Researchers
Staff Details
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Computational Linguistic
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c.
COMPUTER FORENSIC | 2011/2012 2012/2013 2013/2014 2014/2015 2016/2017 |
DATA STRUCTURE & ALGORITHM | 2011/2012 |
DIGITAL EVIDENCE FORENSICS | 2017/2018 2018/2019 2019/2020 2020/2021 2021/2022 2022/2023 2023/2024 |
FINAL YEAR PROJECT | 2007/2008 2008/2009 2009/2010 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2016/2017 2017/2018 |
FINAL YEAR PROJECT I | 2017/2018 2019/2020 2020/2021 2021/2022 |
FINAL YEAR PROJECT II | 2019/2020 2020/2021 |
INDUSTRIAL ATTACHMENT | 2008/2009 2009/2010 2010/2011 2011/2012 2013/2014 2014/2015 2016/2017 2017/2018 |
IT SECURITY I | 2012/2013 2013/2014 2014/2015 |
PRINCIPLES OF ARTIFICIAL INTELLIGENCE | 2007/2008 2008/2009 2009/2010 2010/2011 2011/2012 2012/2013 |
PRINCIPLES OF IT SECURITY | 2016/2017 2017/2018 2018/2019 2019/2020 2020/2021 2021/2022 2022/2023 2023/2024 |
Completed |
|
---|---|
2021 - 2021 | Development of Data Privacy Management Framework for ICT/IoT Products and Applications |
2017 - 2017 | Development of Teaching Modules on the Subject of Computer Science Form 5 for MDeC and MOE |
2017 - 2021 | Secure Maintenance Services Logging System for Automotive Systems |
2017 - 2021 | Secure Maintenance Services Logging System for Automotive Systems |
2017 - 2017 | Development of Teaching Modules on the Subject of Computer Science Form 5 for MDeC and MOE |
2015 - 2016 | DIGITAL COMPETENCY STANDARDS (DCS) ANALYTICS & REPORT |
2015 - 2016 | Digital Competency Standards (DCS) Rubrics Refinement and Post Pilot Analysis |
2015 - 2016 | DIGITAL COMPETENCY STANDARDS (DCS) ANALYTICS & REPORT |
2015 - 2016 | Digital Competency Standards (DCS) Rubrics Refinement and Post Pilot Analysis |
2014 - 2016 | Anti-Malware for Mobilephones |
2014 - 2016 | Anti-Malware for Mobilephones |
2011 - 2014 | Formulating Readability Check for Arabic Text and Development of its Online Version |
2011 - 2014 | Formulating Readability Check for Arabic Text and Development of its Online Version |
2010 - 2011 | Preliminary Study for Establishing Children's Screening and Brain Development Understanding using Soft Computing Approach |
2010 - 2012 | RU 2011: Feasibility study on the application of object-oriented FRBR model to MARC-based bibliographic records on Al-Quran |
2010 - 2012 | Ground Penetrating Radar System using OFDM Technology |
2010 - 2012 | RU 2011: Feasibility study on the application of object-oriented FRBR model to MARC-based bibliographic records on Al-Quran |
2010 - 2011 | Preliminary Study for Establishing Children's Screening and Brain Development Understanding using Soft Computing Approach |
2010 - 2012 | Ground Penetrating Radar System using OFDM Technology |
2009 - 2011 | Design and Implementation of An Algorithm for Collaborative Multi Robots in Autonomous Reconnaissance. |
2009 - 2011 | Collection and Analysis of Human Brain Signals in Relation to Emotion using BIMEC, a Biometrical Machine and Software |
2009 - 2011 | Collection and Analysis of Human Brain Signals in Relation to Emotion using BIMEC, a Biometrical Machine and Software |
2009 - 2011 | Design and Implementation of An Algorithm for Collaborative Multi Robots in Autonomous Reconnaissance. |
Unknown - 2018 | Privacy and Security in Cloud First Policy Environment (Microsoft Fund) |
Unknown - 2018 | Privacy and Security in Cloud First Policy Environment (Microsoft Fund) |
In Progress |
|
2021 - Present | Development of Data Privacy Management Framework for ICT/IoT Products and Applications |
2020 - Present | Smart Door Access System |
2020 - Present | Smart Door Access System |
2020 - Present | Secure Water Monitoring and Management (SWaM) System |
2020 - Present | Face Detection Attendance System |
2020 - Present | Secure Water Monitoring and Management (SWaM) System |
2019 - Present | Secure Hybrid Agile Software Development Lifecycle Framework for Software Engineering Process |
2019 - Present | Secure Hybrid Agile Software Development Lifecycle Framework for Software Engineering Process |
2019 - Present | Secure framework for digital forensics of vehicle maintenance |
2019 - Present | Secure framework for digital forensics of vehicle maintenance |
2018 - Present | A Novel Particle Swarm Optimization with Levy Flight Algorithm for Imputation of Missing Creatinine Value. |
2018 - Present | A Novel Particle Swarm Optimization with Levy Flight Algorithm for Imputation of Missing Creatinine Value. |
2017 - Present | Kiram-al-Katibin : Green and Secure IoT Project for Managing Resources and Assist Classroom Related Activities |
2017 - Present | Kiram-al-Katibin : Green and Secure IoT Project for Managing Resources and Assist Classroom Related Activities |
2008 - Present | Intelligent Cyberspace Security |
2008 - Present | Intelligent Cyberspace Security |
Article |
|
---|---|
2021 | Freemium multi-sided platform business model: mosque kitchen as a source of free food, employment and empowerment of B40s food-preneurs. Journal of Information Systems and Digital Technologies , 3 (2) pp.1-10 |
2021 | A particle swarm optimization levy flight algorithm for imputation of missing creatinine dataset. International Journal of Advances in Intelligent Informatics , 7 (2) pp.225-236 |
2020 | Evaluation of the Effectiveness of Movement Control Order to Limit the Spread of COVID-19. Annals of Emerging Technologies in Computing (AETiC) , 4 (4) pp.1-9 |
2020 | Two suggested probabilistic and kinetic models for astrocytic network in spiking neural networks. International Journal of Advanced Trends in Computer Science and Engineering , 9 (5) pp.7951-7957 |
2019 | Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering , 8 (5) pp.2408-2413 |
2019 | Improved Malware detection model with Apriori Association rule and particle swarm optimization. Security and Communication Networks , 2019 pp.1-13 |
2018 | A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering , 10 (2-5) pp.109-113 |
2016 | Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology , 4 (1) pp.19-27 |
2015 | Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security , 10 pp.152-163 |
2015 | A new efficient text detection method for image spam filtering . International Review on Computers and Software , 10 (1) pp.1-8 |
2014 | An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters , 20 (1) pp.139-143 |
2013 | A Corpus-Based Readability Formula for Estimate of Arabic Texts Reading Difficulty. World Applied Sciences Journal , 21 pp.168-173 |
2013 | CRF based feature extraction applied for supervised automatic text summarization . Procedia Technology , 11 pp.426-436 |
2011 | Part-of-speech in a node-link scoring techniques for assessing learners' understanding. Procedia Social and Behavioral Sciences , 27 pp.131-139 |
2011 | Multilingual online resources for minority languages of a campus community. Procedia Social and Behavioral Sciences , 27 pp.291-298 |
Conference or Workshop Item |
|
2021 | Interpretation of machine learning model using medical record visual analytics. In: The Eighth International Conference on Computational Science and Technology (ICCST2021) |
2021 | Business model shifts: masjid kitchens as soup kitchens, jobs employment and empowering asnaf entrepreneurs, and income generation for the masjid. In: International Conference on Information Technology for the Muslim World (ICT4M 2021) |
2021 | Cooperative behavior (ta’awun) between mosques and civic organizations in empowering asnafpreneurs through IIUM m-kitchen® project. In: 2nd Kedah International Zakat Conference 2021 (KEIZAC 2021) |
2020 | NCI evalution: assessment of higher order thinking skills via short free text answer. In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019) |
2019 | Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018 |
2019 | Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA) |
2019 | Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018) |
2018 | Early prediction of acute kidney injury using machine learning algorithms. In: Asia Pacific Advanced Network Meeting (APAN 46) |
2018 | Cyber security maturity model and Maqasid al-Shari'ah. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M) |
2018 | Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018 |
2017 | Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016) |
2016 | Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015 |
2015 | A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2). In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance |
2015 | Simple recurrent network in real time astrocyte. In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA) |
2015 | Real time astrocyte in spiking neural network. In: 2015 SAI Intelligent Systems Conference (IntelliSys 2015) |
2014 | Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T) |
2014 | CART-An Arabic teaching-learning tool for non-native Arabic speakers. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014) |
2014 | Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014) |
2014 | Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M) |
2014 | An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on |
2014 | CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M) |
2014 | Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M) |
2013 | Log visualization of intrusion and prevention reverse proxy server against web attacks . In: International Conference on Informatics and Creative Multimedia (ICICM), 2013 |
2013 | Corpus-based readability formula for Arabic texts: a prototype. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M) |
2012 | NL scoring and Bloom competency test: an experimental result. In: The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12 ) |
2012 | Detecting computer generated images for image spam filtering. In: 2012 International Conference on Advanced Computer Science Applications and Technologies |
2012 | Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012) |
2012 | Risk identification for an information security management system implementation. In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies |
2011 | A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance. In: 4th International Conference on Mechatronics (ICOM'11) |
2011 | Secure coding in software development. In: 2011 5th Malaysian Conference in Software Engineering (MySEC) |
2010 | Understanding emotion: Cognitive science perspective . In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010) |
2010 | Modelling learners’ understanding through Node-link analysis and scoring . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010 |
2010 | Modelling learners' understanding through node-link analysis and scoring. In: 3rd International Conference on Information and Communication Technology for the Muslim World (ICT4M 2010) |
2010 | NL scoring technique for the assessment of learners' understanding. In: Second International Conference on Computer Research and Development (ICCRD 2010) |
2009 | Assessment of learner's understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development |
2009 | Assessment of learners’ understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development |
2008 | Assessing learner’s understanding via node-link analysis: an information theory approach. In: International Symposium on Information Technology 2008 (ITSim), Vol.1 |
2008 | An English-Malay translation memory system. In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008) |
Book |
|
2021 | Budi Mkitchen for flood victims. mKitchen . ISBN 978-967-26569-1-3 |
2021 | Inaugural edu-action journey with cooperative behavior (Ta’awun) of mKitchen® students in free food for the needy. Meso Publishing . ISBN 978-967-19814-4-3 |
2021 | Mkitchen® UIAM Penggerak Asnaf Sejahtera Lestari. Meso Publishing . ISBN 978-967-19814-2-9 |
2021 | A Journey of Ta’awun (Cooperative Behaviour) in Edu-Action at IIUM Mkitchen® and Masjid al-Syakirin Gombak (MASG). Meso Publishing . ISBN 9789671981412 |
2021 | Budiman Mahallah kitchen. mKitchen . ISBN 9789672656906 |
Book Section |
|
2021 | Redesign business model of masjid kitchens as soup kitchens, providing jobs employment and nurturing of asnaf as entrepreneurs, and income generation for the masjid. In: Prosiding Seminar Antarabangsa Inovasi Masjid Ketika Pandemik Pusat Islam UTM , pp.100-111 |
2020 | Securing online quizzes and test on iTa’LeEM. In: IIUM emergency remote teaching and learning Centre for Professional Development (CPD), International Islamic University Malaysia. , pp.179-184 |
2020 | Simple security guidelines for E-Learning at IIUM. In: IIUM emergency remote teaching and learning Centre for Professional Development (CPD), International Islamic University Malaysia. , pp.185-186 |
2015 | The trend of mobile malwares and effective detection techniques . In: Critical Socio-Technical Issues Surrounding Mobile Computing IGI-Global . ISBN 9781466694385 , pp.219-233 |
2015 | The trend of mobile malwares and effective detection techniques . In: Critical Socio-Technical Issues Surrounding Mobile Computing IGI-Global . ISBN 9781466694385 , pp.219-233 |
2012 | Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing Atlantis Press . ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) , pp.65-78 |
2012 | Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing Atlantis Press . ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) , pp.65-78 |
2011 | An online badminton motion tracking system. In: The Web: Its Utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.149-158 |
2011 | Web application - What makes it secure or insecure? . In: The Web : Its Utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.263-271 |
2011 | Web and mobile based phrase dictionary. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.1-9 |
2011 | Computerized observation and motion in badminton tracking system. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.11-20 |
2011 | Investigating computer forensic tools and their searching technique. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.69-85 |
2011 | Secure coding in cross site scripting. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.143-156 |
2011 | Pronouncing dictionary for minority languages of Muslim community. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.157-166 |
2011 | Emotion recognition using EEG signals. In: Understanding brain developmental disorder based on EEG in soft computing approach IIUM Press . ISBN 9789674181116 , pp.37-57 |
2011 | Understanding students’ emotion while solving mathematical questions using EEG signals. In: Understanding brain developmental disorder based on EEG in soft computing approach IIUM Press . ISBN 9789674181116 , pp.94-110 |
Advanced Search