-
List Of Active Publication
Journal Article : ENHANCING LEARNING MANAGEMENT SYSTEMS WITH INTRUSION ALERTS AND FORENSIC LOGGING 2024, 26828138, Penulis Utama - Corresponding Author, https://myjms.mohe.gov.my/index.php/ijares/article/view/27791 | |
Journal Article : PROACTIVE ACQUISITION USING BOT ON DISCORD 2023, 21565570, Penulis Pertama UTHM - First Author, https://thesai.org/Publications/ViewPaper?Volume=14&Issue=5&Code=IJACSA&SerialNo=33 | |
Journal Article : A SURVEY OF FORENSIC ANALYSIS AND INFORMATION VISUALIZATION APPROACH FOR INSTANT MESSAGING APPLICATIONS 2023, 21565570, Penulis Pertama UTHM - First Author, https://thesai.org/Publications/ViewPaper?Volume=14&Issue=2&Code=IJACSA&SerialNo=29 | |
Journal Article : THE INFLUENCE OF VIRTUAL SECURE MODE (VSM) ON MEMORY ACQUISITION 2022, 21565570, Penulis Pertama UTHM - First Author, https://thesai.org/Publications/ViewPaper?Volume=13&Issue=11&Code=IJACSA&SerialNo=63 | |
Journal Article : MYENTROPY: A FILE TYPE IDENTIFICATION TOOL USING ENTROPY SCORING 2022, 17519128, Penulis Utama - Corresponding Author, https://www.inderscienceonline.com/doi/pdf/10.1504/IJESDF.2022.120008 | |
Journal Article : COMPARISON OF DATA RECOVERY TECHNIQUES ON MASTER FILE TABLE BETWEEN AHO-CORASICK AND LOGICAL DATA RECOVERY BASED ON EFFICIENCY 2021, 16936930, Penulis Pertama UTHM - First Author, http://dx.doi.org/10.12928/telkomnika.v19i1.16276 | |
Journal Article : KEYWORD INDEXING AND SEARCHING TOOL (KIST): A TOOL TO ASSIST THE FORENSICS ANALYSIS OF WHATSAPP CHAT 2020, 23565462, Penulis Pertama UTHM - First Author, http://socj.telkomuniversity.ac.id/ojs/index.php/ijoict/index | |
Journal Article : A FORENSIC ANALYSIS VISUALIZATION TOOL FOR MOBILE INSTANT MESSAGING APPS 2020, 23565462, Penulis Pertama UTHM - First Author, http://socj.telkomuniversity.ac.id/ojs/index.php/ijoict/article/view/530 | |
Journal Article : AN EVIDENCE-BASED FORENSIC TAXONOMY OF WINDOWS PHONE DATING APPS 2019, 00221198, Penulis Pertama UTHM - First Author, https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.13820 | |
Journal Article : ANALYZING THE BARRIER TO OPEN GOVERNMENT DATA (OGD) IN INDONESIA 2019, 22783091, Penulis Bersama - Co-Author, http://www.warse.org/IJATCSE/static/pdf/file/ijatcse2681.32019.pdf | |
Journal Article : A DIGITAL EVIDENCE TAXONOMY OF M-HEALTH APPS IN IOT ENVIRONMENT 2019, 22773878, Penulis Pertama UTHM - First Author, https://www.ijrte.org/wp-content/uploads/papers/v7i6s2/F10440476S219.pdf | |
Journal Article : E-RASER: FILE SHREDDER APPLICATION WITH CONTENT REPLACEMENT BY USING RANDOM WORDS FUNCTION 2018, 25499610, Penulis Utama - Corresponding Author, 10.30630/joiv.2.4-2.175 | |
Journal Article : A VISUALIZATION APPROACH TO ANALYSE ANDROID SMARTPHONE DATA 2018, 25499610, Penulis Utama - Corresponding Author, 10.30630/joiv.2.3-2.137 | |
Journal Article : AN EVIDENCE-BASED FORENSIC TAXONOMY OF WINDOWS PHONE COMMUNICATION APPS 2018, 00221198, Penulis Pertama UTHM - First Author, 10.1111/1556-4029.13624 | |
Journal Article : A STUDY OF CAESAR CIPHER AND TRANSPOSITION CIPHER IN JAWI MESSAGES 2018, 19366612, Penyunting, Tiada | |
Journal Article : A DIGITAL IMAGE WATERMARKING SYSTEM: AN APPLICATION OF DUAL LAYER WATERMARKING TECHNIQUE 2017, 25499610, Penulis Utama - Corresponding Author, http://joiv.org/index.php/joiv/article/view/78 | |
Journal Article : THE ROLE OF MOBILE FORENSICS IN TERRORISM INVESTIGATIONS INVOLVING THE USE OF CLOUD STORAGE SERVICE AND COMMUNICATION APPS 2017, 13834691, Penulis Bersama - Co-Author, 10.1007/s11036-016-0791-8 | |
Journal Article : CLOUD INCIDENT HANDLING AND FORENSIC-BY-DESIGN: CLOUD STORAGE AS A CASE STUDY 2017, 15320626, Penulis Utama - Corresponding Author, 10.1002/cpe.3868 | |
Journal Article : FORENSIC-BY-DESIGN FRAMEWORK FOR CYBER-PHYSICAL CLOUD SYSTEMS 2016, 23256095, Penulis Utama - Corresponding Author, 10.1109/MCC.2016.5 | |
Journal Article : A SURVEY OF INFORMATION SECURITY INCIDENT HANDLING IN THE CLOUD 2015, 0167-4048, Penulis Utama - Corresponding Author, 10.1016/j.cose.2014.11.006 | |
Book Chapter : EMERGING TRENDS IN INFORMATION SECURITY APPLICATION 2022, 9789670061382, Penulis Dalam Bab, Tiada | |
Book Chapter : EMERGING TRENDS IN INFORMATION SECURITY APPLICATION SERIES 3 2019, 9789672306641, Penulis Dalam Bab, Tiada | |
Book Chapter : EMERGING TRENDS IN INFORMATION SECURITY APPLICATION SERIES 1 2017, 9789670764948, Penulis Dalam Bab, Tiada | |
Book Chapter : EMERGING TRENDS IN INFORMATION SECURITY APPLICATION SERIES 1 2017, 9789670764948, Penulis Dalam Bab, Tiada | |
Book Chapter : EMERGING TRENDS IN INFORMATION SECURITY APPLICATION SERIES 1 2017, 9789670764948, Penulis Dalam Bab, Tiada | |
Book Chapter : EMERGING TRENDS IN INFORMATION SECURITY APPLICATION
SERIES 1
2017, 9789670764948, Penulis Dalam Bab, Tiada | |
Book Chapter : COMPUTATIONAL INTELLIGENCE APPLICATIONS SERIES 1 2017, 9789672110606, Penulis Dalam Bab, Tiada | |
Book Chapter : CONTEMPORARY DIGITAL FORENSIC INVESTIGATIONS OF CLOUD AND MOBILE APPLICATIONS 2016, 9780128054482, Penulis Dalam Bab, https://www.elsevier.com/books/contemporary-digital-forensic-investigations-of-cloud-and-mobile-applications/choo/978-0-12-805303-4 | |
Book Chapter : CLOUD SECURITY ECOSYSTEM 2015, 978-0-12-801595-7, Penulis Dalam Bab, http://www.sciencedirect.com/science/book/9780128015957 | |
Book : EMERGING TRENDS IN INFORMATION SECURITY APPLICATION SERIES 3 2019, 9789672306641, Penulis Utama - Corresponding Author, Tiada | |
Book : EMERGING TRENDS IN INFORMATION SECURITY APPLICATION SERIES 1 2017, 978960764948, Penulis Bersama - Co-Author, Tiada | |
Conference / Seminar : ECO GROCER ONLINE ORDERING SYSTEM WITH DATA RETENTION POLICY | |
Conference / Seminar : TIKAS: KINDERGARTEN ATTENDANCE APPLICATION WITH ROLE-BASED ACCESS CONTROL FOR TADIKA INOVASI KREATIF | |
Conference / Seminar : TCNSYST: A KINDERGARTEN INFORMATION MANAGEMENT SYSTEM FOR TADIKA CAHAYA NURANI WITH DATA ANONYMIZATION | |
Conference / Seminar : E-EVIDENCENOTES: AN IMPLEMENTATION OF ONLINE DIGITAL EVIDENCE TAKING NOTES TOOL WITH DATA RETENTION | |
Conference / Seminar : EDQUIZY: A DEVELOPMENT OF A QUIZ MOBILE APPLICATION WITH ANTI-CHEATING FEATURES | |
Conference / Seminar : INVESTIGATING THE ADVANCED PERSISTENT THREAT (APT) NETWORK TRAFFICS USING A STATISTICAL ANALYSIS APPROACH | |
Conference / Seminar : M-HEALTH DIGITAL EVIDENCE TAXONOMY SYSTEM (MDETS): ENABLING DIGITAL FORENSICS READINESS WITH KNOWLEDGE SHARING APPROACH | |
Conference / Seminar : A COMPARATIVE ANALYSIS OF RESIDUAL DATA BETWEEN PRIVATE BROWSING AND NORMAL BROWSING USING LIVE MEMORY ACQUISITION | |
Conference / Seminar : A COMPARATIVE ANALYSIS OF POTENTIAL DIGITAL EVIDENCE IN WHATSAPP WEB-BASED AND MOBILE-BASED APPLICATION | |
Conference / Seminar : MYATTEND: A DEVELOPMENT OF MOBILE-BASED ATTENDANCE SYSTEM WITH ANONYMIZATION APPROACH TO PRESERVE LOCATION PRIVACY | |
Conference / Seminar : A COMPARATIVE STUDY BETWEEN DEEP LEARNING ALGORITHM AND BAYESIAN NETWORK ON ADVANCED PERSISTENT THREAT(APT) ATTACK DETECTION. | |
Conference / Seminar : AN AUTHENTICATION OF CARPOOLING APPS USING OTP AND FINGERPRINT | |
Conference / Seminar : RESTAURANT O SIX JOINT ONLINE ORDERING SYSTEM WITH ANTI-SQL INJECTION | |
Conference / Seminar : A MOBILE FORENSIC VISUALIZATION TOOL FOR ANDROID DATA PARTITION | |
Conference / Seminar : REDUCING DOCKER DAEMON ATTACK SURFACE USING ROOTLESS MODE | |
Conference / Seminar : IMPLEMENTING VIRTUAL MACHINE:A PERFORMANCE EVALUATION | |
Conference / Seminar : ACQUIRING RFID TAG ASYMMETRIC KEY FROM IOT CYBER PHYSICAL ENVIRONMENT | |
Conference / Seminar : EMAIL AUTHENTICATION USING SYMMETRIC AND ASYMMETRIC KEY ALGORITHM ENCRYPTION | |
Conference / Seminar : FACE RECOGNITION FOR CRIMINAL IDENTIFICATION: AN IMPLEMENTATION OF PRINCIPAL COMPONENT ANALYSIS FOR FACE RECOGNITION | |
Conference / Seminar : ANDROID MALWARE CLASSIFICATION USING K-MEANS CLUSTERING ALGORITHM | |
Conference / Seminar : AUDIO STEGANOGRAPHY WITH EMBEDDED TEXT | |
Conference / Seminar : IMAGE SIZE VARIATION INFLUENCE ON CORRUPTED AND NON-VIEWABLE BMP IMAGE
| |
Conference / Seminar : A CCTV SYSTEM WITH SMS ALERT (CMDSA): AN IMPLEMENTATION OF PIXEL PROCESSING ALGORITHM FOR MOTION DETECTION | |
Conference / Seminar : PRESERVING ANONYMITY IN E-VOTING SYSTEM USING VOTER NON-REPUDIATION ORIENTED SCHEME | |
Conference / Seminar : THE ROLE OF MOBILE FORENSICS IN TERRORISM INVESTIGATIONS INVOLVING THE USE OF CLOUD APPS | |
Conference / Seminar : FACTORS INFLUENCING THE ADOPTION OF CLOUD INCIDENT HANDLING STRATEGY: A PRELIMINARY STUDY IN MALAYSIA | |
General Publication : PELAJAR FSKTM ANJUR SEMINAR TINGKAT KESEDARAN KESELAMATAN SIBER 2023, -, Penulis Pertama UTHM - First Author, https://news.uthm.edu.my/ms/2023/05/pelajar-fsktm-anjur-seminar-tingkat-kesedaran-keselamatan-siber/ |