Article |
2020 |
Evaluation of the Effectiveness of Movement Control Order to Limit the Spread of COVID-19. Annals of Emerging Technologies in Computing (AETiC)
, 4
(4)
pp.1-9
|
2020 |
Two suggested probabilistic and kinetic models for astrocytic network in spiking neural networks. International Journal of Advanced Trends in Computer Science and Engineering
, 9
(5)
pp.7951-7957
|
2019 |
Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering
, 8
(5)
pp.2408-2413
|
2019 |
Improved Malware detection model with Apriori Association rule and particle swarm optimization. Security and Communication Networks
, 2019
pp.1-13
|
2018 |
A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering
, 10
(2-5)
pp.109-113
|
2016 |
Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology
, 4
(1)
pp.19-27
|
2015 |
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security
, 10
pp.152-163
|
2015 |
A new efficient text detection method for image spam filtering
. International Review on Computers and Software
, 10
(1)
pp.1-8
|
2014 |
An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters
, 20
(1)
pp.139-143
|
2013 |
A Corpus-Based Readability Formula for Estimate of Arabic Texts Reading Difficulty. World Applied Sciences Journal
, 21
pp.168-173
|
2013 |
CRF based feature extraction applied for supervised automatic text summarization
. Procedia Technology
, 11
pp.426-436
|
2011 |
Part-of-speech in a node-link scoring techniques for assessing learners' understanding. Procedia Social and Behavioral Sciences
, 27
pp.131-139
|
2011 |
Multilingual online resources for minority languages of a campus community. Procedia Social and Behavioral Sciences
, 27
pp.291-298
|
Conference or Workshop Item |
2020 |
NCI evalution: assessment of higher order thinking skills via short free text answer.
In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019)
|
2019 |
Software defined networking (SDN) and its security issues.
In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018
|
2019 |
Data selection in the assessment of higher order
thinking skills: focus on cognitive competency.
In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA)
|
2019 |
Acquiring and analysing digital evidence: a teaching and learning experience in class.
In: 2018 Cyber Resilience Conference (CRC 2018)
|
2018 |
Early prediction of acute kidney injury using machine learning algorithms.
In: Asia Pacific Advanced Network Meeting (APAN 46)
|
2018 |
Cyber security maturity model and Maqasid al-Shari'ah.
In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
|
2018 |
Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming.
In: 7th International Conference on Software and Computer Applications, ICSCA 2018
|
2017 |
Inculcating secure coding for beginners.
In: International Conference on Informatics and Computing (ICIC 2016)
|
2016 |
Mobile device forensics: extracting and analysing data from an android-based smartphone.
In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015
|
2015 |
A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2).
In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance
|
2015 |
Simple recurrent network in real time astrocyte.
In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA)
|
2015 |
Real time astrocyte in spiking neural network.
In: 2015 SAI Intelligent Systems Conference (IntelliSys 2015)
|
2014 |
Competency assessment of short free text answers.
In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T)
|
2014 |
CART-An Arabic teaching-learning tool for non-native Arabic speakers.
In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization.
In: 2014 World Congress on Information and Communication Technologies (WICT 2014)
|
2014 |
Techniques for analysing android malware.
In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
|
2014 |
An intelligence based model for the prevention of advanced cyber-attacks.
In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on
|
2014 |
CART - an Arabic teaching-learning tool for non-native Arabic speakers.
In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
|
2014 |
Normalizing library records display using FRBR model for al-Qur'an work-set.
In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
|
2013 |
Log visualization of intrusion and prevention reverse proxy server against web attacks
.
In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
|
2013 |
Corpus-based readability formula for Arabic texts: a prototype.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2012 |
NL scoring and Bloom competency test: an experimental result.
In: The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12 )
|
2012 |
Detecting computer generated images for image spam filtering.
In: 2012 International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Study on sparseness effects over NMF applied for automatic text summarization.
In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012)
|
2012 |
Risk identification for an information security management system implementation.
In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies
|
2011 |
A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance.
In: 4th International Conference on Mechatronics (ICOM'11)
|
2011 |
Secure coding in software development.
In: 2011 5th Malaysian Conference in Software Engineering (MySEC)
|
2010 |
Understanding emotion: Cognitive science perspective .
In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010)
|
2010 |
Modelling learners’ understanding through Node-link analysis and scoring
.
In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010
|
2010 |
Modelling learners' understanding through node-link analysis and scoring.
In: 3rd International Conference on Information and Communication Technology for the Muslim World (ICT4M 2010)
|
2010 |
NL scoring technique for the assessment of learners' understanding.
In: Second International Conference on Computer Research and Development (ICCRD 2010)
|
2009 |
Assessment of learner's understanding: an experimental result.
In: 2009 International Conference on Computer Technology and Development
|
2009 |
Assessment of learners’ understanding: an experimental result.
In: 2009 International Conference on Computer Technology and Development
|
2008 |
Assessing learner’s understanding via node-link analysis: an information theory approach.
In: International Symposium on Information Technology 2008 (ITSim), Vol.1
|
2008 |
An English-Malay translation memory system.
In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008)
|
Book Section |
2020 |
Securing online quizzes and test on iTa’LeEM.
In: IIUM emergency remote teaching and learning
Centre for Professional Development (CPD), International Islamic University Malaysia.
, pp.179-184
|
2020 |
Simple security guidelines for E-Learning at IIUM.
In: IIUM emergency remote teaching and learning
Centre for Professional Development (CPD), International Islamic University Malaysia.
, pp.185-186
|
2015 |
The trend of mobile malwares and effective detection techniques
.
In: Critical Socio-Technical Issues Surrounding Mobile Computing
IGI-Global
. ISBN 9781466694385
, pp.219-233
|
2015 |
The trend of mobile malwares and effective detection techniques
.
In: Critical Socio-Technical Issues Surrounding Mobile Computing
IGI-Global
. ISBN 9781466694385
, pp.219-233
|
2012 |
Network forensics: detection and mitigation of botnet malicious code via darknet.
In: Trustworthy Ubiquitous Computing
Atlantis Press
. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online)
, pp.65-78
|
2012 |
Network forensics: detection and mitigation of botnet malicious code via darknet.
In: Trustworthy Ubiquitous Computing
Atlantis Press
. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online)
, pp.65-78
|
2011 |
An online badminton motion tracking system.
In: The Web: Its Utilisation, Evaluation and Security
IIUM Press
. ISBN 978-967-418-112-3
, pp.149-158
|
2011 |
Web application - What makes it secure or insecure?
.
In: The Web : Its Utilisation, Evaluation and Security
IIUM Press
. ISBN 978-967-418-112-3
, pp.263-271
|
2011 |
Web and mobile based phrase dictionary.
In: An anthology of applied computer technologies
IIUM Press
. ISBN 9789674181062
, pp.1-9
|
2011 |
Computerized observation and motion in badminton tracking system.
In: An anthology of applied computer technologies
IIUM Press
. ISBN 9789674181062
, pp.11-20
|
2011 |
Investigating computer forensic tools and their searching technique.
In: An anthology of applied computer technologies
IIUM Press
. ISBN 9789674181062
, pp.69-85
|
2011 |
Secure coding in cross site scripting.
In: An anthology of applied computer technologies
IIUM Press
. ISBN 9789674181062
, pp.143-156
|
2011 |
Pronouncing dictionary for minority languages of Muslim community.
In: An anthology of applied computer technologies
IIUM Press
. ISBN 9789674181062
, pp.157-166
|
2011 |
Emotion recognition using EEG signals.
In: Understanding brain developmental disorder based on EEG in soft computing approach
IIUM Press
. ISBN 9789674181116
, pp.37-57
|
2011 |
Understanding students’ emotion while solving mathematical questions using EEG signals.
In: Understanding brain developmental disorder based on EEG in soft computing approach
IIUM Press
. ISBN 9789674181116
, pp.94-110
|