Staff Directory


Normaziah Binti Abdul Aziz

Academic Qualification

  • Ph.D in Artificial Intelligence - Doctor of Philosophy, University of Edinburgh
  • Master in Computer Science - Masters Degree, Universiti Kebangsaan Malaysia (UKM)
  • Bachelor in Computer Science - Bachelor Degree, University of South of Carolina, USA

Normaziah Binti Abdul Aziz (Assoc. Prof. Dr.)

Associate Professor
IIUM Gombak Campus

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Other's position:

Head, Kulliyyah of Information and Communication Technology


naa@iium.edu.my
5663


Expert Profile


Normaziah Abdul Aziz obtained her BSc in Computer Science from the University of South Carolina, USA under a Petronas scholarship. Upon returning, she worked at the Central Bank of Malaysia (Bank Negara Malaysia). She continued her studies in MSc in Computer Science at University Kebangsaan Malaysia and later joined MIMOS in 1989. She was then offered the Asia Development Bank (ADB) scholarship representing MIMOS to pursue her Ph.D at the Department of Artificial Intelligence, University of Edinburgh, Scotland. Her research then was in the area of Cognitive Modelling with a thesis entitled "The Use of Belief Revision to Model Contradiction and Entrenched Misconceptions".
During her 18 years at MIMOS, she had worked on RMKe-7, 8 and 9 projects related to Intelligent Learning Environment and Language Technology which included Machine Translation and Speech Processing. She has a patent in the US patent office on "An English-Malay Translation Memory using Phrase Look-up Approach and Word Alignment Information Database" with Patent number WO/2009/002141, December 2008.
She later joined the academic world as an Associate Professor in the Department of Computer Science at the International Islamic University Malaysia (IIUM). Since 2009, she has been the Regional Contest Director for the ACM International Collegiate Programming Contest (ACM-ICPC) by the ICPC Headquarters in Baylor, Texas. She had headed the IIUM team to the ACM ICPC World Finals in Warsaw 2012 as one of the top-100 best university teams qualified.
Presently, her research work is in the area of Information Security, particularly in Digital Evidence Forensics and Secure Coding. She is also passionate about Computational Thinking where she co-organizes the Malaysian Computing Olympiad, Kangaroo Math Competition (Malaysia) and Beaver Informatics Competition (Malaysia) with a few key individuals in these initiatives.


Area of Specialisation


  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - Digital Forensics, Secure Programming
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Computational Linguistic - Machine Translation, Multilingual and Multimodal Online Resources
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science - Cognitive modelling


Teaching Responsibilities


COMPUTER FORENSIC 2016/2017 2014/2015 2013/2014 2012/2013 2011/2012
DATA STRUCTURE & ALGORITHM 2011/2012
DIGITAL EVIDENCE FORENSICS 2019/2020 2017/2018 2020/2021 2018/2019 2021/2022
FINAL YEAR PROJECT 2011/2012 2010/2011 2008/2009 2009/2010 2007/2008 2013/2014 2016/2017 2014/2015 2012/2013 2017/2018
FINAL YEAR PROJECT I 2019/2020 2020/2021 2017/2018
FINAL YEAR PROJECT II 2020/2021 2019/2020
INDUSTRIAL ATTACHMENT 2016/2017 2008/2009 2010/2011 2009/2010 2017/2018 2011/2012 2013/2014 2014/2015
IT SECURITY I 2014/2015 2013/2014 2012/2013
PRINCIPLES OF ARTIFICIAL INTELLIGENCE 2007/2008 2009/2010 2010/2011 2008/2009 2012/2013 2011/2012
PRINCIPLES OF IT SECURITY 2017/2018 2016/2017 2018/2019 2020/2021 2021/2022 2019/2020


Research Projects


Completed
2017 - 2017 Development of Teaching Modules on the Subject of Computer Science Form 5 for MDeC and MOE
2015 - 2016 Digital Competency Standards (DCS) Rubrics Refinement and Post Pilot Analysis
2015 - 2016 DIGITAL COMPETENCY STANDARDS (DCS) ANALYTICS & REPORT
2014 - 2016 Anti-Malware for Mobilephones
2011 - 2014 Formulating Readability Check for Arabic Text and Development of its Online Version
2010 - 2012 Ground Penetrating Radar System using OFDM Technology
2010 - 2011 Preliminary Study for Establishing Children's Screening and Brain Development Understanding using Soft Computing Approach
2010 - 2012 RU 2011: Feasibility study on the application of object-oriented FRBR model to MARC-based bibliographic records on Al-Quran
2009 - 2011 Collection and Analysis of Human Brain Signals in Relation to Emotion using BIMEC, a Biometrical Machine and Software
2009 - 2011 Design and Implementation of An Algorithm for Collaborative Multi Robots in Autonomous Reconnaissance.
- 2018 Privacy and Security in Cloud First Policy Environment (Microsoft Fund)
On-Going
2020 - Present Secure Water Monitoring and Management (SWaM) System
2020 - Present Smart Door Access System
2020 - Present Face Detection Attendance System
2019 - Present Secure Hybrid Agile Software Development Lifecycle Framework for Software Engineering Process
2019 - Present Secure framework for digital forensics of vehicle maintenance
2018 - Present A Novel Particle Swarm Optimization with Levy Flight Algorithm for Imputation of Missing Creatinine Value.
2017 - Present Kiram-al-Katibin : Green and Secure IoT Project for Managing Resources and Assist Classroom Related Activities
2017 - Present Secure Maintenance Services Logging System for Automotive Systems
2016 - Present Cybersecurity Capability Maturity Model based on Maqasid al Shari?ah (MS-C2M2)
2010 - Present Digital Evidence Acquisition and Analysis on Memory-based Devised
2008 - Present Intelligent Cyberspace Security


Award & Recognition


24 Jul, 2019 Murabbi Award (Sciences & Technology) - IIUM University
19 Apr, 2018 ICPC Foundation for Asia Distinguished Leadership Award - ICPC Foundation, Baylor University, Texas, USA International


Publications


Article

2020 Evaluation of the Effectiveness of Movement Control Order to Limit the Spread of COVID-19. Annals of Emerging Technologies in Computing (AETiC), 4 (4) pp. 1-9
2020 Two suggested probabilistic and kinetic models for astrocytic network in spiking neural networks. International Journal of Advanced Trends in Computer Science and Engineering, 9 (5) pp. 7951-7957
2019 Improved Malware detection model with Apriori Association rule and particle swarm optimization. Security and Communication Networks, 2019 () pp. 1-13
2019 Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering, 8 (5) pp. 2408-2413
2018 A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering, 10 (2-5) pp. 109-113
2016 Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology, 4 (1) pp. 19-27
2015 A new efficient text detection method for image spam filtering . International Review on Computers and Software, 10 (1) pp. 1-8
2015 Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security, 10 () pp. 152-163
2014 An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters, 20 (1) pp. 139-143
2013 A Corpus-Based Readability Formula for Estimate of Arabic Texts Reading Difficulty. World Applied Sciences Journal , 21 () pp. 168-173
2013 CRF based feature extraction applied for supervised automatic text summarization . Procedia Technology , 11 () pp. 426-436
2011 Multilingual online resources for minority languages of a campus community. Procedia Social and Behavioral Sciences, 27 () pp. 291-298
2011 Part-of-speech in a node-link scoring techniques for assessing learners' understanding. Procedia Social and Behavioral Sciences, 27 () pp. 131-139
Conference or Workshop Item

2020 NCI evalution: assessment of higher order thinking skills via short free text answer. In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019),
2019 Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018),
2019 Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA),
2019 Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018,
2018 Cyber security maturity model and Maqasid al-Shari'ah. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2018 Early prediction of acute kidney injury using machine learning algorithms. In: Asia Pacific Advanced Network Meeting (APAN 46),
2018 Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018,
2017 Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016),
2016 Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015,
2015 A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2). In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance,
2015 Real time astrocyte in spiking neural network. In: 2015 SAI Intelligent Systems Conference (IntelliSys 2015),
2015 Simple recurrent network in real time astrocyte. In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA),
2014 An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on,
2014 Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014),
2014 CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014 CART-An Arabic teaching-learning tool for non-native Arabic speakers. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014),
2014 Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T),
2014 Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014 Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2013 Corpus-based readability formula for Arabic texts: a prototype. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
2013 Log visualization of intrusion and prevention reverse proxy server against web attacks . In: International Conference on Informatics and Creative Multimedia (ICICM), 2013,
2012 Detecting computer generated images for image spam filtering. In: 2012 International Conference on Advanced Computer Science Applications and Technologies,
2012 NL scoring and Bloom competency test: an experimental result. In: The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12 ),
2012 Risk identification for an information security management system implementation. In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies ,
2012 Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012),
2011 A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance. In: 4th International Conference on Mechatronics (ICOM'11),
2011 Secure coding in software development. In: 2011 5th Malaysian Conference in Software Engineering (MySEC),
2010 Modelling learners' understanding through node-link analysis and scoring. In: 3rd International Conference on Information and Communication Technology for the Muslim World (ICT4M 2010),
2010 Modelling learners’ understanding through Node-link analysis and scoring . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010,
2010 NL scoring technique for the assessment of learners' understanding. In: Second International Conference on Computer Research and Development (ICCRD 2010),
2010 Understanding emotion: Cognitive science perspective . In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010),
2009 Assessment of learner's understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development,
2009 Assessment of learners’ understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development,
2008 An English-Malay translation memory system. In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008),
2008 Assessing learner’s understanding via node-link analysis: an information theory approach. In: International Symposium on Information Technology 2008 (ITSim), Vol.1,
Book Section

2020 Securing online quizzes and test on iTa’LeEM. In: Centre for Professional Development (CPD), International Islamic University Malaysia., ISBN: , pp. 179-184
2020 Simple security guidelines for E-Learning at IIUM. In: Centre for Professional Development (CPD), International Islamic University Malaysia., ISBN: , pp. 185-186
2015 The trend of mobile malwares and effective detection techniques . In: IGI-Global, ISBN: 9781466694385, pp. 219-233
2015 The trend of mobile malwares and effective detection techniques . In: IGI-Global, ISBN: 9781466694385, pp. 219-233
2012 Network forensics: detection and mitigation of botnet malicious code via darknet. In: Atlantis Press, ISBN: 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online), pp. 65-78
2012 Network forensics: detection and mitigation of botnet malicious code via darknet. In: Atlantis Press, ISBN: 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online), pp. 65-78
2011 An online badminton motion tracking system. In: IIUM Press, ISBN: 978-967-418-112-3, pp. 149-158
2011 Computerized observation and motion in badminton tracking system. In: IIUM Press, ISBN: 9789674181062, pp. 11-20
2011 Emotion recognition using EEG signals. In: IIUM Press, ISBN: 9789674181116, pp. 37-57
2011 Investigating computer forensic tools and their searching technique. In: IIUM Press, ISBN: 9789674181062, pp. 69-85
2011 Pronouncing dictionary for minority languages of Muslim community. In: IIUM Press, ISBN: 9789674181062, pp. 157-166
2011 Secure coding in cross site scripting. In: IIUM Press, ISBN: 9789674181062, pp. 143-156
2011 Understanding students’ emotion while solving mathematical questions using EEG signals. In: IIUM Press, ISBN: 9789674181116, pp. 94-110
2011 Web and mobile based phrase dictionary. In: IIUM Press, ISBN: 9789674181062, pp. 1-9
2011 Web application - What makes it secure or insecure? . In: IIUM Press, ISBN: 978-967-418-112-3, pp. 263-271