{"id":68,"date":"2011-09-27T05:05:18","date_gmt":"2011-09-27T05:05:18","guid":{"rendered":"http:\/\/people.utm.my\/nazrikama\/?page_id=68"},"modified":"2025-08-09T11:50:36","modified_gmt":"2025-08-09T11:50:36","slug":"publication","status":"publish","type":"page","link":"https:\/\/people.utm.my\/nazrikama\/publication\/","title":{"rendered":""},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>PUBLICATION SUMMARY<\/strong><em> (AS OF MAY 2025)<\/em><\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td>H-INDEX SCOPUS<\/td><td class=\"has-text-align-center\" data-align=\"center\">18<\/td><\/tr><tr><td>H-INDEX WOS<\/td><td class=\"has-text-align-center\" data-align=\"center\">15<\/td><\/tr><tr><td>TOTAL PUBLICATION IN WEB OF SCIENCE (JOURNAL)<\/td><td class=\"has-text-align-center\" data-align=\"center\">32<\/td><\/tr><tr><td>TOTAL PUBLICATION IN SCOPUS (JOURNAL)<\/td><td class=\"has-text-align-center\" data-align=\"center\">25<\/td><\/tr><tr><td>NATIONAL POLICY PAPER (CIRCULARS &amp; GUIDELINES)<\/td><td class=\"has-text-align-center\" data-align=\"center\">5<\/td><\/tr><tr><td>TOTAL PUBLICATION IN BOOK &amp; BOOK CHAPTER<\/td><td class=\"has-text-align-center\" data-align=\"center\">6<\/td><\/tr><tr><td><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>WEB OF SCIENCE &#8211; QUARTILE 1<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td>A SECURITY AND PRIVACY SCHEME BASED ON NODE AND MESSAGE AUTHENTICATION AND TRUST IN FOG-ENABLED VANET, <em>VEHICULAR COMMUNICATIONS, IF: 4.706<\/em>, <em>2021<\/em> <\/td><\/tr><tr><td>ABKS-PBM: ATTRIBUTE-BASED KEYWORD SEARCH WITH PARTIAL BILINEAR MAP, <em>IEEE ACCESS, IF: 3.745<\/em>, <em>2021<\/em> <\/td><\/tr><tr><td>A PRIVACY-PRESERVING AUTHENTICATION SCHEME BASED ON ELLIPTIC CURVE CRYPTOGRAPHY AND USING QUOTIENT FILTER IN VANET, <em>AD HOC NETWORKS, IF: 3.62<\/em>, <em>2021<\/em> <\/td><\/tr><tr><td>A PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR REAL-TIME MEDICAL MONITORING SYSTEMS, <em>IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, IF: 5.223<\/em>, <em>2021<\/em> <\/td><\/tr><tr><td>PACMAN: PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR MANAGING CYBERTWIN-BASED 6G NETWORKING, <em>IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, IF: 10.215<\/em>, <em>2021<\/em> <\/td><\/tr><tr><td>PASS: A PRIVACY-PRESERVING AUTHENTICATION AND SEARCHABLE SYMMETRIC ENCRYPTION SCHEME FOR SEMI-TRUSTED FOG ENABLED 5G-IIOT, <em>IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING, IF: 7.329<\/em>, <em>2021<\/em> <\/td><\/tr><tr><td>A TRUST MODEL AND PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR CLOUD-ENABLED 5G-IIOT, <em>IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, IF: 10.215<\/em>, <em>2021<\/em><\/td><\/tr><tr><td>RECENT ANALYSIS OF FORGED REQUEST HEADERS CONSTITUED BY HTTP DDOS, <em>SENSORS, IF: 3.275<\/em>, <em>2020<\/em><\/td><\/tr><tr><td>DETERMINANTS OF MASTER DATA MANAGEMENT ADOPTION BY LOCAL GOVERNMENT ORGANIZATIONS: AN EMPIRICAL STUDY,<em> INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, IF: 4.516, 2019<\/em><\/td><\/tr><tr><td>PREDICTIVE MODELLING OF BUILDING ENERGY CONSUMPTION BASED ON AN INTERNET OF THINGS AND&nbsp; NATURE-INSPIRED FRAMEWORK, <em>ENERGY AND BUILDINGS, IF: 4.495, 2019<\/em><\/td><\/tr><tr><td>A HYBRID INTELLIGENT MODEL FOR NETWORK SELECTION IN THE INDUSTRIAL INTERNET OF THINGS, <em>APPLIED SOFTCOMPUTING JOURNAL, IF: 3.9<\/em>,<em> 2019<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\nhttps:\/\/utmscholar.utm.my\/Scholar\/ScholarInfoDetails\/zBj7\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PUBLICATION SUMMARY (AS OF MAY 2025) H-INDEX SCOPUS 18 H-INDEX WOS 15 TOTAL PUBLICATION IN WEB OF SCIENCE (JOURNAL) 32 TOTAL PUBLICATION IN SCOPUS (JOURNAL) 25 NATIONAL POLICY PAPER (CIRCULARS &amp; GUIDELINES) 5 TOTAL PUBLICATION IN BOOK &amp; BOOK CHAPTER 6 WEB OF SCIENCE &#8211; QUARTILE 1 A SECURITY AND PRIVACY SCHEME BASED ON NODE [&hellip;]<\/p>\n","protected":false},"author":6475,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-68","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/nazrikama\/wp-json\/wp\/v2\/pages\/68","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/nazrikama\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.utm.my\/nazrikama\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/nazrikama\/wp-json\/wp\/v2\/users\/6475"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/nazrikama\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":15,"href":"https:\/\/people.utm.my\/nazrikama\/wp-json\/wp\/v2\/pages\/68\/revisions"}],"predecessor-version":[{"id":2360,"href":"https:\/\/people.utm.my\/nazrikama\/wp-json\/wp\/v2\/pages\/68\/revisions\/2360"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/nazrikama\/wp-json\/wp\/v2\/media?parent=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}