JOURNAL PUBLICATION
1. Analyze Semantic of Object-Oriented Model Using RiTa.WordNet
Journal type: Other Abstracting / Indexing Bodies
2. S-Scrum: a Secure Methodology for Agile Development of Web Services
Journal type: Non Citation-Indexed
3. Enhance Luhn Algorithm for Validation of Identity Card Numbers (ID card)
Journal type: Other Abstracting / Indexing Bodies
4. DESIGN OF OBJECT-ORIENTED DEBUGGER MODEL BY USING UNIFIED MODELING LANGUAGE
Journal type: Citation-Indexed - Scopus
5. E-Complaint System for Internal Customer in Royal Malaysian Police Force Using Formal Language Method
Journal type: Citation-Indexed - Scopus
6. The Implementation of Finite State Automata in Government SMS Services (MySMS)
Journal type: Citation-Indexed Journal - ERA
7. USING FEATURE SELECTION AS ACCURACY BENCHMARKING IN CLINICAL DATA MINING
Journal type: Citation-Indexed - Scopus
8. Distinguishing Automata Machine By Using UPPAAL As A Model Checker
Journal type: Other Abstracting / Indexing Bodies
9. NEW MODEL TRANSFORMATION USING REQUIREMENT TRACEBILITY FROM REQUIREMENT TO UML BEHAVIORAL DESIGN
Journal type: Citation-Indexed - Scopus
10. Short Review on Metamorphic Malware Detection in Hidden Markov Models
Journal type: Other Abstracting / Indexing Bodies
11. Implementation of CONCEIVER++: An Object-Oriented Program
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
12. Use of Security Patterns for Development of Secure Healthcare Information System.
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
13. Active Authentication by one Time Password Based on Unique Factor and Behavioral Biometric
Journal type: Other Abstracting / Indexing Bodies
14. Enhance Luhn Algorithm for Validation of Credit Cards Numbers
Journal type: Other Abstracting / Indexing Bodies
15. Efficiency of Secured Novel Multi-Factor Authentication Scheme with Biometric Technology
Journal type: Citation-Indexed Journal - ERA
16. Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) using Finite State Machine
Journal type: Citation-Indexed - Scopus
17. AUTOMATED TRANSFORMATION APPROACH FROM USER REQUIREMENT TO BEHAVIOR DESIGN
Journal type: Citation-Indexed - Scopus
18. A SECURED AND EFFICIENT MULTI-FACTOR BIOMETRIC AUTHENTICATION SCHEME USING PLAN RECOGNITION TECHNIQUE.
Journal type: Citation-Indexed - Scopus
19. WIRELESS LOCAL AREA NETWORK: A COMPREHENSIVE REVIEW OF ATTACKS AND METRICS
Journal type: Citation-Indexed - Scopus
20. Design and Implementation of Multi Factor Mechanism for Secure Authentication System
Journal type: Other Abstracting / Indexing Bodies
21. A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users
Journal type: Other Abstracting / Indexing Bodies
22. SEMANTIC SCHEMA MATCHING APPROACHES: A REVIEW
Journal type: Citation-Indexed - Scopus
23. RL-Transformer : Java Code Transformation by Reducing Line of Code
Journal type: Non Citation-Indexed
24. ENHANCED NORMALIZATION APPROACH ADDRESSING STOP-WORD COMPLEXITY IN COMPOUND-WORD SCHEMA LABELS
Journal type: Citation-Indexed - Scopus
25. Analysis and Design of Object-oriented Program Understanding System
Journal type: Non Citation-Indexed
26. IMPROVEMENT OF CLASSIFICATION FEATURES TO INCREASE PHISHING TWEETS DETECTION ACCURACY
Journal type: Citation-Indexed - Scopus
27. Increase Phishing Tweets Detection Accuracy with Improved Classification Features
Journal type: Citation-Indexed - Scopus
28. Nonnegative matrix factorization andmetamorphic malware detection
Journal type: Citation-Indexed - Scopus
29. An effective security alert mechanism for real-time phishing tweet detection on Twitter
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
30. AN EFFICIENT ANOMALY INTRUSION DETECTION METHOD WITH EVOLUTIONARY KERNEL NEURAL NETWORK RANDOM WEIGHTS
Journal type: Citation-Indexed - Scopus
31. An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
32. Permission Extraction Framework for Android Malware Detection
Journal type: Citation-Indexed - Scopus
33. Phishing Image Spam Classification Research Trends: Survey and Open Issues
Journal type: Citation-Indexed - Scopus
34. Structural features with nonnegative matrix factorization for metamorphic malware detection
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
35. Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
Journal type: Citation-Indexed - Scopus
36. Personal Data Protection of Educational Records for Students in Postgraduate Studies with Blockchain Scheme
Journal type: Non Citation-Indexed
37. AN EFFICIENT ATTACK DETECTION FOR INTRUSION DETECTION SYSTEM (IDS) IN INTERNET OF MEDICAL THINGS SMART ENVIRONMENT WITH DEEP LEARNING ALGORITHM
Journal type: Citation-Indexed - Scopus
38. MITIGATING DATA SPOOFING RISKS IN NEAR FIELD COMMUNICATION (NFC) READ/WRITE MODE: AN INVESTIGATION INTO ACCESS CONTROL VULNERABILITIES AND POST-COMPROMISE RECOVERY STRATEGY
Journal type: Citation-Indexed - Scopus
39. Efficient Text Data Hiding Technique Using Cryptography and Steganography
Journal type: Citation-Indexed - Scopus
40. MESSAGE CONVERSATION BASED SOCIAL ENGINEERING ATTACK DETECTION USING MACHINE LEARNING
Journal type: Citation-Indexed - Scopus
PUBLICATION
2025
AI-POWERED JOB APPLICATION MANAGEMENT FOR APPLICANTS
2025
MESSAGE CONVERSATION BASED SOCIAL ENGINEERING ATTACK DETECTION USING MACHINE LEARNING
2024
MITIGATING DATA SPOOFING RISKS IN NEAR FIELD COMMUNICATION (NFC) READ/WRITE MODE: AN INVESTIGATION INTO ACCESS CONTROL VULNERABILITIES AND POST-COMPROMISE RECOVERY STRATEGY
2024
Efficient Text Data Hiding Technique Using Cryptography and Steganography
2023
AN EFFICIENT ATTACK DETECTION FOR INTRUSION DETECTION SYSTEM (IDS) IN INTERNET OF MEDICAL THINGS SMART ENVIRONMENT WITH DEEP LEARNING ALGORITHM
2021
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
2021
Structural features with nonnegative matrix factorization for metamorphic malware detection
2020
An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network
2020
Permission Extraction Framework for Android Malware Detection
2020
AN EFFICIENT ANOMALY INTRUSION DETECTION METHOD WITH EVOLUTIONARY KERNEL NEURAL NETWORK RANDOM WEIGHTS
2020
Phishing Image Spam Classification Research Trends: Survey and Open Issues
2019
An effective security alert mechanism for real-time phishing tweet detection on Twitter
2019
Nonnegative matrix factorization andmetamorphic malware detection
2019
A Novel Detection Algorithm with Dynamic Tweet-based Features to Detect Phishing Tweet on Twitter
2019
Metamorphic Malware Detection with Hidden Markov Model and Nonnegative Matrix Factorization on Statistical Sequential Features
2018
Increase Phishing Tweets Detection Accuracy with Improved Classification Features
2018
IMPROVEMENT OF CLASSIFICATION FEATURES TO INCREASE PHISHING TWEETS DETECTION ACCURACY
2017
ENHANCED NORMALIZATION APPROACH ADDRESSING STOP-WORD COMPLEXITY IN COMPOUND-WORD SCHEMA LABELS
2017
Short Review on Metamorphic Malware Detection in Hidden Markov Models
2017
WIRELESS LOCAL AREA NETWORK: A COMPREHENSIVE REVIEW OF ATTACKS AND METRICS
2016
Use of Security Patterns for Development of Secure Healthcare Information System.
2016
A SECURED AND EFFICIENT MULTI-FACTOR BIOMETRIC AUTHENTICATION SCHEME USING PLAN RECOGNITION TECHNIQUE.
2015
AUTOMATED TRANSFORMATION APPROACH FROM USER REQUIREMENT TO BEHAVIOR DESIGN
2015
Efficiency of Secured Novel Multi-Factor Authentication Scheme with Biometric Technology
2015
The Implementation of Finite State Automata in Government SMS Services (MySMS)
2014
Distinguishing Automata Machine By Using UPPAAL As A Model Checker
2014
Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) using Finite State Machine
2014
SEMANTIC SCHEMA MATCHING APPROACHES: A REVIEW
2013
Active Authentication by one Time Password Based on Unique Factor and Behavioral Biometric
2013
Enhance Luhn Algorithm for Validation of Identity Card Numbers (ID card)
2013
E-Complaint System for Internal Customer in Royal Malaysian Police Force Using Formal Language Method
2013
A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users
2013
Enhance Luhn Algorithm for Validation of Credit Cards Numbers
2013
USING FEATURE SELECTION AS ACCURACY BENCHMARKING IN CLINICAL DATA MINING
2013
NEW MODEL TRANSFORMATION USING REQUIREMENT TRACEBILITY FROM REQUIREMENT TO UML BEHAVIORAL DESIGN
2013
DESIGN OF OBJECT-ORIENTED DEBUGGER MODEL BY USING UNIFIED MODELING LANGUAGE
2013
Design and Implementation of Multi Factor Mechanism for Secure Authentication System
2012
DESIGN OF OBJECT-ORIENTED DEBUGGER MODEL BY USING UNIFIED MODELING LANGUAGE
2011
Analyze Semantic of Object-Oriented Model Using RiTa.WordNet
2011
Evaluation of CONCEIVER ++: a Program Understanding System to support teaching and learning of programming"
2009
Implementation of CONCEIVER++: An Object-Oriented Program