Researchers

Researchers

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Normaziah Binti Abdul Aziz
Associate Professor

  • KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
  • IIUM Gombak Campus
  • naa@iium.edu.my

Print CV Email Me

Staff Details

  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Computational Linguistic
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c.
COMPUTER FORENSIC 2011/2012 2012/2013 2013/2014 2014/2015 2016/2017
DATA STRUCTURE & ALGORITHM 2011/2012
DIGITAL EVIDENCE FORENSICS 2017/2018 2018/2019 2019/2020 2020/2021 2021/2022 2022/2023 2023/2024
FINAL YEAR PROJECT 2007/2008 2008/2009 2009/2010 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2016/2017 2017/2018
FINAL YEAR PROJECT I 2017/2018 2019/2020 2020/2021 2021/2022
FINAL YEAR PROJECT II 2019/2020 2020/2021
INDUSTRIAL ATTACHMENT 2008/2009 2009/2010 2010/2011 2011/2012 2013/2014 2014/2015 2016/2017 2017/2018
IT SECURITY I 2012/2013 2013/2014 2014/2015
PRINCIPLES OF ARTIFICIAL INTELLIGENCE 2007/2008 2008/2009 2009/2010 2010/2011 2011/2012 2012/2013
PRINCIPLES OF IT SECURITY 2016/2017 2017/2018 2018/2019 2019/2020 2020/2021 2021/2022 2022/2023 2023/2024
Completed
2021 - 2021 Development of Data Privacy Management Framework for ICT/IoT Products and Applications
2017 - 2017 Development of Teaching Modules on the Subject of Computer Science Form 5 for MDeC and MOE
2017 - 2021 Secure Maintenance Services Logging System for Automotive Systems
2017 - 2021 Secure Maintenance Services Logging System for Automotive Systems
2017 - 2017 Development of Teaching Modules on the Subject of Computer Science Form 5 for MDeC and MOE
2015 - 2016 DIGITAL COMPETENCY STANDARDS (DCS) ANALYTICS & REPORT
2015 - 2016 Digital Competency Standards (DCS) Rubrics Refinement and Post Pilot Analysis
2015 - 2016 DIGITAL COMPETENCY STANDARDS (DCS) ANALYTICS & REPORT
2015 - 2016 Digital Competency Standards (DCS) Rubrics Refinement and Post Pilot Analysis
2014 - 2016 Anti-Malware for Mobilephones
2014 - 2016 Anti-Malware for Mobilephones
2011 - 2014 Formulating Readability Check for Arabic Text and Development of its Online Version
2011 - 2014 Formulating Readability Check for Arabic Text and Development of its Online Version
2010 - 2011 Preliminary Study for Establishing Children's Screening and Brain Development Understanding using Soft Computing Approach
2010 - 2012 RU 2011: Feasibility study on the application of object-oriented FRBR model to MARC-based bibliographic records on Al-Quran
2010 - 2012 Ground Penetrating Radar System using OFDM Technology
2010 - 2012 RU 2011: Feasibility study on the application of object-oriented FRBR model to MARC-based bibliographic records on Al-Quran
2010 - 2011 Preliminary Study for Establishing Children's Screening and Brain Development Understanding using Soft Computing Approach
2010 - 2012 Ground Penetrating Radar System using OFDM Technology
2009 - 2011 Design and Implementation of An Algorithm for Collaborative Multi Robots in Autonomous Reconnaissance.
2009 - 2011 Collection and Analysis of Human Brain Signals in Relation to Emotion using BIMEC, a Biometrical Machine and Software
2009 - 2011 Collection and Analysis of Human Brain Signals in Relation to Emotion using BIMEC, a Biometrical Machine and Software
2009 - 2011 Design and Implementation of An Algorithm for Collaborative Multi Robots in Autonomous Reconnaissance.
Unknown - 2018 Privacy and Security in Cloud First Policy Environment (Microsoft Fund)
Unknown - 2018 Privacy and Security in Cloud First Policy Environment (Microsoft Fund)
In Progress
2021 - Present Development of Data Privacy Management Framework for ICT/IoT Products and Applications
2020 - Present Smart Door Access System
2020 - Present Smart Door Access System
2020 - Present Secure Water Monitoring and Management (SWaM) System
2020 - Present Face Detection Attendance System
2020 - Present Secure Water Monitoring and Management (SWaM) System
2019 - Present Secure Hybrid Agile Software Development Lifecycle Framework for Software Engineering Process
2019 - Present Secure Hybrid Agile Software Development Lifecycle Framework for Software Engineering Process
2019 - Present Secure framework for digital forensics of vehicle maintenance
2019 - Present Secure framework for digital forensics of vehicle maintenance
2018 - Present A Novel Particle Swarm Optimization with Levy Flight Algorithm for Imputation of Missing Creatinine Value.
2018 - Present A Novel Particle Swarm Optimization with Levy Flight Algorithm for Imputation of Missing Creatinine Value.
2017 - Present Kiram-al-Katibin : Green and Secure IoT Project for Managing Resources and Assist Classroom Related Activities
2017 - Present Kiram-al-Katibin : Green and Secure IoT Project for Managing Resources and Assist Classroom Related Activities
2008 - Present Intelligent Cyberspace Security
2008 - Present Intelligent Cyberspace Security
Article
2021 Freemium multi-sided platform business model: mosque kitchen as a source of free food, employment and empowerment of B40s food-preneurs. Journal of Information Systems and Digital Technologies , 3 (2) pp.1-10
2021 A particle swarm optimization levy flight algorithm for imputation of missing creatinine dataset. International Journal of Advances in Intelligent Informatics , 7 (2) pp.225-236
2020 Evaluation of the Effectiveness of Movement Control Order to Limit the Spread of COVID-19. Annals of Emerging Technologies in Computing (AETiC) , 4 (4) pp.1-9
2020 Two suggested probabilistic and kinetic models for astrocytic network in spiking neural networks. International Journal of Advanced Trends in Computer Science and Engineering , 9 (5) pp.7951-7957
2019 Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering , 8 (5) pp.2408-2413
2019 Improved Malware detection model with Apriori Association rule and particle swarm optimization. Security and Communication Networks , 2019 pp.1-13
2018 A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering , 10 (2-5) pp.109-113
2016 Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology , 4 (1) pp.19-27
2015 Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security , 10 pp.152-163
2015 A new efficient text detection method for image spam filtering . International Review on Computers and Software , 10 (1) pp.1-8
2014 An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters , 20 (1) pp.139-143
2013 A Corpus-Based Readability Formula for Estimate of Arabic Texts Reading Difficulty. World Applied Sciences Journal , 21 pp.168-173
2013 CRF based feature extraction applied for supervised automatic text summarization . Procedia Technology , 11 pp.426-436
2011 Part-of-speech in a node-link scoring techniques for assessing learners' understanding. Procedia Social and Behavioral Sciences , 27 pp.131-139
2011 Multilingual online resources for minority languages of a campus community. Procedia Social and Behavioral Sciences , 27 pp.291-298

Conference or Workshop Item

2021 Interpretation of machine learning model using medical record visual analytics. In: The Eighth International Conference on Computational Science and Technology (ICCST2021)
2021 Business model shifts: masjid kitchens as soup kitchens, jobs employment and empowering asnaf entrepreneurs, and income generation for the masjid. In: International Conference on Information Technology for the Muslim World (ICT4M 2021)
2021 Cooperative behavior (ta’awun) between mosques and civic organizations in empowering asnafpreneurs through IIUM m-kitchen® project. In: 2nd Kedah International Zakat Conference 2021 (KEIZAC 2021)
2020 NCI evalution: assessment of higher order thinking skills via short free text answer. In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019)
2019 Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018
2019 Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA)
2019 Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018)
2018 Early prediction of acute kidney injury using machine learning algorithms. In: Asia Pacific Advanced Network Meeting (APAN 46)
2018 Cyber security maturity model and Maqasid al-Shari'ah. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2018 Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018
2017 Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016)
2016 Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015
2015 A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2). In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance
2015 Simple recurrent network in real time astrocyte. In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA)
2015 Real time astrocyte in spiking neural network. In: 2015 SAI Intelligent Systems Conference (IntelliSys 2015)
2014 Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T)
2014 CART-An Arabic teaching-learning tool for non-native Arabic speakers. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014)
2014 Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014)
2014 Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2014 An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on
2014 CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2014 Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2013 Log visualization of intrusion and prevention reverse proxy server against web attacks . In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
2013 Corpus-based readability formula for Arabic texts: a prototype. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2012 NL scoring and Bloom competency test: an experimental result. In: The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12 )
2012 Detecting computer generated images for image spam filtering. In: 2012 International Conference on Advanced Computer Science Applications and Technologies
2012 Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012)
2012 Risk identification for an information security management system implementation. In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies
2011 A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance. In: 4th International Conference on Mechatronics (ICOM'11)
2011 Secure coding in software development. In: 2011 5th Malaysian Conference in Software Engineering (MySEC)
2010 Understanding emotion: Cognitive science perspective . In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010)
2010 Modelling learners’ understanding through Node-link analysis and scoring . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010
2010 Modelling learners' understanding through node-link analysis and scoring. In: 3rd International Conference on Information and Communication Technology for the Muslim World (ICT4M 2010)
2010 NL scoring technique for the assessment of learners' understanding. In: Second International Conference on Computer Research and Development (ICCRD 2010)
2009 Assessment of learner's understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development
2009 Assessment of learners’ understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development
2008 Assessing learner’s understanding via node-link analysis: an information theory approach. In: International Symposium on Information Technology 2008 (ITSim), Vol.1
2008 An English-Malay translation memory system. In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008)

Book

2021 Budi Mkitchen for flood victims. mKitchen . ISBN 978-967-26569-1-3
2021 Inaugural edu-action journey with cooperative behavior (Ta’awun) of mKitchen® students in free food for the needy. Meso Publishing . ISBN 978-967-19814-4-3
2021 Mkitchen® UIAM Penggerak Asnaf Sejahtera Lestari. Meso Publishing . ISBN 978-967-19814-2-9
2021 A Journey of Ta’awun (Cooperative Behaviour) in Edu-Action at IIUM Mkitchen® and Masjid al-Syakirin Gombak (MASG). Meso Publishing . ISBN 9789671981412
2021 Budiman Mahallah kitchen. mKitchen . ISBN 9789672656906

Book Section

2021 Redesign business model of masjid kitchens as soup kitchens, providing jobs employment and nurturing of asnaf as entrepreneurs, and income generation for the masjid. In: Prosiding Seminar Antarabangsa Inovasi Masjid Ketika Pandemik Pusat Islam UTM , pp.100-111
2020 Securing online quizzes and test on iTa’LeEM. In: IIUM emergency remote teaching and learning Centre for Professional Development (CPD), International Islamic University Malaysia. , pp.179-184
2020 Simple security guidelines for E-Learning at IIUM. In: IIUM emergency remote teaching and learning Centre for Professional Development (CPD), International Islamic University Malaysia. , pp.185-186
2015 The trend of mobile malwares and effective detection techniques . In: Critical Socio-Technical Issues Surrounding Mobile Computing IGI-Global . ISBN 9781466694385 , pp.219-233
2015 The trend of mobile malwares and effective detection techniques . In: Critical Socio-Technical Issues Surrounding Mobile Computing IGI-Global . ISBN 9781466694385 , pp.219-233
2012 Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing Atlantis Press . ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) , pp.65-78
2012 Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing Atlantis Press . ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) , pp.65-78
2011 An online badminton motion tracking system. In: The Web: Its Utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.149-158
2011 Web application - What makes it secure or insecure? . In: The Web : Its Utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.263-271
2011 Web and mobile based phrase dictionary. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.1-9
2011 Computerized observation and motion in badminton tracking system. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.11-20
2011 Investigating computer forensic tools and their searching technique. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.69-85
2011 Secure coding in cross site scripting. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.143-156
2011 Pronouncing dictionary for minority languages of Muslim community. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.157-166
2011 Emotion recognition using EEG signals. In: Understanding brain developmental disorder based on EEG in soft computing approach IIUM Press . ISBN 9789674181116 , pp.37-57
2011 Understanding students’ emotion while solving mathematical questions using EEG signals. In: Understanding brain developmental disorder based on EEG in soft computing approach IIUM Press . ISBN 9789674181116 , pp.94-110