik sebagai Panel Penemuduga HLP Sessi 2012, JPA, 01/04/2011 to 01/04/2011 (National)
    • Cisco Netriders Competition 2011, TAR College, 01/04/2011 to 01/04/2011 (National)
    • Cisco Competition 2009, UniKL, 01/12/2009 to 01/12/2009 (National)
    PAPER PRESENTED
    (Title),(Event),(Date Presented),(Organiser),(Level)
    PLEANARY SPEAKER
  • Towards Realizing My-Health Nationwide System: A Proposal on Health Information Exchange (HIE), Fifth World Congress of Computing, Engineering and Technology (WCET) and Society of Digital Information and Wireless Communications (SDIWC), 06/09/2016 to 08/09/2016, The Society of Digital Information and Wireless Communications (International)
  • INVITED SPEAKER
  • Technical Writing for High Impact Publication, Bengkel Penulisan Manuskrip dan Penerbitan Berimpak Tinggi, 23/12/2019 to 24/12/2019, FSKTM UPM (University)
  • Writing Impact Papers, Bengkel Penulisan Jurnal Fakulti Teknologi dan Sains Maklumat, 19/04/2019 to 19/04/2019, FTSM UKM (University)
  • How to Write an Effective Technical Paper, Technical Writing Workshop 2017, 28/03/2017 to 28/03/2017, CSM (National)
  • POSTER PRESENTER
  • A Scientific Search Engine Based on Data Mashup, The Digital Education Show Asia 2014, 27/05/2014 to 28/05/2014, MDEC  (International)
  • PRESENTER
  • Open Source EMR Software: How to Select the Best Software?, 3rd International Conference on Information and Computer Networks (ICICN 2015), 19/03/2015 to 20/03/2015, ICICN (International)
  • Suitability of Adopting S/MIME and OpenPGP Email Messages Protocol to Secure Electronic Medical Records, Second International Conference on Future Generation Communication Technologies, 12/12/2013 to 14/12/2013, British Computer Society (International)
  • OTHERS
  • EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud Computing, 8th IEEE Control and System Graduate Research Colloquium, 04/08/2017 to 05/08/2017, UiTM (International)
  • Shielding Wireless Sensor Network from security threat using Fuzzy Q-learning, Kaspersky s CyberSecurity for the Next Generation, 26/09/2013 to 27/12/2013, FIRA (International)