A
PROFILE
UPM's Staff Profile
PROF. MADYA DR. NOR FAZLIDA BINTI MOHD SANI
ASSOCIATE PROFESSOR
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
fazlida@upm.edu.my
fazlida
BM
EN

PROFESSIONAL

NAME :
(Prof. Madya Dr.) NOR FAZLIDA BINTI MOHD SANI
POST :
ASSOCIATE PROFESSOR
ENTITY :
Faculty of Computer Science and Information Technology

FIELD OF SUPERVISION
DATABASE SYSTEMS / INFORMATION SYSTEMS / INTELLIGENT SYSTEMS / SECURITY IN COMPUTING / SOFTWARE ENGINEERING
EDUCATION
PHD
UNIVERSITI KEBANGSAAN MALAYSIA, BANGI, SELANGOR
Graduated : 2007
MASTER SAINS KOMPUTER
UNIVERSITI PUTRA MALAYSIA, SERDANG, SELANGOR
Graduated : 2001
BACELOR SAINS KOMPUTER
UNIVERSITI PUTRA MALAYSIA, SERDANG, SELANGOR
Graduated : 1999
BOOK PUBLICATION
1. e-Perubatan System
    ISPN: 978-967-960-301-9
JOURNAL PUBLICATION
1. Analyze Semantic of Object-Oriented Model Using RiTa.WordNet
    Journal type: Other Abstracting / Indexing Bodies
2. S-Scrum: a Secure Methodology for Agile Development of Web Services
    Journal type: Non Citation-Indexed
3. Enhance Luhn Algorithm for Validation of Identity Card Numbers (ID card)
    Journal type: Other Abstracting / Indexing Bodies
4. DESIGN OF OBJECT-ORIENTED DEBUGGER MODEL BY USING UNIFIED MODELING LANGUAGE
    Journal type: Citation-Indexed - Scopus
5. E-Complaint System for Internal Customer in Royal Malaysian Police Force Using Formal Language Method
    Journal type: Citation-Indexed - Scopus
6. The Implementation of Finite State Automata in Government SMS Services (MySMS)
    Journal type: Citation-Indexed Journal - ERA
7. USING FEATURE SELECTION AS ACCURACY BENCHMARKING IN CLINICAL DATA MINING
    Journal type: Citation-Indexed - Scopus
8. Distinguishing Automata Machine By Using UPPAAL As A Model Checker
    Journal type: Other Abstracting / Indexing Bodies
9. NEW MODEL TRANSFORMATION USING REQUIREMENT TRACEBILITY FROM REQUIREMENT TO UML BEHAVIORAL DESIGN
    Journal type: Citation-Indexed - Scopus
10. Short Review on Metamorphic Malware Detection in Hidden Markov Models
    Journal type: Other Abstracting / Indexing Bodies
11. Implementation of CONCEIVER++: An Object-Oriented Program
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
12. Use of Security Patterns for Development of Secure Healthcare Information System.
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
13. Active Authentication by one Time Password Based on Unique Factor and Behavioral Biometric
    Journal type: Other Abstracting / Indexing Bodies
14. Enhance Luhn Algorithm for Validation of Credit Cards Numbers
    Journal type: Other Abstracting / Indexing Bodies
15. Efficiency of Secured Novel Multi-Factor Authentication Scheme with Biometric Technology
    Journal type: Citation-Indexed Journal - ERA
16. Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) using Finite State Machine
    Journal type: Citation-Indexed - Scopus
17. AUTOMATED TRANSFORMATION APPROACH FROM USER REQUIREMENT TO BEHAVIOR DESIGN
    Journal type: Citation-Indexed - Scopus
18. A SECURED AND EFFICIENT MULTI-FACTOR BIOMETRIC AUTHENTICATION SCHEME USING PLAN RECOGNITION TECHNIQUE.
    Journal type: Citation-Indexed - Scopus
19. WIRELESS LOCAL AREA NETWORK: A COMPREHENSIVE REVIEW OF ATTACKS AND METRICS
    Journal type: Citation-Indexed - Scopus
20. Design and Implementation of Multi Factor Mechanism for Secure Authentication System
    Journal type: Other Abstracting / Indexing Bodies
21. A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users
    Journal type: Other Abstracting / Indexing Bodies
22. SEMANTIC SCHEMA MATCHING APPROACHES: A REVIEW
    Journal type: Citation-Indexed - Scopus
23. RL-Transformer : Java Code Transformation by Reducing Line of Code
    Journal type: Non Citation-Indexed
24. ENHANCED NORMALIZATION APPROACH ADDRESSING STOP-WORD COMPLEXITY IN COMPOUND-WORD SCHEMA LABELS
    Journal type: Citation-Indexed - Scopus
25. Analysis and Design of Object-oriented Program Understanding System
    Journal type: Non Citation-Indexed
26. IMPROVEMENT OF CLASSIFICATION FEATURES TO INCREASE PHISHING TWEETS DETECTION ACCURACY
    Journal type: Citation-Indexed - Scopus
27. Increase Phishing Tweets Detection Accuracy with Improved Classification Features
    Journal type: Citation-Indexed - Scopus
28. Nonnegative matrix factorization andmetamorphic malware detection
    Journal type: Citation-Indexed - Scopus
29. An effective security alert mechanism for real-time phishing tweet detection on Twitter
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
30. AN EFFICIENT ANOMALY INTRUSION DETECTION METHOD WITH EVOLUTIONARY KERNEL NEURAL NETWORK RANDOM WEIGHTS
    Journal type: Citation-Indexed - Scopus
31. An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
32. Permission Extraction Framework for Android Malware Detection
    Journal type: Citation-Indexed - Scopus
33. Phishing Image Spam Classification Research Trends: Survey and Open Issues
    Journal type: Citation-Indexed - Scopus
34. Structural features with nonnegative matrix factorization for metamorphic malware detection
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
35. Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
    Journal type: Citation-Indexed - Scopus
36. Personal Data Protection of Educational Records for Students in Postgraduate Studies with Blockchain Scheme
    Journal type: Non Citation-Indexed
37. AN EFFICIENT ATTACK DETECTION FOR INTRUSION DETECTION SYSTEM (IDS) IN INTERNET OF MEDICAL THINGS SMART ENVIRONMENT WITH DEEP LEARNING ALGORITHM
    Journal type: Citation-Indexed - Scopus
38. MITIGATING DATA SPOOFING RISKS IN NEAR FIELD COMMUNICATION (NFC) READ/WRITE MODE: AN INVESTIGATION INTO ACCESS CONTROL VULNERABILITIES AND POST-COMPROMISE RECOVERY STRATEGY
    Journal type: Citation-Indexed - Scopus
39. Efficient Text Data Hiding Technique Using Cryptography and Steganography
    Journal type: Citation-Indexed - Scopus
40. MESSAGE CONVERSATION BASED SOCIAL ENGINEERING ATTACK DETECTION USING MACHINE LEARNING
    Journal type: Citation-Indexed - Scopus
RESEARCH AREA
Information Security
Program Understanding and Debugging
PUBLICATION
2025
AI-POWERED JOB APPLICATION MANAGEMENT FOR APPLICANTS
2025
MESSAGE CONVERSATION BASED SOCIAL ENGINEERING ATTACK DETECTION USING MACHINE LEARNING
2024
MITIGATING DATA SPOOFING RISKS IN NEAR FIELD COMMUNICATION (NFC) READ/WRITE MODE: AN INVESTIGATION INTO ACCESS CONTROL VULNERABILITIES AND POST-COMPROMISE RECOVERY STRATEGY
2024
Efficient Text Data Hiding Technique Using Cryptography and Steganography
2023
AN EFFICIENT ATTACK DETECTION FOR INTRUSION DETECTION SYSTEM (IDS) IN INTERNET OF MEDICAL THINGS SMART ENVIRONMENT WITH DEEP LEARNING ALGORITHM
2021
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
2021
Structural features with nonnegative matrix factorization for metamorphic malware detection
2020
An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network
2020
Permission Extraction Framework for Android Malware Detection
2020
AN EFFICIENT ANOMALY INTRUSION DETECTION METHOD WITH EVOLUTIONARY KERNEL NEURAL NETWORK RANDOM WEIGHTS
2020
Phishing Image Spam Classification Research Trends: Survey and Open Issues
2019
An effective security alert mechanism for real-time phishing tweet detection on Twitter
2019
Nonnegative matrix factorization andmetamorphic malware detection
2019
A Novel Detection Algorithm with Dynamic Tweet-based Features to Detect Phishing Tweet on Twitter
2019
Metamorphic Malware Detection with Hidden Markov Model and Nonnegative Matrix Factorization on Statistical Sequential Features
2018
Increase Phishing Tweets Detection Accuracy with Improved Classification Features
2018
IMPROVEMENT OF CLASSIFICATION FEATURES TO INCREASE PHISHING TWEETS DETECTION ACCURACY
2017
ENHANCED NORMALIZATION APPROACH ADDRESSING STOP-WORD COMPLEXITY IN COMPOUND-WORD SCHEMA LABELS
2017
Short Review on Metamorphic Malware Detection in Hidden Markov Models
2017
WIRELESS LOCAL AREA NETWORK: A COMPREHENSIVE REVIEW OF ATTACKS AND METRICS
2016
Use of Security Patterns for Development of Secure Healthcare Information System.
2016
A SECURED AND EFFICIENT MULTI-FACTOR BIOMETRIC AUTHENTICATION SCHEME USING PLAN RECOGNITION TECHNIQUE.
2015
AUTOMATED TRANSFORMATION APPROACH FROM USER REQUIREMENT TO BEHAVIOR DESIGN
2015
Efficiency of Secured Novel Multi-Factor Authentication Scheme with Biometric Technology
2015
The Implementation of Finite State Automata in Government SMS Services (MySMS)
2014
Distinguishing Automata Machine By Using UPPAAL As A Model Checker
2014
Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) using Finite State Machine
2014
SEMANTIC SCHEMA MATCHING APPROACHES: A REVIEW
2013
Active Authentication by one Time Password Based on Unique Factor and Behavioral Biometric
2013
Enhance Luhn Algorithm for Validation of Identity Card Numbers (ID card)
2013
E-Complaint System for Internal Customer in Royal Malaysian Police Force Using Formal Language Method
2013
A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users
2013
Enhance Luhn Algorithm for Validation of Credit Cards Numbers
2013
USING FEATURE SELECTION AS ACCURACY BENCHMARKING IN CLINICAL DATA MINING
2013
NEW MODEL TRANSFORMATION USING REQUIREMENT TRACEBILITY FROM REQUIREMENT TO UML BEHAVIORAL DESIGN
2013
DESIGN OF OBJECT-ORIENTED DEBUGGER MODEL BY USING UNIFIED MODELING LANGUAGE
2013
Design and Implementation of Multi Factor Mechanism for Secure Authentication System
2012
DESIGN OF OBJECT-ORIENTED DEBUGGER MODEL BY USING UNIFIED MODELING LANGUAGE
2011
Analyze Semantic of Object-Oriented Model Using RiTa.WordNet
2011
Evaluation of CONCEIVER ++: a Program Understanding System to support teaching and learning of programming"
2009
Implementation of CONCEIVER++: An Object-Oriented Program