Supervision
PhD Students
Main Supervisor
-
Name , ID Number, Status
-
Title (Year)
-
​
-
Hassan Chizari PC073105 (Graduated)
-
Delaunay Triangulation- Based Global and Local Coverage Measurement for Wireless Sensor (2012)
-
​
-
Mohammad Reza Eslaminejad PC093097 (Graduated)
-
Lifetime Improvement By Integration of Dual-Sink and Geographic Routing in WSN (2014)
-
​
-
Behnam Dezfouli PC093105 (Graduated)
-
Modeling, Analysis and Eliminating Collision in WSN (2014)
-
​
-
Ikuesan Richard Adeyemi PC113155 (Graduated)
-
A Network Based Psychographics for Insider Identification (2016)
-
​
-
Kamal Jadidy Aval PC103105 (Graduated)
-
Node Deployment in WSN with Requested Event Detection (2017)
-
​
-
Olumide Simeon Ogunnusi PC123061 (Graduated)
-
A Lightweight Mechanism for Mobile Agent Communication Confidentiality Protection in Multi Agent Systems (2017)
-
​
-
Arafat Mohammed Rashad Al- Dhaqm PC133036 (Graduated)
-
Structuring and Managing Database Forensic Knowledge Through Metamodeling Approach (2019)
-
​
-
Abdullah Elhigazi PC113160 (Graduated)
-
Intrusion Control Management Technique against Denial of Service Attacks in WLAN Infrastructure (2020)
-
​
-
Abdulalem Ali Mohammed Saleh PC133031 (Ongoing)
-
Metamodeling Approach for Mobile Phone Forensics
-
​
-
Onwuegbuzie Innocent Uzougbo PCS173037 (Ongoing)
-
A Novel SelfSanative Mechanism for Wireless Sensor Network WSN Data Breeding In The Event of A Conscious Security Attack
-
​
-
Ajoze Abdulraheem Zubair PCS173066 (Ongoing)
-
Convergence Based Task Scheduling for Cloud Computing
-
​
-
Salman Rashid PCS183037 (Ongoing)
-
Enhancing In-Network Caching by Coupling Optimal Content Placement Strategy for CCN
-
​
-
Muaadh Abdulfattah Hassan Alsoufi PCS183048 (Ongoing)
-
Cloud Computing Forensic
-
​
-
Niaz Mohammad Ramaki PCS193031 (Ongoing)
-
Digital Forensic Metamodel
-
​
-
Sundaz Hanif PCS203001 (Ongoing)
-
Adaptable Architecture for Searchable Encryption System for Cloud Computing
-
PhD Students
Co Supervisor
-
Name, Status
-
Title (Year)
-
​
-
Tameem Eissa (Graduated)
-
Light Weight Authentication Mechanism for Mobile Ad Hoc Networks (2012)
-
​
-
Mohammed Hossein Anisi (Graduated)
-
An energy-efficient region- sensitive hybrid data routing mechanism for wireless sensor networks (2012)
-
​
-
Salim M. Zaki (Graduated)
-
Intelligent Quorum-Based Location Service Protocol for Vehicular Ad Hoc Networks in Urban Environment (2013)
-
​
-
Mohamed Abd Elgabar (Graduated)
-
The Impact of Bitlocker Encryption on Windows Vista Forensics (2013)
-
​
-
Sara Najafzadeh (Graduated)
-
A Neighbor-Aware Broadcasting Protocol for Safety Messages on Heterogeneous Communication Range VANET (2014)
-
​
-
Ramin Karimi (Graduated)
-
Improved Connectivity in Geographic Routing Protocols Using Delay Tolerant Networks Scheme in VANET (2014)
-
​
-
Hassan Asadollahi (Graduated)
-
Energy-Balanced Schemes for Mitigating Energy Holes in Corona- Based WSN (2015)
-
​
-
Abdulsalam Ya’u Gital (Graduated)
-
Cloud Based Collaborative Virtual Environment Architecture for Improving Scalability and Consistency (2015)
-
​
-
Seyedmohsein Ghoreishi (Graduated)
-
A Novel Provably Secure Pairing Free Certificateless Authenticated Key Agreement Protocol Without Decisional Problem (2020)​
-
Master Students
Main Supervisor
-
Name, ID Number, Status
-
Title (Year)
-
​
-
Kekere Temitope Josiah MC111273 (Graduated)
-
LMethod of Preventing SQL Injection Attacks in Web Based Application (2014)
-
​
-
Nur Hafizah Mohd Nazari MCS163019 (Ongoing)
-
Pseudonym Generation using Palm vein for Preserving Data Privacy in Healthcare Information System
-
​
-
Noor Alyanis Farhaida Mohd Zainon MCS163020 (Ongoing)
-
Master and child key generation from palm vein
-
​
-
Muhammad Ammar Musa MCS173025 (Ongoing)
-
An Enhanced Biometric Authentication Mechanism Using Master/Child Key Technique
-
​
​
​
​
​
​​
Co Supervisor
-
Name, Status
-
Title (Year)
-
​
-
Normalia Saliman (Graduated)
-
Towards Achieving Cooperation in a Trusted MANET Community: A Friendship Mechanism Approach (2011)
-
​
-
Aziah Asmawi (Graduated)
-
ISQL Injections and Insider Misuse Detection Systems for DBMS (2011)
-
​
-
Majid Hosseini (Graduated)
-
A Novel Localization Technique for Underwater Wireless Sensor Networks (2010)
-
​
-
Kam Kui Lin (Graduated)
-
Wavelet Transform Based Electrocardiogra m Delineation Method and Its Application in a WebBased Telecardiology System (2019)
-
UTM Postgraduate Examination / VIVA
PhD
-
Role, Name of student
-
Title (Year)
-
​
-
Internal Examiner, Imtithal Alnour Saeed Mohammed
-
Enhanced Multi-Agent for IDs Using Reinforcement Learning (2020)
-
​
-
Internal Examiner, Nurfadilah Bt Ariffin
-
Classification of Ransomware Entity from Online Forum Discussion (2020)
-
​
-
Internal Examiner, Alrimy Bander Ali Saleh
-
An ensemble-based anomalybehavioural crypto-ransomware pre-encryption detection model (2019)
-
​
-
Internal Examiner, Anser Ghazzaal Ali Qurashee
-
Fusion of Design and Development Using GUI Development Tools (2019)
-
​
-
Internal Examiner, Mohammad Hafiz Mohamed
-
A Scalable Multi Stage Mobile Beacons - Assisted Localization Scheme for Large Scale Underwater Sensor Network (2017)
-
​
-
Internal Examiner, Taniza Tajuddin
-
An Identity Profiling Framework for Facebook Forensics Investigation on Smartphone (2017)
-
​
-
Internal Examiner, Said Khalfan Said Al-Wahaibi
-
Hacking Countermeasure Framework and Blueprint by Reverse Engineering Hacking Technique (2014)
-
​
-
Internal Examiner, Mohammad Hafiz Mohamed
-
A Scalable Multi Stage Mobile Beacons - Assisted Localization Scheme for Large Scale Underwater Sensor Network (2012)
-
Master by Research
-
Role, Name of student
-
Title (Year)
-
​
-
Internal Examiner, Abdulhamid Aliyu Ardo
-
A Misbehaviour Detection Scheme for Effectively Detecting False Decision in VANET (2016)
-
​
-
Internal Examiner, Maryam Pouryazdanpanah
-
Multi-Sink Vector Based Routing Protocol for Underwater Wireless Sensor Networks (2013)
-
​
-
Internal Examiner, Wan Mohd Yaakob
-
Colour Constancy Feature Detection and Matching Technique for WLAN/Camera Indoor Positioning Systems (2013)
-
​
-
Internal Examiner, Lim Kah Seng
-
Developing a Knowledge-based Graphical Password Anti- Shoulder Surfing Mechanism for Mobile Device (2012)
-
​
-
Internal Examiner, Oon Erixno
-
Dynamic Timeslot Allocation Technique for Wireless Sensor Network (2012)
-
​
-
Internal Examiner, Marjan Moradi
-
A Reverse Localization Scheme for Underwater Acoustic Sensor Networks (2012)
-
​
-
Internal Examiner, Said Khalfan Said Al-Wahaibi
-
Hacking Countermeasure Framework and Blueprint by Reverse Engineering Hacking Technique (2014)
-
​
-
Internal Examiner, Mohammad Hafiz Mohamed
-
A Scalable Multi Stage Mobile Beacons - Assisted Localization Scheme for Large Scale Underwater Sensor Network (2012)
-
External Postgraduate Examination / VIVA
PhD
-
Role, Name of student
-
Title (Year)
-
​
-
External Examiner, Ahmed Shiraz Memon (University of Iceland)
-
Federated Access to Collaborative Data and Compute Infrastructures (2020)
-
​
-
External Examiner, Okta Nurika (UTP)
-
Comprehensive Network Card Simulation Models to Optimize Data Transmissions in Data Centre (2018)
-
​
-
External Examiner, Kamahazira Binti Zainal (USIM)
-
Risk concentration for context assessment (ricca) using danger theory (2018)
-
​
-
External Examiner, Anahita Farjamfar (UPM)
-
A Generic Smartphone Forensic Investigation Process Model (2016)
-
​
-
External Examiner, Yusoof Mohammed Hasheem (UTHM)
-
Mobile Forensic Triage for Damage Phones using M-Triage (2016)
-
​
-
External Examiner, Yuus Yusoff (UNITEN)
-
Ascertaining the Trustworthiness of Digital Evidence Based on Hadith Authentication Methodology (2014)
-
​​
Master by Research
-
Role, Name of student
-
Title (Year)
-
​
-
External Examiner, Muhammad Thariq Bin Abdul Razak (UTHM)
-
Enabling Digital Forensic Readiness in IoT Environment Through MDETS (2020)
-
​
-
External Examiner, Nur Syakirah Mohd Jaafar (UTP)
-
An Enhanced Approach to Select Intrinsic Mode Functions using Empirical Mode Decomposition and Fourier Transform (2019)
-
​
-
External Examiner, Tengku Norsuhaila Binti T Azmi (UTHM)
-
A New Approach for JPEG Fragmentation Point Detection Using Sequential Difference By Segment (SDbS) (2018)
-
​
-
External Examiner, Asou Aminnezhad (UPM)
-
A Probabilistic Security Game Model to Maximize the Payoff and Return on Security Investment (2017)
-
​
-
External Examiner, Ahmed Nur Elmi Abdi (UTHM)
-
MP4-Karver: Carving of Corrupted MP4 Videos Using ASMD Repairing Technique (2017)
-
​
-
External Examiner, Dana Hasan Ahmed (UPM)
-
Distributed Defense Scheme (DDS) for Securing DNS Transactions (2017)
-
​
-
External Examiner, Fawwaz Zamir Mansor (UTHM)
-
Substitution-Based Approach for Linguistic Steganography using Antonym (2017)
-
​
-
External Examiner, Qatrunnada Abdul Rahman (UiTM)
-
Multiple Trusted Devices Authentication Scheme for Ubiquitous Computing Application (2016)
-
​
-
External Examiner, Mohamed Irfan (UM)
-
Dynamic Traffic Light Flow Control System Using on-Road Sensor Technology (2016)
-
​
-
External Examiner, Hend Muslim Jasim (UPM)
-
Image Data Operation Encoding based Signature Embedding Technique to Enhance Watermarking Performance in Image Copyright Protection (2016)
-
​
-
External Examiner, Maryam Savari (UM)
-
Electrical Network Frequency Based Audio Forgery Detection (2015)
-
​
-
External Examiner, Koo Sue Lynn (UM)
-
An Evaluation of Mobile Device Identification Using Spectral Features (2014)
-
​
-
External Examiner, Erfan Shaghaghi (UM)
-
Adaptive Traffic Signal Controlling System Using Vehicular Communication (2014)
-
​
-
External Examiner, Ali Feizollah (UM)
-
An Evaluation Study of Mobile Botnet Detection Using Machine Learning Classifiers (2013)
-
​
-
External Examiner, Mohammed Ibrahim (UPM)
-
Modeling Based Approach for Reconstructing Evidence of VOIP Malicious Attacks (2013)
-
​
-
External Examiner, Ameneh Tafreshi Motlagh (UM)
-
SNR-based Weighted Round Robin Scheduling Mechanism for WiMAX Networks (2013)
-
​
-
External Examiner, Jhonny (UM)
-
A Hybrid TCP Congestion Mechanism to Improve Mobile WiMAX Networks (2012)
-
​
-
External Examiner, Zahrol Azam Ahmad (UPM)
-
Encryption Selection Mehanism for Wireless LAN 802.11 Performance Optimization (2012)
-
​
-
External Examiner, Mohamed Njikam (UTeM)
-
Performance Study on Mobile Wireless Network VoIP (MWNVoIP) Using Quality of Service (2012)
-
​
-
External Examiner, Hamid Mohamadzadeh Esfahani Nezhad (UM)
-
Improving Deployment of Dynamic Honeypot in Intrusion Deception System by Using Passive Fingerprinting (2011)
-
​
-
External Examiner, Abdalla Abdel Hamed Mohamed Madani (UM)
-
Securing Mobile Messaging Using XML Key Management Specification (2010)
-
​
-
External Examiner, Murugan Thangavelu (UM)
-
Combating Fraud and Theft Threats at Host Level using Intrusion Prevention System (2008)
-
​​