Curriculum Vitae

ASSOCIATE PROF. DR. ROSLI BIN SALLEH

Associate Professor
  • Department of Computer System & Technology
    Faculty of Computer Science and Information Technology
  • rosli_salleh
  • 0379676349

AREAS OF EXPERTISE


  • SOFTWARE DEFINE NETWORKING
    SDN, Network Security

ACADEMIC QUALIFICATION


  • PHD, (KOMUNIKASI DAN DATA RANGKAIAN)
    Salford University, Salford, UK
  • MSC, (KOMUNIKASI DATA DAN RANGKAIAN)
    Salford University, Salford, UK
  • BCOMPSC, (SAINS KOMPUTER)
    Universiti Malaya (UM)

ADMINISTRATIVE DUTIES


  • AJK KURIKULUM PROGRAM SARJANA KESELAMATAN SIBER (SECARA KERJA KURSUS) FSKTM
    05 Jan 2024 - 06 Jan 2027 (Dean Office, Faculty of Computer Science and Information Technology)
  • Course Coordinator
    03 Mar 2023 - 04 Mar 2025 (Dean Office, Faculty of Computer Science and Information Technology)
  • Committee Members
    04 Jan 2013 - present (University Malaya)
  • Task Force Member
    30 May 2022 - 31 Dec 2023 (Dean Office, Faculty of Computer Science and Information Technology)
  • Committee Members
    17 Oct 2022 - 17 Sep 2023 (Department)
  • Supervisor
    09 Oct 2022 - 12 Mar 2023 (Dean Office, Faculty of Computer Science and Information Technology)
  • Committee Members
    01 Jan 2022 - 31 Dec 2022 (Dean Office, Faculty of Computer Science and Information Technology)
  • Programme Coordinator
    01 Jan 2022 - 31 Dec 2022 (Dean Office, Faculty of Computer Science and Information Technology)
  • Committee Members
    01 Jun 2021 - 30 Sep 2022 (Department)
  • Committee Members
    02 Aug 2022 - 02 Aug 2022 (University Malaya)
  • JK Tapisan Kenaikan Pangkat PM dan Professor
    18 Feb 2020 - 30 Jun 2022 (Faculty)
  • Chairman
    24 Jun 2022 - 24 Jun 2022 (Department)
  • Ketua Teras PT04
    01 Jan 2019 - 31 Dec 2021 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Coordinator
    17 Jan 2021 - 31 Dec 2021 (Faculty)
  • Ahli Jawatankuasa
    22 Apr 2021 - 31 Dec 2021 (Faculty)
  • Penel Temuduga
    07 May 2021 - 31 Dec 2021 (Faculty)
  • Chairman
    01 Aug 2021 - 31 Aug 2021 (University Malaya)
  • Chairman
    16 Aug 2021 - 16 Aug 2021 (University Malaya)
  • Chairman
    09 Aug 2021 - 09 Aug 2021 (University Malaya)
  • Chairman
    01 Jul 2021 - 01 Jul 2021 (University Malaya)
  • Panel Penilai
    04 Mar 2021 - 31 Mar 2021 (University Malaya)
  • Juri
    09 Feb 2021 - 09 Feb 2021 (Faculty)
  • Chairman
    06 Jan 2021 - 06 Jan 2021 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • KETUA INSIDEN, JAWATANKUASA WARDEN KEBAKARAN, FSKTM
    02 Dec 2019 - 31 Dec 2020 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Ahli Jawatankuasa Kurikulum Program Sarjana Keselamatan Siber (Ijazah Tinggi) FSKTM
    07 Aug 2017 - 07 Aug 2020 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • PANEL PENILAI GERAN PENYELIDIKAN FAKULTI (GPF)
    01 Aug 2019 - 31 Jul 2020 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Penilai Geran FRGS
    01 Mar 2020 - 31 Mar 2020 (University Malaya)
  • PANEL: UNIVERSITY OF MALAYA IMPACT-ORIENTED INTERDISCIPLINARY RESEARCH GRANT PROGRAMME (IIRG) CYCLE 2/2019
    01 Jan 2019 - 31 Dec 2019 (University Malaya)
  • AJK BENGKEL PEWASITAN ARTIKEL MJCS
    01 Jan 2019 - 31 Dec 2019 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • KETUA INSIDEN, JAWATANKUASA WARDEN KEBAKARAN, FSKTM
    01 Jan 2019 - 31 Dec 2019 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Researcher of The Centre For Mobile Cloud Computing Research (C4MCCR)
    14 Jun 2017 - 31 Dec 2018 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Panel Sesi Penilaian Projek Akademik
    04 Sep 2017 - 14 Jun 2018 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Pemeriksa Dalam Bagi Peperiksaan Program Sarjana Dan Doktor Falsafah Sem 1, Sesi 2017/2018
    03 Nov 2017 - 31 Jan 2018 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Jawatankuasa Audit Pemilihan Majlis Perwakilan Pelajar MPPUM
    11 Sep 2017 - 28 Sep 2017 (University Malaya)
  • Deputy Dean of Research
    01 Aug 2014 - 31 Jul 2016 (Dean Office, Faculty of Computer Science and Information Technology)
  • Ahli Jawatankuasa Penilaian bagi Permohonan Geran Penyelidikan di bawah Tadbir Urus IPPP peringkat UM
    01 Jan 2015 - 31 Dec 2016 (University Malaya)
  • Ahli Jawatankuasa Projek Analisa UMEXPERT FSKTM
    15 Dec 2014 - 14 Dec 2016 (Faculty)
  • Ahli Jawatankuasa Pemandu ICT UM
    01 Oct 2015 - 30 Jun 2016 (University Malaya)
  • Ahli Jawatankuasa Tapisan Kenaikan Pangkat Prof/Prof Madya/Pensyarah Kanan FSKTM
    03 Jul 2015 - 30 Jun 2016 (Faculty)
  • Ahli Jawatankuasa Teknikal & Penilaian Harga bagi Kerja-kerja Renovasi di FSKTM
    09 Apr 2015 - 08 Apr 2016 (Faculty)
  • Ahli Jawatankuasa bagi Malaysia Journal of Computer Science (MJSC)
    16 Mar 2015 - 13 Mar 2016 (Faculty)
  • Ahli Jawatankuasa Surau dan Kerohanian FSKTM
    09 Jan 2015 - 08 Jan 2016 (Faculty)
  • Ahli Jawatankuasa Pertandingan MobileAppsTec FSKTM
    28 Nov 2014 - 27 Nov 2015 (Faculty)
  • Acting Dean
    09 Nov 2015 - 13 Nov 2015 (Faculty)
  • Ahli Jawatankuasa Roadshow FSKTM
    10 Nov 2014 - 09 Nov 2015 (Faculty)
  • AHLI JAWATANKUASA AUDIT PEMILIHAN MAJLIS PERWAKILAN PELAJAR UNIVERSITI MALAYA (MPPUM) SESI 2015/2016
    17 Sep 2015 - 17 Sep 2015 (University Malaya)
  • Acting Deputy Dean (Undergraduate)
    05 Jun 2015 - 08 Jun 2015 (Faculty)
  • Acting Deputy Dean (Undergraduate)
    01 Jun 2015 - 02 Jun 2015 (Faculty)
  • Acting Dean
    16 Dec 2014 - 02 Jan 2015 (Faculty)
  • Acting Dean
    30 Nov 2014 - 04 Dec 2014 (Faculty)
  • Ahli Jawatankuasa Kurikulum Jabatan Bagi Program Sarjana
    01 Mar 2012 - 28 Feb 2014 (Department of Computer System & Technology, Faculty of Computer Science and Information Technology)
  • Penemuduga Bagi Kemasukan Ke Program Ijazah Dasar & Asasi Sesi 2013/2014
    13 Apr 2013 - 13 Apr 2013 (University Malaya)
  • Head of Pervasive and Distributed Computing (PDC) Research Group
    01 Jan 2011 - 29 Feb 2012 (University Malaya)
  • Penyelaras Program Sains Gunaan dengan Pengajian Islam FSKTM
    01 Apr 2011 - 31 Dec 2011 (University Malaya)
  • Auditor Dalaman UM - Bil 8/2007
    25 Jun 2007 - 02 Jul 2007 (University Malaya)
  • Ahli Komiti Perlaksanaan CCNA
    05 Jan 2004 - 03 Dec 2004 (University Malaya)
  • Auditor Dalaman UM - Bil 3, 4 dan 5
    01 Dec 2003 - 01 Dec 2004 (University Malaya)

MEMBERSHIPS


  • CISCO SYSTEMS, INC., ACADEMIC MEMBER
    Since 2011 (International)
  • HEAD OF COORDINATOR, MASTER OF CYBER SECURITY, MEMBER
    2021 to 2021 (University)
  • KETUA TERAS PT04, INTERNAL AUDITOR, MEMBER
    2019 to 2021 (University)
  • RUIJIE NETWORKS CO., LTD., ASSOCIATE MEMBER
    2013 to 2016 (International)
  • CISCO SYSTEMS, INC., ASSOCIATE MEMBER
    2008 to 2016 (International)
  • RUIJIE NETWORKS CO., LTD., ACADEMIC MEMBER
    2013 to 2015 (International)
  • CISCO ACADEMY COUNCIL, MEMBER
    2013 to present (National)

AWARD AND STEWARDSHIP


  • Expert Level Instructor for 2018 (Awarded in 2019)
    Cisco, 2019 (International)
  • EXCELLENCE SERVICE AWARD
    University of Malaya, 2015 (University)
  • KHIDMAT SETIA 20 AWARD
    University of Malaya, 2014 (University)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2012 (University)
  • Pingat Gangsa Zaidi Razak, Khansa Zulkiflee, Mohd Yamani Idna Idris, Mohd. Yakub @ Zulkifli Bin Mohd. Yusoff, Emran Mohd Tamil, Noorzaily Mohamed Noor, Dr Rosli Salleh Tajuk: Hardware Design of On-Line Jawi Character Recognition Chip Using Discrete Wavelet Transform
    International Invention, Innovation and Technology Exhibition 2007, 18-20 May 2007 @ Kuala Lumpur Convention Centre (KLCC)(ITEX 2007), 2007 (International)
  • CERTIFICATE OF EXCELLENT SERVICE
    University of Malaya, 2006 (University)
  • A Signature Based Application To Detect Spyware In Network Environment Anugerah Malaysia Technology Exhibition, 23-25 Feb 2006, PWTC, Kuala Lumpur Pingat Gangsa
    Malaysia Technology Exhibition, 2006 (National)
  • A novel hardware implementation of Jawi script recognition and transliteration system Anugerah Ekspo Penyelidikan, Rekacipta & Inovasi UM 2006 Pingat Perak
    Ekspo Penyelidikan, Rekacipta & Inovasi UM 2006, 2006 (University)
  • Ekspo Penyelidikan, Rekacipta & Inovasi UM 2006 Pingat Perak A High Speed Gigabit Network Coprocessor Chip Design To Detect Polymorphic Internet Worm
    Universiti Malaya, 2006 (University)
  • Location Aware Systems Using Mobile Stations In GSM Networks Bersama (Rafidah Mohd Nor penyelia ke 2) Pingat Emas, 17th International Invention, Innovation, Industrial Design & Technology Exhibition (ITEX 06), di Pusat Konvensyen Kuala Lumpur (KLCC)
    Malaysian Invention And Design Society (MINDS), 2006 (National)
  • Pingat Gangsa, Ekspo Teknologi Malaysia 2006, PWTC
    Persatuan Saintis Penyelidikan Malaysia (MARS) dan Kementerian Sains Teknologi dan Inovasi., 2006 (National)
  • Pingat Perak, Ekspo Penyelidikan dan Inovasi 2004
    Universiti Malaya, 2004 (University)

PUBLICATIONS


Article in Journal
WoS
  1. Khan, Nauman; bin Salleh, Rosli; Khan, Zahid; Koubaa, Anis; Hamdan, Mosab; Abdelmoniem, Ahmed M. (2023). Ensuring reliable network operations and maintenance: The role of PMRF for switch maintenance and upgrades in SDN, JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES. 35(10). doi:10.1016/j.jksuci.2023.101809
  2. Khan, Nauman; bin Salleh, Rosli; Koubaa, Anis; Khan, Zahid; Khan, Muhammad Khurram; Ali, Ihsan (2023). Data plane failure and its recovery techniques in SDN: A systematic literature review, JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES. 35(3), 176-201. doi:10.1016/j.jksuci.2023.02.001
  3. Abd Warif, Nor Bakiah; Idris, Mohd Yamani Idna; Wahab, Ainuddin Wahid Abdul; Ismail, Nor-Syahidatul N.; Salleh, Rosli (2022). A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review, MULTIMEDIA TOOLS AND APPLICATIONS. 81(11), 15171-15203. doi:10.1007/s11042-022-12010-2
  4. Alasbali, Nada; Azzuhri, Saaidal Razalli Bin; Salleh, Rosli Bin; Kiah, Miss Laiha Mat; Shariffuddin, Ahmad Aliff A. S. Ahmad; Kamel, Nik Muhammad Izwan bin Nik Mohd; Ismail, Leila (2022). Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization, MOBILE INFORMATION SYSTEMS. 2022. doi:10.1155/2022/9109300
  5. Mazhar, Noman; Saleh, Rosli; Zaba, Reza; Zeeshan, Muhammad; Hameed, M. Muzaffar; Khan, Nauman (2022). R-IDPS: Real Time SDN-Based IDPS System for IoT Security, CMC-COMPUTERS MATERIALS & CONTINUA. 73(2), 3099-3118. doi:10.32604/cmc.2022.028285
  6. Naghavipour, Hadi; Bin Idris, Mohd Yamani Idna; Soon, Tey Kok; Bin Salleh, Rosli; Gani, Abdullah (2022). Hybrid Metaheuristics Using Rough Sets for QoS-Aware Service Composition, IEEE ACCESS. 10, 112609-112628. doi:10.1109/ACCESS.2022.3213705
  7. Naghavipour, Hadi; Soon, Tey Kok; Bin Idris, Mohd Yamani Idna; Namvar, Morteza; Bin Salleh, Rosli; Gani, Abdullah (2022). Hybrid Metaheuristics for QoS-Aware Service Composition: A Systematic Mapping Study, IEEE ACCESS. 10, 12678-12701. doi:10.1109/ACCESS.2021.3133505
  8. Shagari, Nura Modi; Bin Salleh, Rosli; Ahmedy, Ismail; Idris, Mohd Yamani Idna; Murtaza, Ghulam; Ali, Usman; Modi, Salisu (2022). A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism, WIRELESS NETWORKS. 28(5), 2077-2104. doi:10.1007/s11276-021-02885-8
  9. Alasbali, N., Bin Azzuhri, S. R., & Salleh, R. (2021). Stakeholders' Viewpoints toward Blockchain Integration within IoT-Based Smart Cities. Journal of Sensors, 2021, 17. doi: 10.1155/2021/4680021
  10. Khan, N., Bin Salleh, R., Ali, I., Khan, Z., Mazhar, N., Alroobaea, R., . . . Ali, U. (2021). Enabling Reachability Across Multiple Domains Without Controller Synchronization in SDN. Cmc-Computers Materials & Continua, 69(1), 945-965. doi: 10.32604/cmc.2021.017394
  11. Mazhar, N., Salleh, R., Zeeshan, M., & Hameed, M. M. (2021). Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey. IEEE Access, 9, 41757-41786. doi: 10.1109/access.2021.3065123
  12. Shagari, N. M., Idris, M. Y. I., Bin Salleh, R., Ahmedy, I., Murtaza, G., & Sabri, A. Q. B. (2021). A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network. Wireless Networks, 27(4), 2641-2670. doi: 10.1007/s11276-021-02608-z
  13. Shagari, N. M., Idris, M. Y. I., Bin Salleh, R., Ahmedy, I., Murtaza, G., Shehadeh, H. A. (2020). Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network. Ieee Access, 8, 12232-12252. doi: 10.1109/access.2020.2965206
  14. Shagari, Nura Modi; Idris, Mohd Yamani Idna; Bin Salleh, Rosli; Ahmedy, Ismail; Murtaza, Ghulam; Shehadeh, Hisham A. (2020). Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network, IEEE ACCESS. 8, 12232-12252. doi:10.1109/ACCESS.2020.2965206
  15. Ab Razak, M. F., Anuar, N. B., Salleh, R., Firdaus, A., Faiz, M., Alamri, H. S. (2019). "Less Give More": Evaluate and zoning Android applications. Measurement, 133, 396-411. doi:10.1016/j.measurement.2018.10.034
  16. Abd Warif, N. B., Idris, M. Y. I., Wahab, A. W. A., Salleh, R., Ismail, A. (2019). CMF-iteMS: An automatic threshold selection for detection of copy-move forgery. Forensic Science International, 295, 83-99. doi:10.1016/j.forsciint.2018.12.004
  17. Tambawal, A. B., Noor, R. M., Salleh, R., Chembe, C., Oche, M. (2019). Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications. Plos One, 14(4), 19. doi:10.1371/journal.pone.0214664
  18. Tambawal, A. B., Noor, R. M., Salleh, R., Chembe, C., Anisi, M. H., Michael, O., Lloret, J. (2019). Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey. Telecommunication Systems, 70(4), 595-616. doi:10.1007/s11235-018-00542-8
  19. Ab Razak, M. F., Anuar, N. B., Othman, F., Firdaus, A., Afifi, F., Salleh, R. (2018). Bio-inspired for Features Optimization and Malware Detection. Arabian Journal for Science and Engineering, 43(12), 6963-6979. doi:10.1007/s13369-017-2951-y
  20. Abd Warif, N. B., Wahab, A. W. A., Idris, M. Y. I., Salleh, R., Othman, F. (2017). SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack. Journal of Visual Communication and Image Representation, 46, 219-232.
  21. Ab Razak, Mohd Faizal; Anuar, Nor Badrul; Salleh, Rosli; Firdaus, Ahmad (2016). The rise of "malware": Bibliometric analysis of malware study, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 75, 58-76. doi:10.1016/j.jnca.2016.08.022
  22. Modares, H., Moravejosharieh, A., Lloret, J., Salleh, R. (2014). A survey of secure protocols in Mobile IPv6, Journal of Network and Computer Applications. 39, 351-368
  23. Fatemi, M. R. H., Ates, H. F., Salleh, R. (2010). FAST ALGORITHM ANALYSIS AND BIT-SERIAL ARCHITECTURE DESIGN FOR SUB-PIXEL MOTION ESTIMATION IN H.264, Journal of Circuits Systems and Computers. 19(8), 1665-1687
  24. Razak, Z., Zulkiflee, K., Noor, N. M., Salleh, R., Yaacob, M. (2009). OFF-LINE HANDWRITTEN JAWI CHARACTER SEGMENTATION USING HISTOGRAM NORMALIZATION AND SLIDING WINDOW APPROACH FOR HARDWARE IMPLEMENTATION, Malaysian Journal of Computer Science. 22(1), 34-43
Scopus
  1. Khan N., Salleh R.B., Koubaa A., Khan Z., Khan M.K., Ali I. (2023). Data plane failure and its recovery techniques in SDN: A systematic literature review, Journal of King Saud University - Computer and Information Sciences. 35(3), 176-201. doi:10.1016/j.jksuci.2023.02.001
  2. Shagari N.M., Salleh R.B., Ahmedy I., Idris M.Y.I., Murtaza G., Ali U., Modi S. (2022). A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism, Wireless Networks. 28(5), 2077-2104. doi:10.1007/s11276-021-02885-8
Others
  1. Nada Alasbali, Saaidal Razalli Bin Azzuhri, Rosli Salleh, "Stakeholders Viewpoints toward Blockchain Integration within IoT-Based Smart Cities", Journal of Sensors, vol. 2021, Article ID 4680021, 17 pages, 2021. https://doi.org/10.1155/2021/4680021
  2. Noman Mazhar, Rosli Salleh, Mohammad Asif Hossain, Muhammad Zeeshan. (2020). SDN based Intrusion Detection System and Prevention Systems Using Manufacturer Usage Description: A Survey. International Journal of Advanced Computer Science and Applications (IJACSA).
  3. Feizollah, A., Anuar, N. B., & Salleh, R. (2018). Evaluation of Network Traffic Analysis Using Fuzzy C-Means Clustering Algorithm in Mobile Malware Detection. Advanced Science Letters, 24(2), 929-932. doi:10.1166/asl.2018.10660
  4. Tahaei, H., Bin Salleh, R., Ab Razak, M. F., Ko, K., & Anuar, N. B. (2018). Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario. IEEE Access, 6, 5182-5198. doi:10.1109/access.2017.2789281
  5. Waqar Khurshid, Miss Laiha Mat Kiah, Imran Ali Khan, Rosli Salleh, Anthony Theodore Chronopoulos, Sajjad Ahmed Madani. (2018). Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet. Volume 7, Issue 4. Pp. 248 257. DOI: 10.1049/iet-net.2017.0101
  6. Feizollah, A., Anuar, N.B., Salleh, R., Suarez-Tangil, G., Furnell, S. (2017). AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Computers & Security, 65, 121-134. doi:10.1016/j.cose.2016.11.007
  7. Tahaei, H., Salleh, R., Khan, S., Izard, R., Choo, K.-K.R., Anuar, N.B. (2017). A multi-objective software defined network traffic measurement. Measurement, 95, 317-327. doi:10.1016/j.measurement.2016.10.026
  8. Tam, K., Feizollah, A., Anuar, N.B., Salleh, R., Cavallaro, L. (2017). The Evolution of Android Malware and Android Analysis Techniques. ACM Computing Surveys, 49(4), 1-41. doi:10.1145/3017427
  9. Ab Razak, M.F., Anuar, N.B., Salleh, R., Firdaus, A. (2016). The rise of "malware": Bibliometric analysis of malware study. Journal of Network and Computer Applications, 75, 58-76. doi:10.1016/j.jnca.2016.08.022
  10. Ahmad Karim, Rosli Salleh, Muhammad Khurram Khan, Aisha Siddiqa, Kim-Kwang Raymond Choo (2016). On the Analysis and Detection of Mobile Botnet Applications. Journal of Universal Computer Science, vol. 22, no. 4 (2016), 567-588.
  11. Karim A, Salleh R, Khan MK (2016). SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications. PLoS ONE 11(3)
  12. Warif, N. B. A., Wahab, A. W. A., Idris, M. Y. I., Ramli, R., Salleh, R., Shamshirband, S., & Choo, K. K. R. (2016). Copy-move forgery detection: Survey, challenges and future directions. Journal of Network and Computer Applications, 75, 259-278.
  13. Karim, Ahmad, Syed Adeel Ali Shah, Rosli Bin Salleh, Muhammad Arif, Rafidah Md Noor, and Shahaboddin Shamshirband. 2015. Mobile Botnet Attacks an Emerging Threat: Classification, Review and Open Issues. KSII Transactions On Internet And Information Systems. Vol. 9, No. 4.
  14. H Modares, A Moravejosharieh, RB Salleh, J Lloret. 2014. Enhancing Security in Mobile IPv6. ETRI Journal 36 (1), 51-61. (Q3, IF=0.945, ISI Cited Publication)
  15. Karim, A., Salleh, R. B., Shiraz, M., Shah, S. A. A., Awan, I., & Anuar, N. B. (2014). Botnet detection techniques: review, future trends and issues. Journal of Zhejiang University/SCIENCE C. Volume 15, Issue 11:943-983
  16. A. Moravejosharieh, H. Modares & R. Salleh, and E. Mostajeran. Performance Analysis of AODV, AOMDV, DSR, DSDV Routing Protocols in Vehicular Ad Hoc Network. 2013. Research Journal of Recent Sciences. ISSN: 2277-2502.
  17. Feizollah, A., Anuar, N.B., Salleh, R., Amalina, F., Ma'arof, R.R., Shamshirband, S. (2013). A Study of Machine Learning Classifiers For Anomaly-Based Mobile Botnet Detection. Malaysian Journal of Computer Science, 26(4), 251-265
  18. Hero Modares, Amirhossein Moravejosharieh & Rosli Salleh. 2013. Secure connection in Mobile IPv6. Life Science Journal. Vol 10(2). ISSN:1097-8135.
  19. Hero Modares, Amirhossein Moravejosharieh, Rosli Salleh & Jaime Lloret. 2013. Security overview of Wireless Sensor Network. Life Science Journal Vol 10(2). ISSN:1097-8135
  20. Mohammad R. H. Fatemi, Hasan Ates and Rosli Salleh. 2013. Analysis and Design of Low-Cost Bit-Serial Architectures for Motion Estimation in H.264/AVC. Journal of Signal Processing Systems.
  21. H. Modares, M. T. Shahgoli, H. Keshavarz, A. Moravejosharieh, R. Salleh, 2012, Make a Secure Connection Using Elliptic Curve Digital Signature , International Journal of Scientific & Engineering Research (IJSER), Volume 3, Issue 9, September-2012 ISSN 2229-5518
  22. R. H. Fatemi, H. F. Ates & R. Salleh. May 2012. A Survey of Algorithms and Architectures for H.264 Sub- Pixel Motion Estimation. Journal of Circuits, Systems, and Computers (JCSC), Vol. 21, No. 3.
  23. Laeth A. Al-Rawi, Rosli Salleh, Ghaith A. Al-Rawi, Hassan A. Al-Rawi, & H.Keshavarz. 2011. Reducing Layer 2 Handoff Latency in WLANs using Advanced Context Distribution. International Journal of Scientific and Engineering Research (IJSER) - (ISSN 2229-5518). France.
  24. Obay H.Sabrie, Hasan S. Hasan & Rosli Salleh. 2011. Fast Handoff for 802.11 Wireless Network. Communications and Network Journal, Vol. 3, No. 4, November 2011.
  25. Modares, H., Y. Salem, R. Salleh and M.T. Shahgoli
  26. Mohammad Reza Hosseiny Fatemi, Hasan F. Ates, Rosli Salleh, Fast Algorithm Analysis And Bit-serial Architecture Design For Sub-pixel Motion Estimation In H.264 , Journal of Circuits, Systems, and Computers (JCSC), Vol. 19, Issue 8, Dec 2010.
  27. A. H. Lashkari, O. Zakaria, R. Salleh, S. Farmand, Shoulder Surfing Attack in Graphical Password Authentication, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 2, 2009, USA.
  28. A. H. Lashkari, O. Zakaria, R. Salleh, S. Farmand, A wide-range survey on Recall-Based Graphical User Authentications algorithms based on ISO and Attack Patterns, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 3, 2009, USA
  29. A. Jaradat, R. Salleh, A. Abid, Imitating K-Means to Enhance Data Selection, Journal of Applied Sciences, ISSN: 1812-5654, Issue 9(19), 2009, pp. 3569-3574
  30. Obay H. Sabrie, Rosli Salleh, Enhancing Handoff Process using IAPP with Caching Techniques, Journal of Applied Sciences, ISSN 1812-5654, Vol. 9 Issue 22, 2009, PP. 3999-4005.
  31. X. Li, R. Salleh and Omar Zakaria, (2009) "Wireless Spectrum Combination Protocol for 4G Networks", Journal of Applied Sciences, Issue 9, No. 2, pp 334-341
  32. X. Li, R. Salleh, O. Zakaria, Mobile Multimedia Control Model for Fire Disaster of City Building, Journal of Applied Sciences, ISSN 1812-5654, Issue 9, No. 2, pp. 304-311, 2009
  33. X.Li, R. Salleh and Omar Zakaria, (2009), "Mobile Multimedia Control Model for Fire Disaster of City Building", Journal of Applied Sciences, Issue 9, No. 2, pp304-311
  34. Zaidi Razak, Khansa Zulkiflee, Noorzaily Mohamed Noor, Rosli Salleh, Mashkuri Yaacob,"Off-line Handwritten Jawi Character Recognition Using Histogram Normalization and Sliding Window Approach For Hardware Implementation" Malaysian Journal of Computer Science,pg 35-43, Vol. 22. No. 1, 2009
  35. Zaidi Razak, Nurulhuda Abd Ghani, Emran Mohd Tamil, Mohd Yamani Idna Idris, Noorzaily Mohamed Noor, Rosli Salleh, Mashkuri Yaacob, Mohd. Yakub @ Zulkifli Bin Mohd Yusoff, Off-line Jawi Handwriting Recognition using Hamming Classification, Information Technology Journal, IC-6713-ITJ-ANSI ISSN:1812-5638
  36. Khansa Zulkiflee, Zaidi Razak, Mohd Yamani Idna Idris, Emran Mohd Tamil, Mohd Noorzaily Mohamed Noor, Rosli Salleh, Mohd Yaakob @ Zulkifli Mohd Yusof, and Mashkuri Yaacob, 2008"Off-line Handwriting Text Line Segmentation : A Review", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008,(In Press)
  37. Khansa Zulkiflee, Zaidi Razak, Mohd Yamani Idna Idris, Emran Mohd Tamil, Mohd Noorzaily Mohamed Noor, Rosli Salleh, Mohd Yaakob @ Zulkifli Mohd Yusof, and Mashkuri Yaacob, Off-line Handwriting Text Line Segmentation : A Review, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008,(In Press)
  38. Zaidi Razak, Khansa Zulkiflee, Noorzaily Mohamed Noor, Rosli Salleh, Mashkuri Yaacob,Off-line Handwritten Jawi Character Recognition Using Histogram Normalization and Sliding Window Approach For Hardware Implementation (Submitted)
  39. Iqbal H. Jebril, Rosli Salleh, Al-Shawabkeh M, Efficient Algorithm in Projective Coordinates for EEC Over GF(2n), International Journal of The Computer, The Internet and Management, Volume 15 Number 1, Jan Apr 2007, pp 43-50
  40. Li Xi Chun, Rosli Salleh,Handoff Techniques for 4G Wireless Mobile Internet, Article No 152-ITJ-2K6, Information Technology Journal
  41. Zaidi Razak ,Khansa Zulkiflee,Rosli Salleh,Mashkuri Haji Yaacob ,Emran Mohd Tamil , A Real-Time Line Segmentation Algorithm for An Offline Overlapped Handwritten Jawi Character Recognition Chip, Malaysian Journal of Computer Science, Vol. 20 No. 2, Dec 2007
  42. Rosli Salleh, Zaidi Razak, Darwin Caldwell and Rui Loureiro, SalFSAR: A Dual Purpose Device for Laparoscopic Training and Tele-surgery , Malaysian Journal of Computer Science, Vol. 18 No. 1, June 2005, pp. 78-92.
Books
  1. Buku Teks MPAV Kegunaan 2008, Sistem Sokongan Rangkaian Tingkatan 4 dan 5
  2. Chapter 11, Virtual Private Networking , Selected topic In Installation of Client-Server Application.
Chapter in Books
  1. Karim, Ahmad, Syed Adeel Ali Shah, and Rosli Salleh. Mobile Botnet Attacks: A Thematic Taxonomy. 2014. New Perspectives in Information Systems and Technologies, Volume 2. Springer International Publishing. pp.153-164.
Article in Proceeding
  1. Nauman Khan, Rosli Bin Salleh, Zahid Khan, & Anis Koubaa. (2020). Avoiding Forwarding Loop Across Multiple Domains Without Controller Synchronization in SDN. 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), 122-127. doi:10.1109/SMART-TECH49988.2020.00040
  2. Nor Bakiah Abd Warif, Mohd. Yamani Idna Idris, Ainuddin Wahid Abdul Wahab, Rosli Salleh "An Evaluation Of Error Level Analysis In Image Forensics" 2015 IEEE International Conference on System Engineering and Technology, August 10 11, UiTM Shah Alam, Selangor Malaysia
  3. A. Moravejosharieh, R. Salleh, H. Modares. 2012. Overview of Handover Latency and Resource Consumption in Hierarchical Mobile IPv6 Protocol and GPS Approaches. Third International Conference on Intelligent Systems, Modelling and Simulation, IEEE ISMS2012. Kota Kinabalu, Malaysia. 8 10 February 2012. ISBN 978-0-7695-4668-1
  4. Eslahi, M., Salleh, R. and Anuar, N.B., (2012), "MoBots: A New Generation of Botnets on Mobile Devices and Networks", Proceedings of the IEEE International Symposium on Computer Applications and Industrial Electronics (ISCAIE), Kota Kinabalu, Malaysia.
  5. H. Modares, A. Moravejosharieh, R. Salleh. 2012. Overview of Mobile IPv6 Security. Third International Conference on Intelligent Systems, Modelling and Simulation, IEEE ISMS2012. Kota Kinabalu, Malaysia. 8 10 February 2012. ISBN 978-0-7695-4668-1
  6. Hero Modares , Rosli Salleh, Amirhosein Moravejosharieh, Hassan Keshavarz, Majid Talebi Shahgoli. 2012. A Survey on Cloud Computing Security. Archives Des Sciences Journal (ISSN: 1661-464X). Volume. 65, Issue. 6.
  7. Hero Modares, Amirhosein Moravejosharieh, Hassan Keshavarz, Rosli Salleh. 2012. Protection of Binding Update Message in Mobile IPv6. ISI 2012: 1st International Conference on Intelligent Systems and Informatics. 19-21 Nov 2012. Bandung, Indonesia.
  8. M. Eslahi, R. Salleh, and N. B. Anuar. 2012. Bots and Botnets: An Overview of Characteristics, Detection and Challenges. Presented at the IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia. 23-25 Nov 2012.
  9. M. Eslahi, R. Salleh, and N. B. Anuar. 2012. MoBots: A New Generation of Botnets on Mobile Devices and Networks. Presented at the IEEE International Symposium on Computer Applications and Industrial Electronics (ISCAIE), Kota Kinabalu Malaysia.
  10. H. Modares, A. Moravejosharieh & R. Salleh, 2011. Wireless Network Security Using Elliptic Curve Cryptography. First International Conference on Informatics and Computational Intelligence, IEEE ICI2011. Department of Informatics - Parahyangan Catholic University, Bandung, Indonesia. 12 - 14 December 2011
  11. H. Modares, R. Salleh & A. Moravejosharieh. 2011. Overview of Security Issues in Wireless Sensor Networks. Third International Conference on Computational Intelligence, Modelling & Simulation, Langkawi, Malaysia. 20-22 September 2011. IEEE Computer Society, DOI 10.1109/CIMSim.2011.62
  12. Moravejosharieh, R. Salleh & H. Modares. 2011. Overview of Latest Approaches in Heterogeneous and Mobile IPv6 Homogeneous Wireless Networks Based on Location-Assisted Information. First International Conference on Informatics and Computational Intelligence, IEEE ICI2011. Department of Informatics - Parahyangan Catholic University, Bandung, Indonesia. 12 - 14 December 2011.
  13. Moravejosharieh, R. Salleh & H. Modares. 2011. A Novel Approach For Efficient Resource Consumption In GPS- Based Mobile IPv6 Wireless LAN. Third International Conference on Computational Intelligence, Modelling & Simulation, Langkawi, Malaysia. 20-22 September 2011. IEEE Computer Society, DOI 10.1109/CIMSim.2011.61.
  14. A. H. Lashkari, F. Towhidi, R. Salleh, S. Farmand, A Complete Comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithm, 2ND International Conference on Computer and Electronic Engineering (ICCEE), 2009, Dubai
  15. A. H. Lashkari, S. Farmand, R. Salleh, O. Zakaria, Recall-Based Graphical User Authentication Based On Attacks Patterns, The 13th IEEE International Multitopic Conference (INMIC 2009), 14-15 Disember 2009, Islamabad, Pakistan.
  16. Ahmed K. Hasan, A.A. Zaidan, Rosli Salleh, Omar Zakaria, B.B. Zaidan, and S.M. Mohammed, Throughput Optimization of Unplannen Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), Proceedings of the World Congress on Engineering 2009, Vol 1, WCE 2009, July 1-3 2009, London UK
  17. Hero Modares, Yasser Salem, Mohamad Reza Hossiny Fatemi, Rosli Salleh, "Secure Smart Card Transactions using Elliptic Curve Cryptography and Biometric", 3rd International Conference on Informatics and Technology, 2009 (Informatics '09), 27th-28th October, 2009, Kuala Lumpur Malaysia, pp.209-214
  18. Moderes, H, Fatemi, M.R.H., and Salleh, R., 2009, Elliptic Curve Cryptography: The Next Generation Encryption Technology for Secure Data Communication, E-Case 2009 Conference, 8-10 Jan 2009, Grand Copthorne Waterfront Hotel, Singapore.
  19. Salem, Y., Fatemi, M.R.H., Salleh, R, and Jebril, I., 2009, Application of Elliptic Curve Cryptography: An Overview, E-Tech 2009 Conference, 8-10 Jan 2009, Grand Copthorne Waterfront Hotel, Singapore
  20. Xichun Li, Abdullah Gani, Rosli Salleh, Omar Zakaria, "The Future of Mobile Wireless Communication Networks", 2009 International Conference on Communication Software and Networks (ICCSN 2009) (IEEE Proceedings), 27-28 February 2009, Macau, China
  21. Xichun Li, Rosli Salleh, Abdullah Gani and Omar Zakaria (2009), "Multi-Network Data Path for 5G Mobile Multimedia", 2009 International Conference on Communication Software and Networks (ICCSN 2009) (IEEE Proceedings), 27-28 February 2009, Macau, China
  22. Yasser Salem , Hero Modares, Mohamad Reza Hosseiny, Rosli Salleh, "An Overview of Elliptic Curve Cryptography in constrained Applications", 3rd International Conference on Informatics and Technology, 2009 (Informatics '09), 27th-28th October, 2009, Kuala Lumpur, Malaysia, pp. 158-163
  23. Jebril, I. & Salleh. R. An Improved Elliptic Curve Public Key cryptography Algorithm. The Third International Conference on Mathematical Sciences (ICM 2008). March 3-6, 2008. Al Ain, UAE
  24. Mohammad Reza Hosseiny Fatemi, Iqbal Jebril, Rosli Salleh, An FPGA-Based Co-Processor For Elliptic Curve Cryptography, Proceedings of the Fifth IASTED International Conference on COMMUNICATION SYSTEMS AND NETWORKS (AsiaCSN 2008), April 2-4 2008, Langkawi, Malaysia, pp 73-77. ISBN CD: 978-0-88986-735-5
  25. Mohammadreza Hosseiny Fatemi, Hasan F. Ates & Rosli Salleh. A Cost-Efficient Bit-Serial Architecture for Sub-Pixel Motion Estimation of H.264/AVC. The Fourth Internationla Conference on Intelligent Information Hiding and Multimedia Signal Processing. 15-17 Ogos 2008. Harbin, China.
  26. Rosli Salleh, Xichun Li & Lina Yang. Radio Frequency Convergence Protocol for 4G Netwroks. The 8th WSEAS International Conference on MULTIMEDIA SYSTEMS and SIGNAL PROCESSING (MUSP 08). 6-8 April 2008. Hangzhou, China
  27. Mahmoud Al-Shawabkeh, Rosli Salleh & Xichun Li. 2007. Bandwidth Optimization Control Protocol for 4G Wireless Mobile Internet. Proceedings of the 11th WSEAS International Conference on COMMUNICATIONS. Agios Nikolaos, Crete Island, Greece. July 26-28, 2007
  28. Mohammad R. H. Fatemi, Rosli Salleh & Hassan F. Ates. An Algorithm and Its Architecture For Half-pixel Variable Block Size Motion Estimation. 8TH IEEE Malaysia International Conference on Communications (MICC). 15 May 17 May 2007. Bayview Beach Resort, Batu Ferenghi, Penang
  29. Iqbal H. Jebril, Rosli Salleh & Mahmoud Al-Shawabkeh. Study of The Formulas in Projective Coordinates for Elliptic Curve Over GF(2n) in Cryptography. 2004. Proceeding of the Joint International Conference on Informatics and Research on Woman in ICT (RWICT). Volume 2, 28-30 July 2004. Putra World Trade Centre, Kuala Lumpur Malaysia, pp. 805-817
  30. Mahmoud Al-Shawabkeh, Rosli Salleh, & Iqbal H. Jebril. 2004. Proposed Bluetooth Middleware Profile For On-Location Universal Format Announcement. Proceeding of the Joint International Conference on Informatics and Research on Woman in ICT (RWICT) 2004. Volume 2. 28-30 July 2004, Putra World Trade Centre, Kuala Lumpur Malaysia, pp. 1023-1032
  31. Rosli Salleh, Ali Fauzi Ahmad Khan, Rui Loureiro & Darwin Caldwell. Force Feedback Laparoscopic Handle and Grasping/Cutting Simulator. Proceeding of National Conference on Computer Graphics and Multimedia: Computer Graphics and Multimedia Applications in Global Industry. 7-9 Oct 2002. Equatorial Hotel, Melaka
  32. Rosli Salleh, Rui Loureiro & Darwin G. Caldwell. 2000. Haptic Feedback for VR based Minimally Invasive Surgical (MIS) Trainin. 3rd EURELL Workshop and Masterclass: European Advanced Robotics Systems Development. 12-14 April 2000. University of Salford, UK
  33. Rosli Salleh & Darwin G. Caldwell. 1999. Haptic Feedback for VR based Minimally Invasive Surgical (MIS) Training and Telesurgery. 2nd EUREL Workshop: European Advanced Robotics System Development Medical Robotics. 23-24 September 1999. Scuola Superiore Sant Anna, Pisa, Italy
Other Publications
  1. KEPUTUSAN MESYUARAT JAWATANKUASA FATWA NEGERI SELANGOR, 'PANDANGAN HUKUM SYARAK PENGISBATAN ANAK BULAN DARI PERSPEKTIF SYARIAH DAN ASTRONOMI'", BIL 3/2021, 18 MEI 2021. - Policy Paper
  2. Kompilasi Pandangan Hukum Jawatankuasa Muzakarah Majlis Kebangsaan Bagi Hal Ehwal Islam Malaysia (MK(), ms 66-67, Jabatan Kemajuan Islam Malaysia. - Policy Paper

RESEARCH INTEREST


  • Mobile IPv6
  • Wireless Handoff

RESEARCH PROJECT


National
  1. 2019 - 2024, Others MOHE - Top 100 (IIRG)-FNW
    Development Of Efficient Algorithm To Improve The Crescent Moon Visibility Based On Al-rukyah Method In Malaysia And Related Android/web Based Application ( Principal Investigator(PI))
  2. 2019 - 2021, RU Geran - Fakulti Program
    Intrusion Detection And Prevention System Using Software Defined Networks (sdn) In Hetereogeneous Iot Network Using Manufacturer Usage Description ( Principal Investigator(PI))
  3. 2014 - 2017, MOSTI-Science Fund
    An Intelligent Tool For Mobile Malware Detection And Responses ( Co-Researcher)
  4. 2015 - 2017, Geran Penyelidikan Universiti Malaya (UMRG) - AFR (Frontier Science)
    Mobile Sinks Selection And Navigation For Efficient Data Collection In Wireless Sensor Networks ( Co-Researcher)
  5. 2016 - 2017, UM Community Campus-Manage by UMCARES
    Smart Management Of Elctrical Appliances And Energy Saving Using Internet Of Things ( Co-Researcher)
  6. 2012 - 2016, Fundamental Research Grant Scheme (FRGS)
    A Fundamental Research On Botnet Phenomenon : Detection , Response, And Mitigation ( Principal Investigator(PI))
  7. 2012 - 2013, Geran Penyelidikan Universiti Malaya (UMRG) - ICT
    Mobile Botnet ( Co-Researcher)
  8. 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG)
    REDUCING HANDOFF LATENCY IN IEEE 802.11 BASED WLANS ( Principal Investigator(PI))
  9. 2007 - 2010, Fundamental Research Grant Scheme (FRGS)
    AN FPGA-BASED MOTION ESTIMATION CHIP DESIGN FOR H.264 ( Principal Investigator(PI))
  10. 2009 - 2010, Postgraduate Research Grant (PPP) - Research
    LOW-COST CO-PROCESSOR DESIGN FOR ELLIPTIC CURVE CRYPTOGRAPHY
  11. 2009 - 2010, Postgraduate Research Grant (PPP) - Research
    IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY USING BIOMETRIC FEATURES TO ENHANCE SECURITY SERVICES
  12. 2007 - 2008, RU Geran
    SPECIALIZED PROCESSOR APPLYING NEW ELLIPTIC CURVE CRYPTOGRAPHIC ALGORITHM ( Principal Investigator(PI))
  13. 2007 - 2008, MOSTI-Science Fund
    DISTRIBUTED AND MULTIPROCESSING OF BIOMETRIC FEATURES: SECURITY APPLICATION ON SPECIALIZED PROCESSOR APPLYING NEW ELLIPTIC CURVE CRYPTOGRAPHIC ALGORITHM ( Principal Investigator(PI))
  14. 2007 - 2007, 7
    AN FPGA-BASED MOTION ESTIMATION CHIP DESIGN FOR H.264 ( Principal Investigator(PI))
  15. 2012 - 2015, Fundamental Research Grant Scheme (FRGS)
    A Fundamental Research on Botnet Phenomenon: Detection, Response, And Mitigation ( Principal Investigator(PI))
  16. 2011 - 2012, Geran Penyelidikan Universiti Malaya (UMRG)
    A Secure Model For MIPv6 Handover ( Principal Investigator(PI))
  17. 2009 - 2011, Geran Penyelidikan Universiti Malaya (UMRG)
    Reducing Handoff Latency In IEEE 802.11 Based WLAN. ( Principal Investigator(PI))
  18. 2007 - 2009, UM / Geran Khas Universiti Penyelidikan
    Distributed and Multiprocessing of Biometric Features: Security Application on Chip Specialized Processor Applying New Elliptic Curve Cryptographic Algorithm ( Principal Investigator(PI))
  19. 2007 - 2009, MOHE / Fundamental Grant & UM Geran Khas
    An FPGA based Motion Estimation Chip Design for H.264 ( Principal Investigator(PI))
  20. 2007 - 2008, UM / VOTF
    Specialized Processor Applying New Elliptic Curve Cryptographic Algorithm ( Principal Investigator(PI))

CONSULTANCY PROJECT


  • Kajian Program Ijazah Sarjana Muda Teknologi Maklumat, Kolej Ugama Sultan Zainal Abidin(KUSZA)
    01 Nov 2004 - 01 Nov 2008 (University)
  • Huraian Sukatan Pelajaran ICT Tingkatan 4, Content Solution Sdn Bhd
    01 Nov 2005 - 01 Nov 2006 (National)

PAPER PRESENTED


PLENARY SPEAKER
  1. Analisa Pemprosesan Imej Anak Bulan Menggunakan Teknik Statistik, Pembentangan Hasil Penyelidikan Bersama JAKIM, JAKIM (National) (24 Nov 2022 - 26 Nov 2022)
INVITED SPEAKER
  1. PEMPROSESAN IMEJ ANAK BULAN DI MALAYSIA, PENCERAPAN ANAK BULAN DI MALAYASIA - MENJALIN TRADISI DAN INOVASI, Galeri Penyelidikan UM 2023 & Forum Awam Pejabat Kluster Penyelidikan (University) (21 Jun 2023 - 21 Jun 2023)
  2. Network Management, Malaysia NetAcad Partners Summit 2013, Cisco Malaysia (National) (10 Dec 2013 - 12 Dec 2013)
ORAL PRESENTER
  1. How To Write A Research Project, Postgraduate Event for FSKTM, Deputy Dean (Postgraduate) (University) (06 Jul 2023 - 06 Jul 2023)
PRESENTER
  1. A Cost-Efficient Bit-Serial Architecture for Sub-Pixel Motion Estimation of H.264/AVC, The Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (International) (15 Aug 2008 - 17 Aug 2008)
  2. An Algorithm and Its Architecture For Half-pixel Variable Block Size Motion Estimation, 8TH IEEE Malaysia International Conference on Communications (MICC), IEEE Malaysia (International) (15 May 2007 - 15 May 2007)
  3. Force Feedback Laparoscopic Handle and Grasping/Cutting Simulator, Proceeding of National Conference on Computer Graphics and Multimedia: Computer Graphics and Multimedia Applications in Global Industry (07 Oct 2002 - 09 Oct 2002)
  4. Haptic Feedback for VR based Minimally Invasive Surgical (MIS) Training, 3rd EURELL Workshop and Masterclass: European Advanced Robotics Systems Development, European Advanced Robotics (International) (12 Apr 2000 - 14 Apr 2000)
  5. Haptic Feedback for VR based Minimally Invasive Surgical (MIS) Training, 2nd EUREL Workshop: European Advanced Robotics System Development Medical Robotics, European Advanced Robotics (International) (23 Sep 1999 - 24 Sep 1999)

ACADEMIC/PROF. SERVICES


Evaluation
  1. (2024) Panel Pemeriksa Luar Bagi Program Diploma in Computer Science (Cc104) Kptm Batu Pahat Dari 1 Julai 2023 - 30 Jun 2026, National, (External Assessor)
  2. (2024) Panel Pemeriksa Luar Bagi Program Diploma in Computer Science and Networking (Cc103) Kptm Alor Setar Dari 1 Julai 2023 - 30 Jun 2026, National, (External Assessor)
  3. (2023) Phd Viva for Zainab Ebrahim Qamber, a Trust Model Anomaly Detection of Rpl Attacks in Wsn-Based Iot, University, (Internal Examiner)
  4. (2023) Panel for Anugerah Projek Akhir Cemerlang (Apac), University, (Reviewer)
  5. (2022) Editorial, International, (Reviewer)
  6. (2015) Examination of Doctoral Thesis - Mehdi Sookhak, (Internal Examiner)
  7. (2015) Examination of Doctoral Thesis - Md Whaidduzzaman , (Internal Examiner)
  8. (2015) External Assessor (Promotion) - Dr Al Sakib Khan Pathan (IIUM) , (External Assessor)
  9. (2015) Examination of Doctoral Thesis - Mohammad Reza Jabbarpour Sattari , (Internal Examiner)
  10. (2015) Viva-Voce - Vahid Ayatollahitafi (UTM), (External Examiner)
  11. (2015) Pelantikan sebagai Pemeriksa Luar Tesis - Almazroi, Abdulaleem Ali A , (External Examiner)
  12. (2014) Pemeriksa Tesis -Vahid Ayatollahitafi (UTM), (External Examiner)
  13. (2014) Thesis Examination - Farah Ramadhani (UTM), (External Examiner)
  14. (2013) Dual Demand Side Management In Optimizing Utilization Of Available Power Supply, (External Examiner)
  15. (2013) Evaluation of Research Project WXGA6183 for Master of Comp Sc, FSKTM (Coursework only): "Enhanced AODV Routing Protocol in Vehicular Ad-Hoc Networks", (Internal Examiner)
  16. (2013) Phd Thesis on "Investigation of Fast and Accurate Intelligent Ray Optical Propagation Model For Indoor", Faculty of Engineering, University of Malaya , (Internal Examiner)
  17. (2012) As an external reviewer for Master of Information Technology, "Intrusion Avoidance in RFID System Based on EPCGlobal Class-1 Generation-2 Standard" for Faculty of Information Science And Technology, University Kebangsaan Malaysia, (External Examiner)
  18. (2012) Master Thesis (FSKTM) on "ENHANCING ROUTING INFORMATION PROTOCOL PERFORMANCE USING FULL TRIGGERED UPDATE MECHANISM" , (Internal Examiner)
  19. (2012) Reviewer of the paper "Proactive Maintenance Strategies for Wireless Sensor Networks" for the International Journal of Sensor Network (ISI/Scopus)., (Reviewer)
  20. (2012) Master Thesis (FSKTM)on "Integrity of Emergency Messages Over Vehicular Ad Hoc Network Using Roadside Unit" , (Internal Examiner)
  21. (2011) As an external reviewer for MSc Thesis "A Novel Approach To Estimate The Number of Tags In Aloha-Based Anti-Collision Multi Tag Identification Algorithms In RFID System" for Faculty of Information Science And Technology, University Kebangsaan Malaysia, (External Examiner)
  22. (2011) Master thesis on "Performance Analyses of Jumbo Frame Networks" for University of Technology Malaysia. , (External Examiner)
  23. (2010) As an external reviewer of MSc thesis "An Opportunistic Position Based Approach For Stabilizing Connectivity Over VANET" for University of Technology Malaysia. , (External Examiner)
Mentoring
  1. (2024) Penasihat Projek Penyelidikan Pelajar Kursus Ko-Kurikulum Gki 1001, University, (Academic Advisor)

SUPERVISION


Postgraduate Student
PhD/ Doctoral
  1. (2024) Decentralized Failure Recovery Model in Software Defined Data Center Networks, SUHEIB ABDEL KARIM M. AL HIYARI
  2. (2023) A Reliable Time-Based Routing Framework with Seamless Network Operations for Software Defined Networks, NAUMAN KHAN
  3. (2022) SEEMLESS HANDOFF IN NEMO-CENTRIC VEHICULAR AD HOC NETWORK: RESEARCH PROPOSAL, ALSHARARI MOHAMMED SABIH
  4. (2022) A Novel Secure MUD-Based Real Time Intrusion Detection and Prevention Mechanism for IoT Network, NOMAN MAZHAR
  5. (2022) Toward an Interoperable and Scalable IoT-Driven Smart City Solution Using Blockchain, NADA ABDULAZIZ A ALASBALI
  6. (2022) MULTI-OBJECTIVE OPTIMIZATION OF NETWORK BANWIDTH COST IN HYBRID SDN FOR ENTERPRISE NETWORKING, HAIDER FAYEQ TAWFEEQ
  7. (2022) HYBRID METAHEURISTICS FOR QOS-AWARE SERVICE COMPOSITION, HADI NAGHAVIPOUR
  8. (2021) A SLEEP-AWAKE CLUSTER- BASED ROUTING PROTOCOL TO MAXIMIZE WIRELESS SENSOR NETWORK LIFETIME, NURA MODI SHAGARI
  9. (2020) ENHANCING A CLUSTER-BASED TDMA MAC PROTOCOL FOR VEHICLE-TO-VEHICLE COMMUNICATIONS, ABUBAKAR BELLO TAMBAWAL
  10. (2019) NETWORK TRAFFIC ANALYSIS (COMPUTER SCIENCE), SUHEIB ABDEL KARIM M. AL HIYARI
  11. (2019) ENHANCING A CLUSTER-BASED TDMA MAC PROTOCOL FOR VEHICLE-TO-VEHICLE COMMUNICATIONS, ABUBAKAR BELLO TAMBAWAL
  12. (2019) A BLOCKCHAIN-BASED STANDARD FOR IOT SENSING AND AUTHENTICATION, NADA ABDULAZIZ A ALASBALI
  13. (2019) CLOUD COMPUTING (COMPUTER SCIENCE), MOHAMMED ALI ABDULLAH OTHMAN
  14. (2018) MULTI-OBJECTIVE OPTIMIZATION OF NETWORK BANWIDTH COST IN HYBRID SDN FOR ENTERPRISE NETWORKING, HAIDER FAYEQ TAWFEEQ
  15. (2018) CLOUD COMPUTING (COMPUTER SCIENCE), MOHAMMED ALI ABDULLAH OTHMAN
  16. (2018) A HYBRID META- HEURISTIC COMPUTATUINAL INTELLIGENCE METHOD FOR QUALITY AWARE WEB SERVICE COMPOSITION, HADI NAGHAVIPOUR
  17. (2017) NETWORK TRAFFIC ANALYSIS (COMPUTER SCIENCE), SUHEIB ABDEL KARIM M. AL HIYARI
  18. (2017) MULTI-OBJECTIVE OPTIMIZATION OF NETWORK BANWIDTH COST IN HYBRID SDN FOR ENTERPRISE NETWORKING, HAIDER FAYEQ TAWFEEQ
  19. (2017) MULTI-OBJECTIVE FLOW MEASUREMENT IN SOFTWARE-DEFINED NETWORKS (SDN) FOR DATACENTER, HAMID TAHAEI
  20. (2017) A MALWARE RISK ANALYSIS AND DETECTION SYSTEM FOR MOBILE DEVICES USING PERMISSION-BASED FEATURES, MOHD FAIZAL BIN AB RAZAK
  21. (2017) A HYBRID META- HEURISTIC COMPUTATUINAL INTELLIGENCE METHOD FOR QUALITY AWARE WEB SERVICE COMPOSITION, HADI NAGHAVIPOUR
  22. (2017) A CLUSTER-BASED TDMA MULTICHANNEL MAC PROTOCOL FOR VERHICLE-TO-VEHICLE COMMUNICATION, ABUBAKAR BELLO TAMBAWAL
  23. (2016) A Malware Analysis and Detection System for Mobile Devices, ALI FEIZOLLAH
  24. (2015) Old Jawi Manuscript : Digital Recognition, ZAIDI BIN RAZAK
  25. (2015) DETECTION OF MOBILE BOTNET APPLICATIONS USING STRUCTURAL AND BEHAVIORAL PATTERNS, AHMAD KARIM
  26. (2011) Mitigation of Shoulder-Surfing Attack on Picture-Based Passwords Using Falsifying Authentication Methods, POR LIP YEE @ POR KHOON SUN
  27. (2010) WIMaX, Amir Reza Bagheri
  28. (2010) Mobile IPv6, Hero Modares
  29. (2009) Wireless Mesh Network, Ghaith A. Abdul Wahed
  30. (2006) Algorithm Optimization And Low Cost Bit-Serial Architecture Design For Integer-Pixel And Sub-Pixel Motion Estimation In H.264/AVC, Mohammad Reza Hosseiny Fatemi
  31. (2002) Dual-bandwidth data path for 4G mobile Internet, Li Xi Chun
Master
  1. (2024) Adaptive image processing method for crescent moon detection in Malaysia, SYED ALI SYED AHMAD YUNUS
  2. (2023) “SDN-Based Route Optimization for Multi Requirements QoS in Smart Healthcare Systems”, MD MAHAFUZUR RAHMAN
  3. (2021) ENHANCING SYSTEM PERFORMANCE USING PERSISTENT RAM MODULES AS STORAGE CLASS MEMORY, TEBRA A MOUSSA JUMMAH
  4. (2019) NETWORK SECURITY IN SOFTWARE DEFINED NETWORKS, MD MAHAFUZUR RAHMAN
  5. (2019) Memory Management for Improved Cache Hit Ratio, TEBRA A MOUSSA JUMMAH
  6. (2019) The Development of Mobile Application as Engineering Assistive Tools for Children with Spectrum Disorders (ASD), HASNUR ADILLA BINTI LI
  7. (2018) The Development of Mobile Application as Engineering Assistive Tools for Children with Spectrum Disorders (ASD), HASNUR ADILLA BINTI LI
  8. (2018) Optimization of Reseource Allocation for Device-to-Device Communication in LTE Relay Networks, ELYAS MOHAMMADZADEH
  9. (2018) COMPUTER NETWORKS, MD SARZUL ISLAM
  10. (2018) Optimization of Reseource Allocation for Device-to-Device Communication in LTE Relay Networks, ELYAS
  11. (2018) NETWORK SECURITY, AYDIN LAMEI
  12. (2017) NETWORK SECURITY, AYDIN LAMEI
  13. (2017) Memory Management for Improved Cache Hit Ratio, TEBRA A MOUSSA JUMMAH
  14. (2017) Covert Channel in TCP FAST OPEN (TFO), MOHAMED AZRAN BIN AZIZ
  15. (2017) COMPUTER NETWORKS, MD SARZUL ISLAM
  16. (2017) Applying Covert Channel in TCP fast Open (TFO), MOHAMED AZRAN BIN AZIZ
  17. (2017) Enhancing user Authentication for Cloud Web-based Applications, DETAR BEQO
  18. (2016) Real-time Denial of Service Attack Detection and Mitigation on Controller in Software Defined Network, BILAL ISHFAQ
  19. (2016) An Interactive Mobile News Reporting Application, MOHAMMED ALI AHMED AL-SHARAFI
  20. (2016) An HTTP-Based Botnet Detection Using Machine Learning Techniques, HAMED MERATISHIRAZI
  21. (2016) An HTTP-Based Botnet Detection Using Machine Learning Techniques, HAMED MERATISHIRAZI
  22. (2016) An Interactive Mobile News Reporting Application, MOHAMMED ALI AHMED AL-SHARAFI
  23. (2014) Optimal Sensor Placement in Heterogeneous Visual Sensor Network, HADIS ZARDPOUR
  24. (2013) Distributed Mobility Management (DMM) for Inter-domain Handover in MIPv6, AHMAD ABDUL RAHIM MUSLEH MUSLEH
  25. (2013) Anomaly Botnet Detection for Instant Messaging Using Entropy Measurement Technique, MOHSEN SAGHAFI
  26. (2012) Dynamic Vertical Handover Scheme For Wireless Environments, SAYED MOUSA AHMADI OLOUNABADI
  27. (2011) Multihop Decentralized Cluster-Based Routing Protocol for Wireless Sensor Networks, SEPIDEH ZAREEI
  28. (2011) Best Path Cluster-based Routing: An Energy Efficient Algorithm for LEACH, ELHAM BABAEE SALAR ABADI
  29. (2010) A New Model To Improve Bandwidth Consumption and Resource Usage in GPS-Based MIPv6 Network, Amirhossein Moravejosharieh
  30. (2009) Multihop Decentralized Cluster-Based Routing Protocol For Wireless Sensor Network, Sepideh Zareei
  31. (2009) Enhancing Handoff Process Using IAPP With Caching Techniques, Obay H. Sabrie
  32. (2009) botAnalytics: Improving HTTP-Based Botnet Detection by Using Network Behavior Analysis System, Meisam Eslahi
  33. (2009) A New Algorithm For Graphical User Authentication Based On Ratation and Resizing, Arash Habibi Lashkari
  34. (2008) Implementation of Elliptic Curve Cryptography Using Biometric Features To Enhance Security Services, Yasser Salem Mohamed Ali
  35. (2008) A Scalar Multiplication In Elliptic Curve Cryptography With Binary Polynomial Operations In Galois Field, Hero Modares
  36. (2007) Wireless Sensor Network, Elham Babaee Salar
  37. (2007) Throughput Optimization of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), Ahmed Khalaf Hasan
  38. (2007) Securing Mobile Communication Using PKI For Multimedia Messaging Services, Mohamud Ahmed Jimale
  39. (2007) Location Aware System Using Bluetooth Technology, Ganes Raj Muthu Arumugam
  40. (2007) Bootnet, Mohsen Saghafi
  41. (2006) Reducing Layer Two Handoff Latency In WLANs Using Advanced Context Distribution, Laeth A. Al-Rawi
  42. (2006) Location Aware System Using Mobile Statiion in GSM Network, ABDUL MUEED KHALID
  43. (2006) Eliminating Scanning Delay Using Advanced Neighbor Discovery With Caching, Ghaith A. Abdul Wahed
  44. (2005) "PERFORMANCE EVALUATION OF SCIENTIFIC DATASET BY EXTRACTION AND COMPRESSION", LAM WAI LEONG
  45. (2004) Implementation of Secure Medical Record Uisng Smartcard Technology, Jothi Prakash
  46. (2004) Implementation Of A Wifi-Based Location Awareness System For Multi-Storey Building, Tan Kit Huang
  47. (2004) A Scalable Distributed Web Syndication Crawling Software Architecture, Ditesh Kumar
  48. (2003) Performance Evaluation of Scientif Dataset By Extraction And Compression, Lam Wai Leong
  49. (2002) Electronic file security system implementation for enterprise internal use using public key infrastructure, Nathan Balakrishnan
  50. (2001) Role-based access contorol in ERP : sales and distrubution system, Hor Li Peng
  51. (2001) Performance evaluation between Tahoe, Reno and New Reno congestion algorithms, Seow Chen Siong
  52. (2001) Enhanced public key infrastructure (PKI) to solve SHH Man-in the-middle attacks problem, Heliza Jufri

TEACHING


Master
  1. (2023) WQE7001 - Cyber Security
  2. (2022) WQE7001 - Cyber Security
  3. (2016) WXGA6105 - Advanced Network Technology
  4. (2011) WXGA6105 - Advanced Network Technology
  5. (2010) WXGA6105 - Advanced Network Technology
  6. (2010) WXGA6105 - Advanced Network Technology
  7. (2009) WXGA6105 - Advanced Network Technology
  8. (2009) WXGA6105 - Advanced Network Technology
  9. (2008) WXGA6105 - Advanced Network Technology
  10. (2008) WXGA6105 - Advanced Network Technology
Bachelor
  1. (2023) WIC2002 - Network Security
  2. (2023) WIA1005 - Network Technology Foundation
  3. (2022) WIC2002 - Network Security
  4. (2016) WIA1005 - Network Technology Foundation
  5. (2010) WRES3104 - Network Modelling and Simulation
  6. (2009) WRES2108 - Advance Network Technology
  7. (2009) WRES3104 - Network Modelling and Simulation
  8. (2008) WRES2110 - Fundamentals of Network Technology
  9. (2008) WRES3103 - Network Design
  10. (2006) WRES2108 - Advance Network Technology
  11. (2005) WRES2108 - Advance Network Technology
  12. (2005) WXES2106 - Network Technology
  13. (2004) WRES2108 - Advance Network Technology
  14. (2004) WXES2106 - Network Technology
  15. (2003) WRES3101 - Distributed System
  16. (2003) WXES2106 - Network Technology
  17. (2002) WRES1201 - Computer System Architecture
  18. (2002) WRES2101 - Internet & Intranet
  19. (2002) WRES3101 - Distributed System
  20. (2002) WXES2106 - Network Technology
  21. (2001) WRES3101 - Distributed System
  22. (2001) WXES1109 - Computer System & Organization

SOCIAL RESPONSIBILITY ACTIVITIES


  • Penceramah, Karnival Pendidikan Kerjaya, Kolej Matrikulasi Melaka, (29 Nov 2013 - 29 Nov 2013)
  • Corporate Social Responsibility, Penang, 4 October 2012. At Sekolah Kebangsaan Teluk Kumbar, Penang Under Cisco Program., (04 Oct 2012 - 04 Oct 2012)
  • Implementation of Wireless Network Coverage in Sekolah Menengah Agama Kota Kinabalu, (23 Jul 2011 - 24 Jul 2011)

COURSE ATTENDED


Internal / External Course
EXTERNAL COURSE
  1. PALO ALTO NETWORKS ACADEMY FSKTM, Makmal Mikro 1 (Mm1), Fsktm (17 Jul 2017 - 21 Jul 2017)
  2. CCNA CYBERSECURITY OPERATIONS INSTRUCTOR TRAINING, Ibm Icoe Training Room Universiti Malaysia Pahang (Gambang Campus) Lebuhraya Tun Razak, Gambang, Kuantan Pahang, 26300 (18 Mar 2019 - 22 Mar 2019)