A
PROFILE
UPM's Staff Profile
PROF. MADYA DR. NUR IZURA BINTI UDZIR
ASSOCIATE PROFESSOR
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
izura@upm.edu.my
izura
BM
EN

PROFESSIONAL

NAME :
(Prof. Madya Dr.) NUR IZURA BINTI UDZIR
POST :
ASSOCIATE PROFESSOR
ENTITY :
Faculty of Computer Science and Information Technology

DOWNLOAD CURRICULUM VITAE (PDF)
FIELD OF SUPERVISION
DATABASE SYSTEMS / INTELLIGENT SYSTEMS / PARALLEL AND DISTRIBUTED COMPUTING / SECURITY IN COMPUTING
EDUCATION
PHD
UNIVERSITY OF YORK, YORK, UK
Graduated : 2006
MASTER SAINS KOMPUTER
UNIVERSITI PUTRA MALAYSIA, SERDANG, SELANGOR
Graduated : 1998
BACELOR SAINS KOMPUTER
UNIVERSITI PERTANIAN MALAYSIA, SERDANG, SELANGOR
Graduated : 1995
BOOK PUBLICATION
1. THE INSTRUCTOR?S MANUAL FOR CASE STUDY DEVELOPMENT AND ITS APPLICATION A Case of Computer Science Application
    ISPN: 978-967-344-481-6
2. Opportunities and Challenges for Next-Generation Applied Intelligence
    ISPN: 978-3-540-92813-3
JOURNAL PUBLICATION
1. Filtering Events using Clustering in Heterogeneous Security Logs
    Journal type: Citation-Indexed - Scopus
2. A refined filter for UHAD to improve anomaly detection
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
3. Role Performance Trust-Based Access Control for Protecting Sensitive Attributes
    Journal type: Citation-Indexed - Scopus
4. A XML based, User-centered Privacy Model in Pervasive Computing Systems
    Journal type: Non Citation-Indexed
5. Finer Garbage Collection in LINDACAP
    Journal type: Citation-Indexed - Scopus
6. Towards a Dynamic File Integrity Monitor through a Security Classification
    Journal type: Non Citation-Indexed
7. A Naturally Inspired Statistical Intrusion Detection Model
    Journal type: Non Citation-Indexed
8. Mutual Remote Attestation in IPSec Based VPN
    Journal type: Non Citation-Indexed
9. Extending TLS with Mutual Attestation for Platform Integrity Assurance
    Journal type: Other Abstracting / Indexing Bodies
10. Face Recognition and Template Protection with Shielding Function
    Journal type: Citation-Indexed - Scopus
11. An unsupervised heterogeneous log-based framework for anomaly detection
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
12. An AIS Inspired Alert Reduction Model
    Journal type: Non Citation-Indexed
13. User-independent and Self-optimizing Intrusion Detection Framework for Large Database Systems
    Journal type: Citation-Indexed - Scopus
14. Revocable and Non-Invertible Multibiometric Template Protection Based on Matrix Transformation
    Journal type: Citation-Indexed - Scopus
15. Big Data and Data Protection: Issues with Purpose Limitation Principle
    Journal type: Citation-Indexed - Scopus
16. State of the Art in Biometric Key Binding and Key Generation Schemes
    Journal type: Citation-Indexed - Scopus
17. Cancelable and Hybrid Biometric Cryptosystems: Current Directions and Open Research Issues
    Journal type: Other Abstracting / Indexing Bodies
18. A Method to Compute International Relations using Relation Algebra
    Journal type: Other Abstracting / Indexing Bodies
19. A Formal Verification and Simulation of Common Criteria Recognition Arrangement (CCRA)
    Journal type: Non Citation-Indexed
20. Modified Shielding Function for Multi-biometric Authentication and Template Protection
    Journal type: Other Abstracting / Indexing Bodies
21. A Super-Peer Approach for Scalable Collaborative Intrusion Detection Network (CIDN)
    Journal type: Citation-Indexed - Scopus
22. Framework Architecture on High Data Availability Server Virtualization for Disaster Recovery
    Journal type: Citation-Indexed - Scopus
23. Performance and Divisional Trust and Purpose-Based Access Control for Privacy Preservation
    Journal type: Citation-Indexed - Scopus
24. Security of NoSQL Database Against Intruders
    Journal type: Citation-Indexed - Scopus
25. Voice over IP on Windows IoT Core
    Journal type: Citation-Indexed - Scopus
26. A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework
    Journal type: Citation-Indexed - Scopus
27. Lattice Structural Analysis on Sniffing to Denial of Service Attacks
    Journal type: Citation-Indexed - Scopus
28. Systematic literature review and taxonomy for DDoS attack detection and prediction
    Journal type: Other Abstracting / Indexing Bodies
29. Character Property Method for Arabic Text Steganography with Biometric Multifactor Authentication using Liveness Detection
    Journal type: Citation-Indexed - Scopus
30. A Comparative Analysis of Arabic Text Steganography
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
31. Traid-bit embedding process on Arabic text steganography method
    Journal type: Citation-Indexed - Scopus
32. A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
    Journal type: Citation-Indexed - Scopus
33. CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data
    Journal type: Citation-Indexed Journal - Science Citation Index (JCR)
34. Trust-Based Access Control Model with Quantification Method for Protecting Sensitive Attributes
    Journal type: Citation-Indexed - Scopus
TEACHING
2014
Computer Programming I (Java)
2012
Operating System (since 2007 to date) (undergraduate)
2012
Seminar in Computer Science (postgraduate)
2011
Intrusion Detection System (postgraduate) 2010-2011
2009
Selected Topics in Distributed Computing (postgraduate) 2006-2006
2006
Advanced Programming Languages (postgraduate - PhD)
2003
Computer Programming I (C++) – 1999-2003 (undergraduate)
AREA OF SPECIALISATION
2014
Access Control, Intrusion Detection Systems, Computer Security, Coordination in Distributed Systems
RESEARCH AREA
2014
Access Control, Intrusion Detection Systems, Computer Security, Coordination in Distributed Systems
2012
Computer security, Secure operating systems, Access control, Distributed systems, Intrusion detection systems
2006
Capability-based coordination in open distributed systems
1998
Neural Network for information retrieval
RESEARCH PROJECT
2014
Intrusion Detection with Hybrid Learning Algorithm
2012
A Linear-Temporal Formal Language for Context-Sensitive Usage Control Policies
2011
User-centered Privacy Model Based on Mobile Trusted Module (MTM) in Pervasive Computing Systems
2009
Refining Garbage Collection in Open Distributed Systems
PUBLICATION
2023
An Autonomous Role and Consideration of Electronic Health Systems with Access Control in Developed Countries: A Review
2022
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data
2022
Trust-Based Access Control Model with Quantification Method for Protecting Sensitive Attributes
2021
A Comparative Analysis of Arabic Text Steganography
2021
A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System
2021
Traid-bit embedding process on Arabic text steganography method
2020
Character Property Method for Arabic Text Steganography with Biometric Multifactor Authentication using Liveness Detection
2019
Lattice Structural Analysis on Sniffing to Denial of Service Attacks
2019
Systematic literature review and taxonomy for DDoS attack detection and prediction
2019
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework
2019
Security of NoSQL Database Against Intruders
2018
A Super-Peer Approach for Scalable Collaborative Intrusion Detection Network (CIDN)
2018
Revocable and Non-Invertible Multibiometric Template Protection Based on Matrix Transformation
2018
Voice over IP on Windows IoT Core
2018
Performance and Divisional Trust and Purpose-Based Access Control for Privacy Preservation
2018
Framework Architecture on High Data Availability Server Virtualization for Disaster Recovery
2017
Modified Shielding Function for Multi-biometric Authentication and Template Protection
2017
State of the Art in Biometric Key Binding and Key Generation Schemes
2017
Cancelable and Hybrid Biometric Cryptosystems: Current Directions and Open Research Issues
2016
Big Data and Data Protection: Issues with Purpose Limitation Principle
2016
Role Performance Trust-Based Access Control for Protecting Sensitive Attributes
2016
An unsupervised heterogeneous log-based framework for anomaly detection
2016
A Method to Compute International Relations using Relation Algebra
2016
A refined filter for UHAD to improve anomaly detection
2015
Face Recognition and Template Protection with Shielding Function
2015
User-independent and Self-optimizing Intrusion Detection Framework for Large Database Systems
2014
Integrated Statistical and Data Mining Method for Packet Behaviour Anomaly Detection
2014
Extending TLS with Mutual Attestation for Platform Integrity Assurance
2012
A Heterogeneous Log-based Framework for Anomaly Detection
2011
Filtering Events using Clustering in Heterogeneous Security Logs
2010
Finer Garbage Collection in LINDACAP
2009
Lindacap: A Capability-Based System