A
PROFILE
UPM's Staff Profile
PROF. MADYA DR. ZURINA BINTI MOHD HANAPI
HEAD OF DEPARTMENT
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
zurinamh@upm.edu.my
zurinamh
BM
EN
My professional information. Kindly please email me for detailed information.
zurinamh@upm.edu.my
NAME :
(PROF. MADYA DR.) ZURINA BINTI MOHD HANAPI
MANAGERIAL POSITION:
Head Of Department
PERMANENT POSITION:
Associate Professor
Faculty of Computer Science and Information Technology

DOWNLOAD CURRICULUM VITAE (PDF)


FIELDS OF SUPERVISION
Computer Networks / Parallel And Distributed Computing / Security In Computing / Wireless Communications And Networks Engineering
EDUCATIONAL BACKGROUND
2011
PhD.in Electrical, Electronic, and System Engineering, Universiti kebangsaan Malaysia
2004
MSc. in Computer and Communication Systems Engineering, Universiti Putra Malaysia
1999
BSc in Computer and Electronic System Engineering, Strathclyde University
WORKING EXPERIENCE
2012
Senior Lecturer, Universiti Putra Malaysia
2004
Lecturer, Universiti Putra Malaysia
1999
Tutor, Universiti Putra Malaysia
PROJECT
2016
Logistic Management System for KAGAT
2012
Enhanced Tight Finite Key Scheme For Quantum Key Distribution (QKD) Protocol To Authenticate Multi-Party System In Cloud Infrastructure
2012
A New Trust Scheme Model in Routing Protocol to Enhance Security Defence at Network Layer for Wireless Sensor Network
2011
Secured Routing Protocol for Wireless Sensor Network
2011
Enhancement Of Signal Strength Based Routing Algorithm In Mobile Ad Hoc Networks
2011
Advanced Intrusion Detection System In Mobile Ad Hoc Networks
CONSULTANCY SERVICES
2016
Logistic Management System for KAGAT
2015
Curriculum Reviewer on Diploma Programme ‘Network Security’
2014
Curriculum Reviewer on Diploma Programme ‘Network Security’
2012
Protection Plan bagi Produk-Network Devices
CONFERENCE / WORKSHOP / SEMINAR
Please refer CV
PAPER PRESENTED
Please refer CV
TEACHING
Please refer CV
COMMITTEE
Please refer CV
AWARD AND ACHIEVEMENT
Please refer CV
AREA OF SPECIALISATION
Routing, Wireless Sensor Network, Wireless Communication, Distributed Computing, Network Security, Crpytography.
RESEARCH AREA
Routing, Wireless Sensor Network, Wireless Communication, Distributed Computing, Network Security, Crpytography, and Intelligent Systems.
RESEARCH PROJECT
Please refer CV
PUBLICATION
2025:
A comprehensive survey of deep reinforcement learning in UAV-assisted IoT data collection
2025:
An Adaptive congestion control algorithm for improving Transmission Control Protocol performance over Cellular-to-Cloud Networks
2025:
An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security
2025:
MSS-TCP: A Congestion Control Algorithm for Boosting TCP Performance in mmWave Cellular Networks
2024:
An Efficient Secure and Energy Resilient Trust-Based System for Detection and Mitigation of Sybil Attack Detection (SAN)
2024:
RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks
2024:
Recent trends and future directions of congestion management strategies for routing in IoT-based wireless sensor network: a thematic review
2023:
Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator
2023:
Wireless Sensor Security Issues on Data Link Layer: A Survey
2023:
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
2023:
Efficient and Secured Mechanisms for Data Link in IoT WSN: A Literature Review
2023:
Efficient Routing Mechanisms for Low Powered IoT Network: A Literature Review
2022:
Deep Insight into IoT-Enabled Agriculture and Network Protocols: A Review Study
2022:
Delay-based Resource Allocation with Fairness Guarantee and Minimal Loss for eMBB in 5G Heterogeneous Networks
2021:
Energy and Spectral Efficiency Balancing Algorithm for Energy Saving in LTE Downlinks
2021:
A Survey of Sybil Attack Countermeasures in IoT-based Wireless Sensor Networks
2020:
Extensive Analysis on Images Encryption using Hybrid Elliptic Curve Cryptosystem and Hill Cipher
2020:
Impact Of Sybil Attack On Secure Geographic Forwarding Approaches
2019:
Quality of Service Class Identifier (QCI) Radio Resource Allocation Algorithm for LTE Downlink
2019:
Towards overhead mitigation in state-free geographic forwarding protocols for wireless sensor networks
2018:
Delay-based and QoS-Aware Packet Scheduling for RT and NRT Multimedia Services in LTE Downlink Systems
2018:
Link Adaptive Power Control and Allocation for Energy-Efficient Downlink Transmissions in LTE Systems
2018:
Random Traveling Wave Pulse Coupled Oscillator (RTWPCO) Algorithm of Energy-efficient Wireless Sensor Networks
2017:
An Adaptive Call Admission Control with Bandwidth Reservation for Downlink LTE Networks
2017:
TruFiX: A Configurable Trust-based Cross-Layer Protocol for Wireless Sensor Networks
2017:
A Secure Region-Based Geographic Routing Protocol Routing Protocol (SRBR) for Wireless Sensor Networks
2017:
Travelling Wave Pulse Coupled Oscillator (TWPCO) Using a Self-Organizing Scheme for Energy-efficient Wireless Sensor Networks
2017:
Two-level QoS-aware Frame-based Downlink Resources Allocation for RT/NRT Services Fairness in LTE Networks
2016:
Self-organizing Method for Energy-efficient Pulse Coupled Oscillator (EEPCO) in Wireless Networks
2016:
High Data Rate Scheduling Algorithm for Downlink LTE Network
2016:
FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks
2016:
A Firefly-Inspired Scheme for Energy-Efficient Transmission Scheduling Using a Self-Organizing Method in a Wireless Sensor Network
2015:
Energy Efficient MAC Protocols: A Survey
2015:
Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks
2015:
Geographic Routing Protocols for Wireless Sensor Networks: Design and Security Perspectives
2015:
An Energy Aware Distributed Clustering Protocol for Wireless Sensor Networks Using Fuzzy Logic
2015:
A Review On Wormhole Attacks in MANET
2014:
On Multi-Cell Packet Scheduling of LTE-A Cellular Networks: A Survey of Concepts Related Challenges and Solutions
2014:
Comparative Study on Energy Consumption in Dynamic Window Secured Implicit Geographic Forwarding Routing Protocol
2014:
Impact of Blackhole and Sybil Attacks on Dynamic Windows Secured Implicit Geographic Forwarding Routing Protocol
2014:
A Distance Threshold Analysis on Energy Aware Distributed Clustering (EADC) Routing Protocol for Wireless Sensor Networks with Non-uniform Node Distribution
2014:
Energy Efficient on Aspect of Clock Synchronization in a Wireless Sensor Network
2014:
A Scheduled Activity Energy Aware Distributed Clustering Algorithm for Wireless Sensor Networks with Non-uniform Node Distribution.
2014:
A Survey on Cluster-Based Routing Protocols in Wireless Sensor Networks
2013:
On Multi-Cell Packet Scheduling of LTE/LTE-A Cellular Networks: A Survey of Concepts, Related Challenges, and Solutions
2013:
A Beacon-Enabled Least-Time And Energy Efficient With One-Level Data Aggregation Routing Protocol For WSNs Using IEEE 802.15.4
2013:
HYBRID OF FUZZY CLUSTERING NEURAL NETWORK OVER NSL DATASET FOR INTRUSION DETECTION SYSTEM
2013:
Research and development on aspects of clock synchronization in a wireless sensor network
2013:
Energy Efficient Cluster-based Routing Protocols in Wireless Sensor Networks: Review of Concepts, Challenges, and Related Issues
2012:
HYBRID OF FUZZY CLUSTERING NEURAL NETWORK OVER NSL DATASET FOR INTRUSION DETECTION SYSTEM
2012:
Evaluation of the Quality of Service Parameters for Routing Protocols in Ad-Hoc Networks
2012:
Impact of Blackhole and Sybil Attacks on Dynamic Windows Secured Implicit Geographic Forwarding Routing Protocol
2012:
Blackhole and Sybil Attack?s Impact on Dynamic Windows Secured Implicit Geographic Forwarding Routing Protocol
2010:
The Impact on Window?s Size in DWSIGF Routing Protocol
2010:
The Impact of Window's Size in DWSIGF Routing Protocol
2009:
Message Based Random Variable Length Key Encryption Algorithm