top of page

Supervision

PhD Students

Main Supervisor

  • Name , ID Number, Status

    • Title (Year)

​

  • Hassan Chizari PC073105 (Graduated)

    • Delaunay Triangulation- Based Global and Local Coverage Measurement for Wireless Sensor (2012)

​

  • Mohammad Reza Eslaminejad PC093097 (Graduated)

    • Lifetime Improvement By Integration of Dual-Sink and Geographic Routing in WSN (2014)

​

  • Behnam Dezfouli PC093105 (Graduated)

    • Modeling, Analysis and Eliminating Collision in WSN (2014)

​

  • Ikuesan Richard Adeyemi PC113155 (Graduated)

    • A Network Based Psychographics for Insider Identification (2016)

​

  • Kamal Jadidy Aval PC103105 (Graduated)

    • Node Deployment in WSN with Requested Event Detection (2017)

​

  • Olumide Simeon Ogunnusi PC123061 (Graduated)

    • A Lightweight Mechanism for Mobile Agent Communication Confidentiality Protection in Multi Agent Systems (2017)

​

  • Arafat Mohammed Rashad Al- Dhaqm PC133036 (Graduated)

    • Structuring and Managing Database Forensic Knowledge Through Metamodeling Approach (2019)

​

  • Abdullah Elhigazi PC113160 (Graduated)

    • Intrusion Control Management Technique against Denial of Service Attacks in WLAN Infrastructure (2020)

​

  • Abdulalem Ali Mohammed Saleh PC133031 (Ongoing)

    • Metamodeling Approach for Mobile Phone Forensics

​

  • Onwuegbuzie Innocent Uzougbo PCS173037 (Ongoing)

    • A Novel SelfSanative Mechanism for Wireless Sensor Network WSN Data Breeding In The Event of A Conscious Security Attack

​

  • Ajoze Abdulraheem Zubair PCS173066 (Ongoing)

    • Convergence Based Task Scheduling for Cloud Computing

​

  • Salman Rashid PCS183037 (Ongoing)

    • Enhancing In-Network Caching by Coupling Optimal Content Placement Strategy for CCN

​

  • Muaadh Abdulfattah Hassan Alsoufi PCS183048 (Ongoing)

    • Cloud Computing Forensic

​

  • Niaz Mohammad Ramaki PCS193031 (Ongoing)

    • Digital Forensic Metamodel

​

  • Sundaz Hanif PCS203001 (Ongoing)

    • Adaptable Architecture for Searchable Encryption System for Cloud Computing

PhD Students

Co Supervisor

  • Name, Status

    • Title (Year)

​

  • Tameem Eissa (Graduated)

    • Light Weight Authentication Mechanism for Mobile Ad Hoc Networks (2012)

​

  • Mohammed Hossein Anisi (Graduated)

    • An energy-efficient region- sensitive hybrid data routing mechanism for wireless sensor networks (2012)

​

  • Salim M. Zaki (Graduated)

    • Intelligent Quorum-Based Location Service Protocol for Vehicular Ad Hoc Networks in Urban Environment (2013)

​

  • Mohamed Abd Elgabar (Graduated)

    • The Impact of Bitlocker Encryption on Windows Vista Forensics (2013)

​

  • Sara Najafzadeh (Graduated)

    • A Neighbor-Aware Broadcasting Protocol for Safety Messages on Heterogeneous Communication Range VANET (2014)

​

  • Ramin Karimi (Graduated)

    • Improved Connectivity in Geographic Routing Protocols Using Delay Tolerant Networks Scheme in VANET (2014)

​

  • Hassan Asadollahi (Graduated)

    • Energy-Balanced Schemes for Mitigating Energy Holes in Corona- Based WSN (2015)

​

  • Abdulsalam Ya’u Gital (Graduated)

    • Cloud Based Collaborative Virtual Environment Architecture for Improving Scalability and Consistency (2015)

​

  • Seyedmohsein Ghoreishi (Graduated)

    • A Novel Provably Secure Pairing Free Certificateless Authenticated Key Agreement Protocol Without Decisional Problem (2020)​

Master Students

Main Supervisor

  • Name, ID Number, Status

    • Title (Year)

​

  • Kekere Temitope Josiah MC111273 (Graduated)

    • LMethod of Preventing SQL Injection Attacks in Web Based Application (2014)

​

  • Nur Hafizah Mohd Nazari MCS163019 (Ongoing)

    • Pseudonym Generation using Palm vein for Preserving Data Privacy in Healthcare Information System

​

  • Noor Alyanis Farhaida Mohd Zainon MCS163020 (Ongoing)

    • Master and child key generation from palm vein

​

  • Muhammad Ammar Musa MCS173025 (Ongoing)

    • An Enhanced Biometric Authentication Mechanism Using Master/Child Key Technique

​

​

​

​

​

​​

Co Supervisor

  • Name, Status

    • Title (Year)

​

  • Normalia Saliman (Graduated)

    • Towards Achieving Cooperation in a Trusted MANET Community: A Friendship Mechanism Approach (2011)

​

  • Aziah Asmawi (Graduated)

    • ISQL Injections and Insider Misuse Detection Systems for DBMS (2011)

​

  • Majid Hosseini (Graduated)

    • A Novel Localization Technique for Underwater Wireless Sensor Networks (2010)

​

  • Kam Kui Lin (Graduated)

    • Wavelet Transform Based Electrocardiogra m Delineation Method and Its Application in a WebBased Telecardiology System (2019)

UTM Postgraduate Examination / VIVA

PhD

  • Role, Name of student

    • Title (Year)

​

  • Internal Examiner, Imtithal Alnour Saeed Mohammed

    • Enhanced Multi-Agent for IDs Using Reinforcement Learning (2020)

​

  • Internal Examiner, Nurfadilah Bt Ariffin

    • Classification of Ransomware Entity from Online Forum Discussion (2020)

​

  • Internal Examiner, Alrimy Bander Ali Saleh

    • An ensemble-based anomalybehavioural crypto-ransomware pre-encryption detection model (2019)

​

  • Internal Examiner, Anser Ghazzaal Ali Qurashee

    • Fusion of Design and Development Using GUI Development Tools (2019)

​

  • Internal Examiner, Mohammad Hafiz Mohamed

    • A Scalable Multi Stage Mobile Beacons - Assisted Localization Scheme for Large Scale Underwater Sensor Network (2017)

​

  • Internal Examiner, Taniza Tajuddin

    • An Identity Profiling Framework for Facebook Forensics Investigation on Smartphone (2017)

​

  • Internal Examiner, Said Khalfan Said Al-Wahaibi

    • Hacking Countermeasure Framework and Blueprint by Reverse Engineering Hacking Technique (2014)

​

  • Internal Examiner, Mohammad Hafiz Mohamed

    • A Scalable Multi Stage Mobile Beacons - Assisted Localization Scheme for Large Scale Underwater Sensor Network (2012)

Master by Research

  • Role, Name of student

    • Title (Year)

​

  • Internal Examiner, Abdulhamid Aliyu Ardo

    • A Misbehaviour Detection Scheme for Effectively Detecting False Decision in VANET (2016)

​

  • Internal Examiner, Maryam Pouryazdanpanah

    • Multi-Sink Vector Based Routing Protocol for Underwater Wireless Sensor Networks (2013)

​

  • Internal Examiner, Wan Mohd Yaakob

    • Colour Constancy Feature Detection and Matching Technique for WLAN/Camera Indoor Positioning Systems (2013)

​

  • Internal Examiner, Lim Kah Seng

    • Developing a Knowledge-based Graphical Password Anti- Shoulder Surfing Mechanism for Mobile Device (2012)

​

  • Internal Examiner, Oon Erixno

    • Dynamic Timeslot Allocation Technique for Wireless Sensor Network (2012)

​

  • Internal Examiner, Marjan Moradi

    • A Reverse Localization Scheme for Underwater Acoustic Sensor Networks (2012)

​

  • Internal Examiner, Said Khalfan Said Al-Wahaibi

    • Hacking Countermeasure Framework and Blueprint by Reverse Engineering Hacking Technique (2014)

​

  • Internal Examiner, Mohammad Hafiz Mohamed

    • A Scalable Multi Stage Mobile Beacons - Assisted Localization Scheme for Large Scale Underwater Sensor Network (2012)

External Postgraduate Examination / VIVA

PhD

  • Role, Name of student

    • Title (Year)

​

  • External Examiner, Ahmed Shiraz Memon (University of Iceland)

    • Federated Access to Collaborative Data and Compute Infrastructures (2020)

​

  • External Examiner, Okta Nurika (UTP)

    • Comprehensive Network Card Simulation Models to Optimize Data Transmissions in Data Centre (2018)

​

  • External Examiner, Kamahazira Binti Zainal (USIM)

    • Risk concentration for context assessment (ricca) using danger theory (2018)

​

  • External Examiner, Anahita Farjamfar (UPM)

    • A Generic Smartphone Forensic Investigation Process Model (2016)

​

  • External Examiner, Yusoof Mohammed Hasheem (UTHM)

    • Mobile Forensic Triage for Damage Phones using M-Triage (2016)

​

  • External Examiner, Yuus Yusoff (UNITEN)

    • Ascertaining the Trustworthiness of Digital Evidence Based on Hadith Authentication Methodology (2014)

​​

Master by Research

  • Role, Name of student

    • Title (Year)

​

  • External Examiner, Muhammad Thariq Bin Abdul Razak (UTHM)

    • Enabling Digital Forensic Readiness in IoT Environment Through MDETS (2020)

​

  • External Examiner, Nur Syakirah Mohd Jaafar (UTP)

    • An Enhanced Approach to Select Intrinsic Mode Functions using Empirical Mode Decomposition and Fourier Transform (2019)

​

  • External Examiner, Tengku Norsuhaila Binti T Azmi (UTHM)

    • A New Approach for JPEG Fragmentation Point Detection Using Sequential Difference By Segment (SDbS) (2018)

​

  • External Examiner, Asou Aminnezhad (UPM)

    • A Probabilistic Security Game Model to Maximize the Payoff and Return on Security Investment (2017)

​

  • External Examiner, Ahmed Nur Elmi Abdi (UTHM)

    • MP4-Karver: Carving of Corrupted MP4 Videos Using ASMD Repairing Technique (2017)

​

  • External Examiner, Dana Hasan Ahmed (UPM)

    • Distributed Defense Scheme (DDS) for Securing DNS Transactions (2017)

​

  • External Examiner, Fawwaz Zamir Mansor (UTHM)

    • Substitution-Based Approach for Linguistic Steganography using Antonym (2017)

​

  • External Examiner, Qatrunnada Abdul Rahman (UiTM)

    • Multiple Trusted Devices Authentication Scheme for Ubiquitous Computing Application (2016)

​

  • External Examiner, Mohamed Irfan (UM)

    • Dynamic Traffic Light Flow Control System Using on-Road Sensor Technology (2016)

​

  • External Examiner, Hend Muslim Jasim (UPM)

    • Image Data Operation Encoding based Signature Embedding Technique to Enhance Watermarking Performance in Image Copyright Protection (2016)

​

  • External Examiner, Maryam Savari (UM)

    • Electrical Network Frequency Based Audio Forgery Detection (2015)

​

  • External Examiner, Koo Sue Lynn (UM)

    • An Evaluation of Mobile Device Identification Using Spectral Features (2014)

​

  • External Examiner, Erfan Shaghaghi (UM)

    • Adaptive Traffic Signal Controlling System Using Vehicular Communication (2014)

​

  • External Examiner, Ali Feizollah (UM)

    • An Evaluation Study of Mobile Botnet Detection Using Machine Learning Classifiers (2013)

​

  • External Examiner, Mohammed Ibrahim (UPM)

    • Modeling Based Approach for Reconstructing Evidence of VOIP Malicious Attacks (2013)

​

  • External Examiner, Ameneh Tafreshi Motlagh (UM)

    • SNR-based Weighted Round Robin Scheduling Mechanism for WiMAX Networks (2013)

​

  • External Examiner, Jhonny (UM)

    • A Hybrid TCP Congestion Mechanism to Improve Mobile WiMAX Networks (2012)

​

  • External Examiner, Zahrol Azam Ahmad (UPM)

    • Encryption Selection Mehanism for Wireless LAN 802.11 Performance Optimization (2012)

​

  • External Examiner, Mohamed Njikam (UTeM)

    • Performance Study on Mobile Wireless Network VoIP (MWNVoIP) Using Quality of Service (2012)

​

  • External Examiner, Hamid Mohamadzadeh Esfahani Nezhad (UM)

    • Improving Deployment of Dynamic Honeypot in Intrusion Deception System by Using Passive Fingerprinting (2011)

​

  • External Examiner, Abdalla Abdel Hamed Mohamed Madani (UM)

    • Securing Mobile Messaging Using XML Key Management Specification (2010)

​

  • External Examiner, Murugan Thangavelu (UM)

    • Combating Fraud and Theft Threats at Host Level using Intrusion Prevention System (2008)

​​

bottom of page