Staff Directory

Academic Qualification
- Ph.D in Artificial Intelligence - Doctor of Philosophy, University of Edinburgh
- Master in Computer Science - Masters Degree, Universiti Kebangsaan Malaysia (UKM)
- Bachelor in Computer Science - Bachelor Degree, University of South of Carolina, USA
Normaziah Binti Abdul Aziz (Assoc. Prof. Dr.)
Associate Professor
IIUM Gombak Campus
KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
naa@iium.edu.my
5663
Expert Profile
Normaziah Abdul Aziz obtained her BSc in Computer Science from the University of South Carolina, USA under a Petronas scholarship. Upon returning, she worked at the Central Bank of Malaysia (Bank Negara Malaysia). She continued her studies in MSc in Computer Science at University Kebangsaan Malaysia and later joined MIMOS in 1989. She was then offered the Asia Development Bank (ADB) scholarship representing MIMOS to pursue her Ph.D at the Department of Artificial Intelligence, University of Edinburgh, Scotland. Her research then was in the area of Cognitive Modelling with a thesis entitled "The Use of Belief Revision to Model Contradiction and Entrenched Misconceptions".
During her 18 years at MIMOS, she had worked on RMKe-7, 8 and 9 projects related to Intelligent Learning Environment and Language Technology which included Machine Translation and Speech Processing. She has a patent in the US patent office on "An English-Malay Translation Memory using Phrase Look-up Approach and Word Alignment Information Database" with Patent number WO/2009/002141, December 2008.
She later joined the academic world as an Associate Professor in the Department of Computer Science at the International Islamic University Malaysia (IIUM). Since 2009, she has been the Regional Contest Director for the ACM International Collegiate Programming Contest (ACM-ICPC) by the ICPC Headquarters in Baylor, Texas. She had headed the IIUM team to the ACM ICPC World Finals in Warsaw 2012 as one of the top-100 best university teams qualified.
Presently, her research work is in the area of Information Security, particularly in Digital Evidence Forensics and Secure Coding. She is also passionate about Computational Thinking where she co-organizes the Malaysian Computing Olympiad, Kangaroo Math Competition (Malaysia) and Beaver Informatics Competition (Malaysia) with a few key individuals in these initiatives.
During her 18 years at MIMOS, she had worked on RMKe-7, 8 and 9 projects related to Intelligent Learning Environment and Language Technology which included Machine Translation and Speech Processing. She has a patent in the US patent office on "An English-Malay Translation Memory using Phrase Look-up Approach and Word Alignment Information Database" with Patent number WO/2009/002141, December 2008.
She later joined the academic world as an Associate Professor in the Department of Computer Science at the International Islamic University Malaysia (IIUM). Since 2009, she has been the Regional Contest Director for the ACM International Collegiate Programming Contest (ACM-ICPC) by the ICPC Headquarters in Baylor, Texas. She had headed the IIUM team to the ACM ICPC World Finals in Warsaw 2012 as one of the top-100 best university teams qualified.
Presently, her research work is in the area of Information Security, particularly in Digital Evidence Forensics and Secure Coding. She is also passionate about Computational Thinking where she co-organizes the Malaysian Computing Olympiad, Kangaroo Math Competition (Malaysia) and Beaver Informatics Competition (Malaysia) with a few key individuals in these initiatives.
Area of Specialisation
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Computational Linguistic - Machine Translation, Multilingual and Multimodal Online Resources
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science - Cognitive modelling
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - Digital Forensics, Secure Programming
Research Projects
Completed
2023 - 2023 | Development of Machine Learning Model for Testing and Evaluation of Data Privacy in ICT/IoT Products and Applications Project |
2022 - 2023 | Development of Data Privacy Specification for Developing ICT/IoT Products and Applications |
2022 - 2023 | Guideline on Testing and Evaluation Methodology for Data Privacy in ICT/IoT Products and Applications |
2021 - 2021 | Development of Data Privacy Management Framework for ICT/IoT Products and Applications |
2020 - 2022 | Secure Water Monitoring and Management (SWaM) System |
2020 - 2023 | Smart Door Access System |
2018 - 2022 | A Novel Particle Swarm Optimization with Levy Flight Algorithm for Imputation of Missing Creatinine Value. |
2017 - 2017 | Development of Teaching Modules on the Subject of Computer Science Form 5 for MDeC and MOE |
2017 - 2021 | Secure Maintenance Services Logging System for Automotive Systems |
2015 - 2016 | DIGITAL COMPETENCY STANDARDS (DCS) ANALYTICS & REPORT |
2015 - 2016 | Digital Competency Standards (DCS) Rubrics Refinement and Post Pilot Analysis |
2014 - 2016 | Anti-Malware for Mobilephones |
2011 - 2014 | Formulating Readability Check for Arabic Text and Development of its Online Version |
2010 - 2012 | Ground Penetrating Radar System using OFDM Technology |
2010 - 2012 | RU 2011: Feasibility study on the application of object-oriented FRBR model to MARC-based bibliographic records on Al-Quran |
2010 - 2011 | Preliminary Study for Establishing Children's Screening and Brain Development Understanding using Soft Computing Approach |
2009 - 2011 | Collection and Analysis of Human Brain Signals in Relation to Emotion using BIMEC, a Biometrical Machine and Software |
2009 - 2011 | Design and Implementation of An Algorithm for Collaborative Multi Robots in Autonomous Reconnaissance. |
- 2018 | Privacy and Security in Cloud First Policy Environment (Microsoft Fund) |
On-Going
2023 - Present | An Alternative Model in Detecting Plagiarism in Academic Writing using the Authorship Attribution Concept |
2023 - Present | API and Permissioned Blockchain Based Digital Certificates |
2020 - Present | Face Detection Attendance System |
2019 - Present | Secure Hybrid Agile Software Development Lifecycle Framework for Software Engineering Process |
2019 - Present | Secure framework for digital forensics of vehicle maintenance |
2017 - Present | Kiram-al-Katibin : Green and Secure IoT Project for Managing Resources and Assist Classroom Related Activities |
2016 - Present | Cybersecurity Capability Maturity Model based on Maqasid al Shari?ah (MS-C2M2) |
2010 - Present | Digital Evidence Acquisition and Analysis on Memory-based Devised |
2008 - Present | Intelligent Cyberspace Security |
Award & Recognition
24 Jul, 2019 | Murabbi Award (Sciences & Technology) - IIUM | University |
19 Apr, 2018 | ICPC Foundation for Asia Distinguished Leadership Award - ICPC Foundation, Baylor University, Texas, USA | International |
Publications
Article
Conference or Workshop Item
2023 | Comparative evaluation of anomaly-based controller area network IDS. In: ICSCA 2023: 2023 12th International Conference on Software and Computer Applications, |
2023 | Performance comparison of feature selection methods for prediction in medical data. In: 7th International Conference on Soft Computing in Data Science, SCDS 2023, |
2022 | Analysis of optimizers on AlexNet architecture for face biometric authentication system. In: International Conference on Information Technology Research and Innovation (ICITRI) 2022, |
2022 | Interpretation of machine learning model using medical record visual analytics. In: 8th International Conference on Computational Science and Technology ICCST 2021, |
2022 | Using streaming data algorithm for intrusion detection on the vehicular controller area network. In: 1st International Conference on Ubiquitous Security, UbiSec 2021, |
2021 | Business model shifts: masjid kitchens as soup kitchens, jobs employment and empowering asnaf entrepreneurs, and income generation for the masjid. In: International Conference on Information Technology for the Muslim World (ICT4M 2021), |
2021 | Comparative performance of Convolutional Neural Networks Architecture for face biometric authentication system. In: IEEE 8th International Conference on Computing, Engineering and Design (ICCED), |
2021 | Cooperative behavior (ta’awun) between mosques and civic organizations in empowering asnafpreneurs through IIUM m-kitchen® project. In: 2nd Kedah International Zakat Conference 2021 (KEIZAC 2021), |
2021 | Interpretation of machine learning model using medical record visual analytics. In: The Eighth International Conference on Computational Science and Technology (ICCST2021), |
2020 | NCI evalution: assessment of higher order thinking skills via short free text answer. In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019), |
2019 | Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018), |
2019 | Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA), |
2019 | Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018, |
2018 | Cyber security maturity model and Maqasid al-Shari'ah. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M), |
2018 | Early prediction of acute kidney injury using machine learning algorithms. In: Asia Pacific Advanced Network Meeting (APAN 46), |
2018 | Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018, |
2017 | Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016), |
2016 | Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015, |
2015 | A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2). In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance, |
2015 | Real time astrocyte in spiking neural network. In: 2015 SAI Intelligent Systems Conference (IntelliSys 2015), |
2015 | Simple recurrent network in real time astrocyte. In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA), |
2014 | An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on, |
2014 | Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014), |
2014 | CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), |
2014 | CART-An Arabic teaching-learning tool for non-native Arabic speakers. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T), |
2014 | Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), |
2014 | Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), |
2013 | Corpus-based readability formula for Arabic texts: a prototype. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), |
2013 | Log visualization of intrusion and prevention reverse proxy server against web attacks . In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, |
2012 | Detecting computer generated images for image spam filtering. In: 2012 International Conference on Advanced Computer Science Applications and Technologies, |
2012 | NL scoring and Bloom competency test: an experimental result. In: The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12 ), |
2012 | Risk identification for an information security management system implementation. In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies , |
2012 | Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012), |
2011 | A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance. In: 4th International Conference on Mechatronics (ICOM'11), |
2011 | Secure coding in software development. In: 2011 5th Malaysian Conference in Software Engineering (MySEC), |
2010 | Modelling learners' understanding through node-link analysis and scoring. In: 3rd International Conference on Information and Communication Technology for the Muslim World (ICT4M 2010), |
2010 | Modelling learners’ understanding through Node-link analysis and scoring . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010, |
2010 | NL scoring technique for the assessment of learners' understanding. In: Second International Conference on Computer Research and Development (ICCRD 2010), |
2010 | Understanding emotion: Cognitive science perspective . In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), |
2009 | Assessment of learner's understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development, |
2009 | Assessment of learners’ understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development, |
2008 | An English-Malay translation memory system. In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008), |
2008 | Assessing learner’s understanding via node-link analysis: an information theory approach. In: International Symposium on Information Technology 2008 (ITSim), Vol.1, |
Book
Book Section
2021 | Redesign business model of masjid kitchens as soup kitchens, providing jobs employment and nurturing of asnaf as entrepreneurs, and income generation for the masjid. In: Pusat Islam UTM, ISBN: , pp. 100-111 |
2020 | Securing online quizzes and test on iTa’LeEM. In: Centre for Professional Development (CPD), International Islamic University Malaysia., ISBN: , pp. 179-184 |
2020 | Simple security guidelines for E-Learning at IIUM. In: Centre for Professional Development (CPD), International Islamic University Malaysia., ISBN: , pp. 185-186 |
2015 | The trend of mobile malwares and effective detection techniques . In: IGI-Global, ISBN: 9781466694385, pp. 219-233 |
2015 | The trend of mobile malwares and effective detection techniques . In: IGI-Global, ISBN: 9781466694385, pp. 219-233 |
2012 | Network forensics: detection and mitigation of botnet malicious code via darknet. In: Atlantis Press, ISBN: 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online), pp. 65-78 |
2012 | Network forensics: detection and mitigation of botnet malicious code via darknet. In: Atlantis Press, ISBN: 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online), pp. 65-78 |
2011 | An online badminton motion tracking system. In: IIUM Press, ISBN: 978-967-418-112-3, pp. 149-158 |
2011 | Computerized observation and motion in badminton tracking system. In: IIUM Press, ISBN: 9789674181062, pp. 11-20 |
2011 | Emotion recognition using EEG signals. In: IIUM Press, ISBN: 9789674181116, pp. 37-57 |
2011 | Investigating computer forensic tools and their searching technique. In: IIUM Press, ISBN: 9789674181062, pp. 69-85 |
2011 | Pronouncing dictionary for minority languages of Muslim community. In: IIUM Press, ISBN: 9789674181062, pp. 157-166 |
2011 | Secure coding in cross site scripting. In: IIUM Press, ISBN: 9789674181062, pp. 143-156 |
2011 | Understanding students’ emotion while solving mathematical questions using EEG signals. In: IIUM Press, ISBN: 9789674181116, pp. 94-110 |
2011 | Web and mobile based phrase dictionary. In: IIUM Press, ISBN: 9789674181062, pp. 1-9 |
2011 | Web application - What makes it secure or insecure? . In: IIUM Press, ISBN: 978-967-418-112-3, pp. 263-271 |
Monograph
2020 | Cyber security capability maturity model based on Maqasid A Shari’ah (MS-C2M2). In: , |
2018 | Cyber Security: towards a safe and secure cyber environment. In: Academy of Sciences Malaysia (ASM), |
2012 | Development of communication module for semi-autonomos UAV and robots. In: s.n, |
2012 | Feasibility study on the application of object-oriented frbr model to marc-based bibliographic records on al-quran. In: s.n, |
2012 | Ground penetrating radar system using OFDM technology . In: [s.n], |