A
PROFILE
Laman Web Staf UPM
PROF. MADYA DR. NUR IZURA BINTI UDZIR
PROFESOR MADYA
FAKULTI SAINS KOMPUTER DAN TEKNOLOGI MAKLUMAT
izura@upm.edu.my
izura
BM
EN

PROFESIONAL

NAMA :
(Prof. Madya Dr.) NUR IZURA BINTI UDZIR
JAWATAN :
PROFESOR MADYA
PTJ :
FAKULTI SAINS KOMPUTER DAN TEKNOLOGI MAKLUMAT

DOWNLOAD CURRICULUM VITAE (PDF)
BIDANG PENYELIAAN
DATABASE SYSTEMS / INTELLIGENT SYSTEMS / PARALLEL AND DISTRIBUTED COMPUTING / SECURITY IN COMPUTING
PENDIDIKAN
PHD
UNIVERSITY OF YORK, YORK, UK
Graduated : 2006
MASTER SAINS KOMPUTER
UNIVERSITI PUTRA MALAYSIA, SERDANG, SELANGOR
Graduated : 1998
BACELOR SAINS KOMPUTER
UNIVERSITI PERTANIAN MALAYSIA, SERDANG, SELANGOR
Graduated : 1995
PENERBITAN BUKU
1. THE INSTRUCTOR?S MANUAL FOR CASE STUDY DEVELOPMENT AND ITS APPLICATION A Case of Computer Science Application
    ISPN: 978-967-344-481-6
2. Opportunities and Challenges for Next-Generation Applied Intelligence
    ISPN: 978-3-540-92813-3
PENERBITAN JOURNAL
1. Filtering Events using Clustering in Heterogeneous Security Logs
    Journal type: Citation-Indexed - Scopus
2. A refined filter for UHAD to improve anomaly detection
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
3. Role Performance Trust-Based Access Control for Protecting Sensitive Attributes
    Journal type: Citation-Indexed - Scopus
4. A XML based, User-centered Privacy Model in Pervasive Computing Systems
    Journal type: Non Citation-Indexed
5. Finer Garbage Collection in LINDACAP
    Journal type: Citation-Indexed - Scopus
6. Towards a Dynamic File Integrity Monitor through a Security Classification
    Journal type: Non Citation-Indexed
7. A Naturally Inspired Statistical Intrusion Detection Model
    Journal type: Non Citation-Indexed
8. Mutual Remote Attestation in IPSec Based VPN
    Journal type: Non Citation-Indexed
9. Extending TLS with Mutual Attestation for Platform Integrity Assurance
    Journal type: Other Abstracting / Indexing Bodies
10. Face Recognition and Template Protection with Shielding Function
    Journal type: Citation-Indexed - Scopus
11. An unsupervised heterogeneous log-based framework for anomaly detection
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
12. An AIS Inspired Alert Reduction Model
    Journal type: Non Citation-Indexed
13. User-independent and Self-optimizing Intrusion Detection Framework for Large Database Systems
    Journal type: Citation-Indexed - Scopus
14. Revocable and Non-Invertible Multibiometric Template Protection Based on Matrix Transformation
    Journal type: Citation-Indexed - Scopus
15. Big Data and Data Protection: Issues with Purpose Limitation Principle
    Journal type: Citation-Indexed - Scopus
16. State of the Art in Biometric Key Binding and Key Generation Schemes
    Journal type: Citation-Indexed - Scopus
17. Cancelable and Hybrid Biometric Cryptosystems: Current Directions and Open Research Issues
    Journal type: Other Abstracting / Indexing Bodies
18. A Method to Compute International Relations using Relation Algebra
    Journal type: Other Abstracting / Indexing Bodies
19. A Formal Verification and Simulation of Common Criteria Recognition Arrangement (CCRA)
    Journal type: Non Citation-Indexed
20. Modified Shielding Function for Multi-biometric Authentication and Template Protection
    Journal type: Other Abstracting / Indexing Bodies
21. A Super-Peer Approach for Scalable Collaborative Intrusion Detection Network (CIDN)
    Journal type: Citation-Indexed - Scopus
22. Framework Architecture on High Data Availability Server Virtualization for Disaster Recovery
    Journal type: Citation-Indexed - Scopus
23. Performance and Divisional Trust and Purpose-Based Access Control for Privacy Preservation
    Journal type: Citation-Indexed - Scopus
24. Security of NoSQL Database Against Intruders
    Journal type: Citation-Indexed - Scopus
25. Voice over IP on Windows IoT Core
    Journal type: Citation-Indexed - Scopus
26. A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework
    Journal type: Citation-Indexed - Scopus
27. Lattice Structural Analysis on Sniffing to Denial of Service Attacks
    Journal type: Citation-Indexed - Scopus
28. Systematic literature review and taxonomy for DDoS attack detection and prediction
    Journal type: Other Abstracting / Indexing Bodies
29. Character Property Method for Arabic Text Steganography with Biometric Multifactor Authentication using Liveness Detection
    Journal type: Citation-Indexed - Scopus
30. A Comparative Analysis of Arabic Text Steganography
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
31. Traid-bit embedding process on Arabic text steganography method
    Journal type: Citation-Indexed - Scopus
32. A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
    Journal type: Citation-Indexed - Scopus
33. CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
34. Trust-Based Access Control Model with Quantification Method for Protecting Sensitive Attributes
    Journal type: Citation-Indexed - Scopus
PENGAJARAN
2014
Pengaturcaraan Komputer I (Java)
2012
Sistem Pengoperasian (sejak 2007 hingga kini) (pra-siswazah)
2012
Seminar dalam Sains Komputer (siswazah)
2011
Sistem Pengesanan Pencerobohan (siswazah) 2010-2011
2009
Tajuk Pilihan dalam Komputeran Teragih (siswazah) 2006-2009
2006
Bahasa Pengaturcaraan Lanjutan (siswazah - PhD)
2003
Pengaturcaraan Komputer I (C++) 1999-2003 (pra-siswazah)
BIDANG PENGKHUSUSAN
2014
Kawalan Capaian, Sistem Pengesanan Pencerobohan, Keselamatan Komputer, Koordinasi dalam Sistem Teragih
BIDANG PENYELIDIKAN
2014
Kawalan Capaian, Sistem Pengesanan Pencerobohan, Keselamatan Komputer, Koordinasi dalam Sistem Teragih
2012
Keselamatan komputer, sistem pengoperasian selamat, kawalan capaian, sistem teragih, sistem pengesanan pencerobohan
2006
Koordinasi berasaskan-keupayaan dalam sistem terbuka teragih
1998
Rangkaian neural untuk capaian maklumat
PROJEK PENYELIDIKAN
PENERBITAN
2023
An Autonomous Role and Consideration of Electronic Health Systems with Access Control in Developed Countries: A Review
2022
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data
2022
Trust-Based Access Control Model with Quantification Method for Protecting Sensitive Attributes
2021
A Comparative Analysis of Arabic Text Steganography
2021
A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
2021
Traid-bit embedding process on Arabic text steganography method
2020
Character Property Method for Arabic Text Steganography with Biometric Multifactor Authentication using Liveness Detection
2019
Lattice Structural Analysis on Sniffing to Denial of Service Attacks
2019
Systematic literature review and taxonomy for DDoS attack detection and prediction
2019
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework
2019
Security of NoSQL Database Against Intruders
2018
A Super-Peer Approach for Scalable Collaborative Intrusion Detection Network (CIDN)
2018
Revocable and Non-Invertible Multibiometric Template Protection Based on Matrix Transformation
2018
Voice over IP on Windows IoT Core
2018
Performance and Divisional Trust and Purpose-Based Access Control for Privacy Preservation
2018
Framework Architecture on High Data Availability Server Virtualization for Disaster Recovery
2017
Modified Shielding Function for Multi-biometric Authentication and Template Protection
2017
State of the Art in Biometric Key Binding and Key Generation Schemes
2017
Cancelable and Hybrid Biometric Cryptosystems: Current Directions and Open Research Issues
2016
Big Data and Data Protection: Issues with Purpose Limitation Principle
2016
Role Performance Trust-Based Access Control for Protecting Sensitive Attributes
2016
An unsupervised heterogeneous log-based framework for anomaly detection
2016
A Method to Compute International Relations using Relation Algebra
2016
A refined filter for UHAD to improve anomaly detection
2015
Face Recognition and Template Protection with Shielding Function
2015
User-independent and Self-optimizing Intrusion Detection Framework for Large Database Systems
2014
Integrated Statistical and Data Mining Method for Packet Behaviour Anomaly Detection
2014
Extending TLS with Mutual Attestation for Platform Integrity Assurance
2012
A Heterogeneous Log-based Framework for Anomaly Detection
2011
Filtering Events using Clustering in Heterogeneous Security Logs
2010
Finer Garbage Collection in LINDACAP
2009
Lindacap: A Capability-Based System