PENDIDIKAN
PHD
UNIVERSITY OF YORK, YORK, UK
Graduated : 2006
MASTER SAINS KOMPUTER
UNIVERSITI PUTRA MALAYSIA, SERDANG, SELANGOR
Graduated : 1998
BACELOR SAINS KOMPUTER
UNIVERSITI PERTANIAN MALAYSIA, SERDANG, SELANGOR
Graduated : 1995
PENERBITAN JOURNAL
1. Filtering Events using Clustering in Heterogeneous Security Logs
Journal type: Citation-Indexed - Scopus
2. A refined filter for UHAD to improve anomaly detection
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
3. Role Performance Trust-Based Access Control for Protecting Sensitive Attributes
Journal type: Citation-Indexed - Scopus
4. A XML based, User-centered Privacy Model in Pervasive Computing Systems
Journal type: Non Citation-Indexed
5. Finer Garbage Collection in LINDACAP
Journal type: Citation-Indexed - Scopus
6. Towards a Dynamic File Integrity Monitor through a Security Classification
Journal type: Non Citation-Indexed
7. A Naturally Inspired Statistical Intrusion Detection Model
Journal type: Non Citation-Indexed
8. Mutual Remote Attestation in IPSec Based VPN
Journal type: Non Citation-Indexed
9. Extending TLS with Mutual Attestation for Platform Integrity Assurance
Journal type: Other Abstracting / Indexing Bodies
10. Face Recognition and Template Protection with Shielding Function
Journal type: Citation-Indexed - Scopus
11. An unsupervised heterogeneous log-based framework for anomaly detection
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
12. An AIS Inspired Alert Reduction Model
Journal type: Non Citation-Indexed
13. User-independent and Self-optimizing Intrusion Detection Framework for Large Database Systems
Journal type: Citation-Indexed - Scopus
14. Revocable and Non-Invertible Multibiometric Template Protection Based on Matrix Transformation
Journal type: Citation-Indexed - Scopus
15. Big Data and Data Protection: Issues with Purpose Limitation Principle
Journal type: Citation-Indexed - Scopus
16. State of the Art in Biometric Key Binding and Key Generation Schemes
Journal type: Citation-Indexed - Scopus
17. Cancelable and Hybrid Biometric Cryptosystems: Current Directions and Open Research Issues
Journal type: Other Abstracting / Indexing Bodies
18. A Method to Compute International Relations using Relation Algebra
Journal type: Other Abstracting / Indexing Bodies
19. A Formal Veriļ¬cation and Simulation of Common Criteria Recognition Arrangement (CCRA)
Journal type: Non Citation-Indexed
20. Modified Shielding Function for Multi-biometric Authentication and Template Protection
Journal type: Other Abstracting / Indexing Bodies
21. A Super-Peer Approach for Scalable Collaborative Intrusion Detection Network (CIDN)
Journal type: Citation-Indexed - Scopus
22. Framework Architecture on High Data Availability Server Virtualization for Disaster Recovery
Journal type: Citation-Indexed - Scopus
23. Performance and Divisional Trust and Purpose-Based Access Control for Privacy Preservation
Journal type: Citation-Indexed - Scopus
24. Security of NoSQL Database Against Intruders
Journal type: Citation-Indexed - Scopus
25. Voice over IP on Windows IoT Core
Journal type: Citation-Indexed - Scopus
26. A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework
Journal type: Citation-Indexed - Scopus
27. Lattice Structural Analysis on Sniffing to Denial of Service Attacks
Journal type: Citation-Indexed - Scopus
28. Systematic literature review and taxonomy for DDoS attack detection and prediction
Journal type: Other Abstracting / Indexing Bodies
29. Character Property Method for Arabic Text Steganography with Biometric Multifactor Authentication using Liveness Detection
Journal type: Citation-Indexed - Scopus
30. A Comparative Analysis of Arabic Text Steganography
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
31. Traid-bit embedding process on Arabic text steganography method
Journal type: Citation-Indexed - Scopus
32. A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
Journal type: Citation-Indexed - Scopus
33. CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data
Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
34. Trust-Based Access Control Model with Quantification Method for Protecting Sensitive Attributes
Journal type: Citation-Indexed - Scopus
PENGAJARAN
Pengaturcaraan Komputer I (Java)
Sistem Pengoperasian (sejak 2007 hingga kini) (pra-siswazah)
Seminar dalam Sains Komputer (siswazah)
Sistem Pengesanan Pencerobohan (siswazah) 2010-2011
Tajuk Pilihan dalam Komputeran Teragih (siswazah) 2006-2009
Bahasa Pengaturcaraan Lanjutan (siswazah - PhD)
Pengaturcaraan Komputer I (C++) 1999-2003 (pra-siswazah)
BIDANG PENYELIDIKAN
Kawalan Capaian, Sistem Pengesanan Pencerobohan, Keselamatan Komputer, Koordinasi dalam Sistem Teragih
Keselamatan komputer, sistem pengoperasian selamat, kawalan capaian, sistem teragih, sistem pengesanan pencerobohan
Koordinasi berasaskan-keupayaan dalam sistem terbuka teragih
Rangkaian neural untuk capaian maklumat
PENERBITAN
2023
An Autonomous Role and Consideration of Electronic Health Systems with Access Control in Developed Countries: A Review
2022
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data
2022
Trust-Based Access Control Model with Quantification Method for Protecting Sensitive Attributes
2021
A Comparative Analysis of Arabic Text Steganography
2021
A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
2021
Traid-bit embedding process on Arabic text steganography method
2020
Character Property Method for Arabic Text Steganography with Biometric Multifactor Authentication using Liveness Detection
2019
Lattice Structural Analysis on Sniffing to Denial of Service Attacks
2019
Systematic literature review and taxonomy for DDoS attack detection and prediction
2019
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework
2019
Security of NoSQL Database Against Intruders
2018
A Super-Peer Approach for Scalable Collaborative Intrusion Detection Network (CIDN)
2018
Revocable and Non-Invertible Multibiometric Template Protection Based on Matrix Transformation
2018
Voice over IP on Windows IoT Core
2018
Performance and Divisional Trust and Purpose-Based Access Control for Privacy Preservation
2018
Framework Architecture on High Data Availability Server Virtualization for Disaster Recovery
2017
Modified Shielding Function for Multi-biometric Authentication and Template Protection
2017
State of the Art in Biometric Key Binding and Key Generation Schemes
2017
Cancelable and Hybrid Biometric Cryptosystems: Current Directions and Open Research Issues
2016
Big Data and Data Protection: Issues with Purpose Limitation Principle
2016
Role Performance Trust-Based Access Control for Protecting Sensitive Attributes
2016
An unsupervised heterogeneous log-based framework for anomaly detection
2016
A Method to Compute International Relations using Relation Algebra
2016
A refined filter for UHAD to improve anomaly detection
2015
Face Recognition and Template Protection with Shielding Function
2015
User-independent and Self-optimizing Intrusion Detection Framework for Large Database Systems
2014
Integrated Statistical and Data Mining Method for Packet Behaviour Anomaly Detection
2014
Extending TLS with Mutual Attestation for Platform Integrity Assurance
2012
A Heterogeneous Log-based Framework for Anomaly Detection
2011
Filtering Events using Clustering in Heterogeneous Security Logs
2010
Finer Garbage Collection in LINDACAP
2009
Lindacap: A Capability-Based System