Completed
- Mohd Nizam Kassim |Scholar|
Enhanced Text Stemmer for Standard and Non Standard Word Patterns in Malay Text - Fuad AbdulGaleel Abdoh Ghaleb |Scholar|
Context-Aware Misbehavior Detection Model for VANET Based on Mobility Information Trust Establishment Techniques - Danlami Gabi |Scholar|
Dynamic Scheduling Schemes for Cloud Computing Using Orthogonal Taguchi-based Cat Swarm Optimisation – co-supervisor - Aisha Abdallah Zain Alabdeen Ahmed
Adaptive Anomaly Based Fraud Detection Model for Handling Concept Drift in Short Term Profile -co-supervisor - Ahlam Hashim |Scholar|
Self-Adaptive On Demand Reliable Geo-Casting Routing Scheme For Mobile Ad Hoc Network – co-supervisor - Hadi S. Yaghoubyan |Scholar|
Illicit Image Detection Based on Enhanced Bag of Visual Word Model – co-supervisor - Murad A. Rassam|Scholar|
An Anomaly Detection Model Using Candid Covariance-Free Incremental Principal Component Analysis for Wireless Sensor Networks- co-supervisor - Tagwa Ahmed Mohamed Al-Haj
An Effective Attack Scenario Construction Model Based on Two-Tier Feature Selection and Coarse Grain Cleaning- co-supervisor - Nurudeen Mahmud Ibrahim|Scholar|
An Adaptive and Distributed Cloud Intrusion Detection Scheme - Raja Waseem Anuar |Scholar|
Efficient Trust Based Routing Mechanism for Wireless Sensor Network - Muhalim Mohamed Amin |Scholar|
Fraud Detection Using Machine Learning Approach
On-going
Main Supervision
Muhammad ZafranMuhammad Zaly Shah Spatial Temporal Event Analysis in Conflict Zone Using Deep Learning Approach The research aim is to provide an accurate and also practical approach to predict the events associated with the South China Sea conflict. | |
Kamarul Zaman Panatik|Scholar| Intrusion Detection System for Large Scale Attack in Software Defined Network The research is aimed to develop the model for distributed Intrusion Detection System (IDS) in Software Defined Network (SDN). | |
Mohamad Yamen Ahmad Sattouf IDS for Wireless Sensor Network The Distributing way of the foreseeable schema in WSN, real time detection, adaptive learning and updating of reference model, and distinguishing events and errors in real time can be the key factors in the effectiveness and efficiency of any anomaly detection in WSN. | |
Khairun Nisyak Zakaria Threat Driven Cybersecurity Audit Model Using Metamodel Approach This study proposes a Threat Driven Cyber-security Audit Model (TDCAM) using a meta-model method, as a set of control element, procedures and audit components in a single model/ Audit model | |
Siti Salmah Md. Kassim |Scholar| User Trust Evaluation Procedure For Selecting the Best Provider in Cloud Based E-Learning This research solve problems in trusting cloud as a public platform through calculating the user trust and match the CSU preference with suitable CSP available. | |
Nurfazrina Mohd Zamry |Scholar| Efficient Anomaly Detection Model in WSN The purpose of this research is to design and develop efficient and effective anomaly detection model for WSNs by minimizing the resource constraint in WSNs. | |
Noor Azeera Abdul Aziz |Scholar| Automated Hate Speech and Offensive Language Detection In this study, a selected new features set is proposed for detecting hate speech and offensive language. | |
Co-supervision
- Hashim Hussien Taha
Predictive Intrusion Alert Correlation Model