azween.myazween.my/wp-content/uploads/2018/03/azweenabdullah…  · web viewrtcse 2017 authors :...

35
Azween Bin Abdullah Fellow of the British Computer Society [email protected]/ [email protected] CONTACT INFORMATION Skype Id: azween.abdullah LINKS TO ACADEMIC PUBLICATIONS SCOPUS: h-index-13, No. of Publications - 110 Google Scholar: h-index: 18, No. of Publications - 160 Research Gate: https://www.researchgate.net/profile/Azween_Abdullah Google Scholar: http://scholar.google.com/citations? user=8qTHZ6cAAAAJ&hl=en RESEARCH SPECIALIZATION Machine Learning and Cyber Security, Software Engineering, Secure Software Systems, Big Data and IoT Security Analytics, Mobile and Wireless Security. ACADEMIC AND PROFESSIONAL QUALIFICATIONS AND DEVELOPMENT Higher Qualifications PhD in Information Technology (Cybersecurity) – Unitar International University, Malaysia . Thesis Title: Improving Feature Preprocessing and Classification Accuracy in Intrusion Detection Using an Ensemble Approach. Master of Software Engineering – University Malaya, Malaysia (1999). Thesis Title: Hybrid Convergence Analysis Model for Large Scale Software Projects. B.Sc Computer Science – University of Southern California, USA (1985). Professional Education 1. Certified Machine Learning Expert - 2017 2. Stanford University – Stanford Advanced Computer Security Certificate - 2016 1

Upload: others

Post on 04-Jul-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Azween Bin AbdullahFellow of the British Computer [email protected]/ [email protected]

CONTACT INFORMATION

Skype Id: azween.abdullah

LINKS TO ACADEMIC PUBLICATIONS

SCOPUS: h-index-13, No. of Publications - 110Google Scholar: h-index: 18, No. of Publications - 160Research Gate: https://www.researchgate.net/profile/Azween_AbdullahGoogle Scholar: http://scholar.google.com/citations?user=8qTHZ6cAAAAJ&hl=en

RESEARCH SPECIALIZATION

Machine Learning and Cyber Security, Software Engineering, Secure Software Systems, Big Data and IoT Security Analytics, Mobile and Wireless Security.

ACADEMIC AND PROFESSIONAL QUALIFICATIONS AND DEVELOPMENT

Higher Qualifications

PhD in Information Technology (Cybersecurity) – Unitar International University, Malaysia .Thesis Title: Improving Feature Preprocessing and Classification Accuracy in Intrusion Detection Using an Ensemble Approach.

Master of Software Engineering – University Malaya, Malaysia (1999).Thesis Title: Hybrid Convergence Analysis Model for Large Scale Software Projects.

B.Sc Computer Science – University of Southern California, USA (1985). Professional Education

1. Certified Machine Learning Expert - 20172. Stanford University – Stanford Advanced Computer Security Certificate - 20163. MIT Data Science: Data to Insights"- October 2016 – November 23 2016. 4. MIT Cybersecurity – Technology, Applications and Policy"- Jan 16 – Feb 23 2016. 5. MIT Tackling the Challenges of Big Data"- Nov 4 – Dec 16 2014. 6. Big Data Analytics – Data Science (2-4 March 2016)

1

Page 2: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

EMPLOYMENT HISTORY

Summary of Employment History:Academic Experience – 29 years

Industry and Consultancy Experience – 17 years

1. Malaysian University of Science and Technology September 2011-Current

Adjunct Research Professor of Cybersecurity

2. Kaapagam Technologies Sdn. Bhd. January 2012– Current

Adjunct Senior Security Consultant

3. Taylors University May 2013 – Current

Senior Academic/Researcher

4. City University of Science and Technology Feb 2012- September 2012

Visiting Professor of Software Engineering

5. Petronas Bhd and University Teknologi Petronas Oct 2005-August 2011

Associate Professor of Computer ScienceDirector of Innovative Research CenterDirector – Strategic IT Research (Intelligent Cities/Systems and Cybersecurity)

Head – Center for Cyber SecuritySeni Senior Manager – Research Grant Specialist

6. Binary University May 2003 – September 2005

Dean of School of Information Technology (Consultancy)

7. Monash University Malaysia 1998 – 2003Senior Lecturer

8. HELP University 1989 – 1998Senior Lecturer

9. International Business Machines (IBM), USA 1986 – 1989Systems Engineer

2

Page 3: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

IT CONSULTANCY PROJECTS

1.

2.

National Contributions (Malaysia)- 11th Malaysian Plan- Cybersecurity Framework Development for Public Sector, 2016-

2020- ICP Strategy Document (ISD) for National Cyber Security- National Cyber Security Framework- National Cryptography Framework- Technical Committee Member, Cyber Security Global ACE

RIMA Education GroupConsultant

2014-2016

2013

3. Institute Bank MalaysiaLearning Management System

2012

4. Cybersecurity MalaysiaQuantum Information Security for Critical IT Infrastructure

2011

5. Government of MalaysiaNational IT R&D Roadmap

2010

6. CyEduLabChief Security Officer/VP (IT Services, Security Consultancy)

2004-2007

FUNDED PROJECTS

Current Projects

1. Taylors University Flagship Project -1st October 2017 – 30th September 2020 -RM255,000CRIMETNET: A Framework for Graphical Visualization of Criminal and Terrorist Networks using extreme learning and predictive modeling

Completed Projects

a) E-Science, Ministry of Science Technology and Innovation, Malaysia

1. Biologically Inspired protocols for Securing Hybrid Mobile Ad Hoc Networks – RM81, 160 – Completed October 2009.

2. Biologically Inspired Middleware for Self-Healing Ubiquitous Systems – RM95,245 – Completed October 2009.

3. Nature Inspired Intrusion Prevention and Self-Healing System for Critical Services Technology Infrastructure – Awarded February 2010.

b) Short Term Internal research Fund – University Technology Petronas- Completed April 2009

1. Biologically Inspired Self-healing Software Systems Architecture – Completed December 2008, RM16,500.

3

Page 4: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

2. Underwater Acoustic Sensor Network Cross-layer MAC Protocol with Data Packet Length Optimization – Completed December 2009, RM25,000.

c) Petroleum Research Fund – PETRONAS

1. Virtual Solar Cell- RM7,000,000

d) Ministry of Higher Education, Malaysia

1. FRGS - (Ref: FRGS/1/2014/SG04/TAYLOR/02/1)Properties and Estimation of the parameters of Second Order Generalized Autoregressive Moving Average (GARMA) Models – July 2014 – June 2016 – RM82,200 -Co-Researcher.

2. FRGS - (Ref: FRGS/1/2014/ICT04/MUST/01/1)Immunosecurity: Theoretical and Algorithmic Extraction and Combination of the Dendritic Cell Mechanism with Statistical Modeling for Improving Cyber Intrusion Detection - July 2014 – June 2016 – RM71,200 – Co-Researcher.

3. FRGS – Predictive Analytic Theory Generation and Foundation for a Novel Bio-Inspired Intrusion Prevention and Self-Regeneration System for Cyber Defense – November 2013 – RM73,000 – Principal Investigator.

4. FRGS – Foundations for a Novel Bio-Inspired Intrusion Prevention and Self Healing System for Advanced Network Services – Awarded March 2013 – RM65,000 - Principal Investigator.

5. FRGS – Foundation for a Self-Organizing Services-Oriented Architecture in Computational Engineering and Bioinformatics Research – Awarded March 2010 – RM40,000 – Principal Investigator.

6. Cradle Investment Programme – Collaborative Clinical Diagnostic Ecosystem in a Cloud – October 2010 – RM150,000 – Principal Investigator.

e). Taylors University Research Grant Scheme – Determining the properties of Generalized Autoregressive Moving Average (GARMA (2,1:&,1)) and its application in cyber-attack prediction – June 2014-May 2015 – RM19,000 – Co-Researcher.

INTERNATIONAL GRANTS

1. Project Title: Proposing Secured & Reliable Wireless Sensor Network (WSN) Based System for Critical Pipeline Infrastructure (120127)Name of Funding Agency: Deanship of Research King Faisal University, Saudi Arabia Project Duration: 18 months Start Date: February 2011 End Date: August 2012

2. Project Title:  An Improved Software Development Process for Small and Medium Software Development Enterprises (140151)Name of Funding Agency: Deanship of Research King Faisal University, Saudi Arabia Project Duration: 12 months Start Date: February 2013End Date: February 2014

4

Page 5: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

PATENTS

1. Method and System for Semantic Based Service Discovery – PI 2010001422

2. Autonomic, Self-Organizing Service Oriented Architecture – PI 2010001429

3. HOP-by-HOP Dynamic Addressing Routing Protocol – PI 2010001424

4. Application of Neural Network in Intrusion Detection and Performance Evaluation – PI 2010001426

5. Immune Inspired Protocol For Securing Mobile Ad Hoc Networks – PI 2010 001402

6. Intrusion Prevention and Self- Healing System for Network Security – PI 2010001430

7. Collaborative Medical Diagnostic and Decision Making in a Cloud - PI 2010004661

POSTGRADUATE SUPERVISION (GRADUATED)

1 Balreen Badesha In ProgressMaster in Computer Science

-

2 Lim Teng Soon In ProgressPhD in Computer Science

-

3 Kok Sim Hoong In ProgressPhD in Computer Science

-

4 Ilangovan Perumal In Progress PhD in IT -

5 Noreen Kausar Hybrid Approach of Clustered-SVM for Rational Clinical Features in Early Diagnosis of Heart Disease

PhD in Informatics 2015

6 Hafiz Muhammad Imran

Hybrid Soft Computing Approach for Intrusion Detection System

PhD in Informatics 2014

7 Muhammad Agni Catur Bhakti

Autonomic Computing Approach Towards  Autonomic  and Intelligent Service Oriented Architecture

PhD in IT 2011

8 Asfandyar Khan Energy Efficient Cluster Based Architecture Design for Wireless Sensor Network PhD in IT 2011

9 Iftikhar Ahmed Optimized Intrusion Detection Mechanism Using Soft Computing Techniques PhD in IT 2011

10 Muna Elsadig Mohamed Ahmed

Biological Inspired Intrusion Prevention and Self healing system for Critical Services Network PhD in IT 2011

11 Mahamat Issa Hassan

Semantic-Based, Scalable, Decentralized, and Dynamic Resource Discovery for Internet-Based Distributed System.

PhD in IT 2010

12 Hamada Rasheed Hassan Al Abshi Biologically Inspired Object Recognition System. MSc in IT 2010

13 Yasir Adbelgadir Mohamad

Biologically Inspired Protocol for Securing A Class of Networks. PhD in IT 2010

14 Ashraf Ahmed Fadelelmoula

A Comprehensive Replication Strategy for Improving Availability and Maintaining Consistency

PhD in IT 2009

5

Page 6: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

In Large Scale Mobile Distributed Database System.15 Aiman Moyaid A New Scheme for Extracting Association Rule. MSc in IT 2009

16 Oumar Abderaman Mahamad

Bio-inspired Mechanism for Securing Distributed Networked Component Based Software. MSc in IT 2009

17 Maythem Kamal Abbas

Formal Specification Language for Vehicular Ad-Hoc Networks. MSc in IT 2009

18 Intan Najua Binti Kamal Nasir

Security Specification Language for Distributed Health Information System. MSc in IT 2009

19 Mazin Elhadi Biologically Inspired Self-Healing Software System Architecture. MSc in IT 2008

20 Abdelmajid Oumer Alhussein Musmar

An Object Oriented Approach for Business Process Re-engineering. MSc in IT 2008

21 Muhammad Agni catur Bhakti

Authentication Mechanism for Ad Hoc Wireless Local Area Network. MSc in IT 2008

22 Irving Putra Paputungan Recovery Model for Survivable System. MSc in IT 2008

23 DickyEkklesia Semantically Integrated e-Learning Interoperability Agent. MSc in IT 2008

UNDERGRADUATE FINAL YEAR PROJECT SUPERVISION (LAST FIVE YEARS)

1

Chee Zhong WeiHo Tze HonKenneth Koe Ee PingLim Kuan Wei

Micro Malware Generator

Bachelor,Computer Security and Forensic (Hons 2017

2Lakshana Bunghoo, Sandip SinghDaryl Goh

Enhancing Privacy and Confidentiality in Google Chrome

Bachelor,Computer Security and Forensic (Hons)

2017

3

Yew Nuo HanLam Wai KiatLeonard Stuart Madinda

Site Authentication and Validation Toolkit For Soho Network

Bachelor,Computer Security and Forensic (Hons) 2016

4

Neoh Weng HongCecilia Marie Ling BeradorQurrata Ayuni Nasution Saifuddin

NoteFORensics

Bachelor,Computer Security and Forensic (Hons) 2016

5Kok Chee ChungChung Yih ChyiChin Wai Kit

Modifying NicTool for recording telephony-based addressing in DNS

Bachelor,Computer Security and Forensic (Hons)

2016

6

Sara Phan Kay Lyn,Praveen s/o Raja,Mukesh Vijaian,Nazirul Amirin Bin Hamzah

Enhancing Intrusion Detection System with Prediction Module for DDOS and R2L Attacks

Bachelor,Computer Security and Forensic (Hons) 2016

7 Tan Kuan SengNetwork Intrusion Detection - Evasion Technique (Fragmentation, Encryption, DDOS)

Bachelor,Computer Security and Forensic (Hons)

2015

8 Rico Ong Yu JiunnNetwork Intrusion Detection - Evasion Technique (Fragmentation, Encryption, DDOS)

Bachelor,Computer Security and Forensic (Hons)

2015

6

Page 7: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

9 Sean Yap Fu XianNetwork Intrusion Detection - Evasion Technique (Fragmentation, Encryption, DDOS)

Bachelor,Computer Security and Forensic (Hons)

2015

10 Chin Yung Zhen Malicious hyperlink detection systemBachelor,Computer Security and Forensic (Hons)

2015

11 Tan Wun Shing Malicious hyperlink detection systemBachelor,Computer Security and Forensic (Hons)

2015

12 Saravaneshwaran Raja

MITMA: Wireless Intrusion Detection System on Mobile Network for Man-in-the Middle-Attack Using Evil Twin.

Bachelor,Computer Security and Forensic (Hons)

2014

13 Khanna Kamalanathan

DDosDetect: Wireless Intrusion Detection System on Mobile Application to Detect DDos Attack.

Bachelor,Computer Security and Forensic (Hons) 2014

14 Mohalila Jubli EavesdropAlert: Mobile Application WIDS to Detect Eavesdropping Attack.

Bachelor,Computer Security and Forensic (Hons)

2014

15 Jaspreet Singh Johl Intrusion Forecasting System (GARMA 1,2:D1,1)

Bachelor,Computer Security and Forensic (Hons) 2014

16 Loke Ken Yue Intrusion Forecasting System (GARMA 1,1: D1,D2)

Bachelor,Computer Security and Forensic (Hons) 2014

SUBJECTS TAUGHT (Last 8 years)

12.

Forensic Computing PracticeIntrusion Detection System

2014-20172014-2017

3. Computer Security and Forensic Tools 2013-20144. Security in Computing and IT 20135. Health Informatics and Medical Computing 2006-20116. Software Architecture and Patterns 2006-20097. Software Testing and Reliability 2006-20088. Computer Security 2006, 2007, 20119.10.11.

Modeling and Simulation for Computer based SystemsSoftware ProcessSoftware Design

2011- 20122013-20162013-2017

POSTGRADUATE EXAMINER

Loay Faisal Ibrahim – PhD in Computational Engineering – 2016 – International Islamic University.

7

Page 8: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Omar Zakaria - PhD in Computational Engineering – 2015 – International Islamic University

Abba Sulaiman Abubakar – MSc in Information Technology – Prototype Mobile Learning System to Enhance Collaboration and nEvaluation in Postgraduate Research – 2015 - Malaysian University of Science and Technology.

Kadar Abdillahi Barreh – PhD in Informatics – A Framework for Mobile Learning for the Enhancement of Learning in Higher Education – 2015 – Malaysian University of Science and Technology.

Bui Ngoc Dung – PhD in Informatics – Model Free Analysis of Single and Multiple fMRI Time series based on spatial synchronization – 2015 - Malaysian University of Science and Technology.

Kashif Munir – PhD in Informatics – A Framework for Securing Cloud Computing – 2014 – Malaysian University of Science and Technology.

Shayla Islam - Enhanced Nemo Protocol to Achieve Seamless Handoff, International Islamic University, Malaysia – Master Thesis examiner 2012.

N. Kaliammal – Anna University, Coimbatore, India, 2012 – “Certain Investigations for Robust Multicast Routing and Wavelength Assignment Protocol with Dynamic Traffic Grooming in WDM Networks.

Azana Hafizah Bt Mohd Aman – An enhanced Scheme for Context Transfer in Mobile Multicast, International Islamic University, Malaysia – Master Thesis examiner -2011.

Hatem F.H.Ibrahim – Alternative Transmission Approach for Improved Monitoring Model, International Islamic University, Malaysia – Master Thesis examiner 2011.

International Islamic University, Pakistan - External PhD Thesis Examiner - Aneel Rahim - Secure Data Dissemination Scheme For Vehicular Ad-Hoc Network – July 2011.

Deepthi Ratnayake, London Metropolitan University, UK – External Examiner - 2011

S. Manikandan – Anna University, Chennai, India, 2009 – “Some investigations on feature extraction and image retrieval system for ultra sound kidney image database”.

V. Parthasarathy – Anna University, Chennai, India, 2009 – “Theoretical Analysis of Bulk Flow TCP and FPGA implementation of optical router controller”.

HELP University College, Program Examiner - 2008

INTERNAL THESIS EXAMINER

Handaru Jati – PhD, 2010 – Evaluation method for Asian Website Quality: An Hybrid Approach – Universiti Teknologi Petronas.

Kashif Nisar – PhD, 2011 – A Voice Priority Queue Scheduler and Algorithm for VoIP over WLAN Networks - Universiti Teknologi Petronas..

CONFERENCE/JOURNAL PAPER REVIEWER

Editorial Board Member - Asia-Pacific Journal of Neural Networks and Its Applications, 2016.Springer, Wireless Communications – “Consistent Replicated Mobile Data Broadcasting for Read-Write Mobile Clients (CRMB)" , Impact Factor: 1.055 – October 2014 – Reviewer.

8

Page 9: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Technical Committee – 2nd International Conference on Intelligent Network and Computing August 3-4 2013, Dubai UAE.Program Committee - 12th EANN / 7th AIAI Joint Conferences: 15 - 18 September 2011, Corfu, GreeceTechnical Committee Member - International Engineering and Technology Education Conference (IETEC'11), MalaysiaTechnical Committee Member - International Symposium on Information Technology 2008 (ITSim08)Technical Committee Member – International Arab Journal of Information TechnologyTechnical Committee Member – IEEE Symposium on Industrial Electronics and Applications (ISIEA2010)Technical Committee Member – International Conference on Computer and Communication Engineering (ICCCE'2010)Technical Committee Member - International Conference on Science and Social Research (ITSim2010)ITSim08 Conference – Technical Committee Member , 2009NPC 2009 – Technical Committee Member, 2008Biological Procedures Online – Journal Reviewer, 2008International Arab Journal of Computer Science – Journal Reviewer 2010Technical Program Committee - IEEE Symposium on Industrial Electronics and Applications (ISIEA2009), Kuala Lumpur, MalaysiaScience AlertPapers reviewed:

"A Robust Delineation Approach of Electrocardiographic P Waves""A SuFET Based Transducer as a Bases for a Sixth and Further Feeling""Combined Switched Beamforming and Cell-Site Diversity for Rain Fading Mitigation in LMDS

Networks"

UNIVERSITY ADMINISTRATION

Member – Undergraduate Program Review Committee - School of Computing and IT, Taylors University – 2015 – 2016.Member – Research Advisory Committee – School of Computing and IT, Taylors University – 2013 – Current.Committee Member – Industry Advisory Panel for Research, Taylors University (2014)Member of Postgraduate Admission CommitteeSenior Manager – Research Grant Specialist and Quality AssuranceChairman – Journal Task Force and Special SubjectsMission-Oriented Research (Intelligent Cities) - DirectorMember of Research Proposal Evaluation CommitteeMember of UTP Research Strategic CommitteeMember of University Transformation Task Force – Research PerformanceVisiting Professor CoordinatorCommittee Member on University IP PolicyTask Force Member on New Course DevelopmentReviewer for National Postgraduate SymposiumTask Force Member, Research Methodology Class for Fresh PG Students

EXTERNAL CONTRIBUTIONS

Conducted several external and internal grant writing workshops for academic in public and private institutions.Member of International Editorial Advisory Board for International Journal of Latest Technology in Engineering, Management & Applied Science ISSN 2278-2540.Conducted Research Workshop on writing a winning FRGS Research Proposal – SEGI University – 2016.

9

Page 10: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Special Advisor to MUST President on Overseas Recruitment and Admissions.Member of Cybersecurity Malaysia – National R&D Masterplan 2010-2015.Program Committee – ASCOTE 2011, Corfu, Greece, Sep 15, 2011 - Sep 18, 2011 Program Committee Chairs- The 3rd IEEE International Conference on Privacy, Security, Risks and Trust, MIT, Boston, USA, October 9-11 2011.Editorial Board Member – International Journal of Applied Mathematics and Information Science (Impact factor 0.64)Keynote Speaker – International Conference on Mathematics and Information Science(ICMIS 2011), Cairo, Egypt, September 8-13 2011.Guest Editor- Journal of Computers - Special Issue on Intelligent Cities and SystemsPhD External Thesis Examiner – Anna University of Technology , Coimbatore, India, N.Kaliammal, ”Certain Investigations for Robust Multicast Routing and Wavelength Assignment Protocol with Dynamic Traffic Grooming in WDM Networks, June 2011Program Committee – ASCOTE 2011, Corfu, Greece, Sep 15, 2011 - Sep 18, 2011 Program Committee Chairs- The 3rd IEEE International Conference on Privacy, Security, Risks and Trust, MIT, Boston, USA, October 9-11 2011.Editorial Board Member – International Journal of Applied Mathematics and Information Science (Impact factor 0.64)Keynote Speaker – International Conference on Mathematics and Information Science(ICMIS 2011), Cairo, Egypt, September 8-13 2011.Guest Editor- Journal of Computers - Special Issue on Intelligent Cities and SystemsAssociate Editor-in-chief – International Journal of Computer Science and SecurityEditorial Board Member - International Journal of Advance Research in Computing (IJARC),Editorial Board Member – Journal of Engineering Science and Technology (JESTEC)Editorial Board Member – International Journal of Computer Science and Emerging Technology (IJCSET)Reviewer – International Journal of Electronics

AWARDS

UTP Quality Day 2010 – Outstanding Performance AwardUTP Quality Day 2010 – Researcher of the Year 2010UTP Quality Day 2010 – Publications AwardUTP Quality Day 2010 – 5 Quality Principles Practitioner AwardUTP Quality Day 2009 – Researcher of the Year 2009UTP Quality Day 2009 – Publications Award 2009UTP Quality Day 2009 – Effective Education Delivery Award 2009UTP Quality Day 2008 – UTP Most Outstanding Researcher 200839th International Exhibition of Inventions, New Techniques and Products in Geneva, Switzerland 2011 – 2 Silver Awards.

PROFESSIONAL AFFILIATION/MEMBERSHIP

Fellow of the British Computer Society – 2010 onwardsIEEE, Member, 2010-2012, (International) Senior Member, International Association of Computer Science and Information Technology (IACSIT) - Member NO: 80339307 – 2010 onwards Association of Computing Machinery – 2009 onwardsInternational Association of Engineers (IAENG) – 2009 onwardsThe Society for Modeling and Simulation – 2009 onwardsMalaysian National Computer Confederation – 2008-2011American Mathematical Society – 2007-2008IEEE Computer Society – 2006-2007

10

Page 11: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

LIST OF PUBLICATIONS

2017JOURNAL

Azween Abdullah, Ramachandran Ponnan, “Modeling State Dependency in Agent Based Systems”, British Journal of Applied Science & Technology, ISSN: 2231-0843,Vol.: 19, Issue.: 5 pp 1-7.

http://www.journalrepository.org/media/journals/BJAST_5/2017/Mar/Abdullah1952017BJAST31759.pdf

Ramachandran Ponnan and Azween Bin Abdullah, Technology Acceptance Theory and Its Modeling of Advertising: Traditional Advertising or Mobile Advertising, , British Journal of Applied Science & Technology, 20(3): 1-16, 2017; Article no.BJAST.32898, ISSN: 2231-0843, NLM ID: 101664541

Shayla Islam, Aisha-Hassan A. Hashim, Mohammad Hadi Habaebi, Azween Abdullah, Mohammad Kamrul Hasan (2017). A Numerical Evaluation on Multi-interfaced Fast Handoff Scheme: Impact of Rising Link Switching Delay for a High Speed Car. Advanced Science Letters. ISSN 19367317 [Scopus (Q3) indexed, Impact Factor (I.F): 0.14]. January 2017

BOOK CHAPTER

Composite Visualization Features in PEVNET: A Framework for Visualization of Criminal NetworksA Rasheed, UK Wiil, A Abdullah - Highlighting the Importance of Big Data Management and Analysis for Various Applications, pp 37-44, Springer.

CONFERENCE PROCEEDINGS

Composite Visualization Features in PEVNET: A Framework for Visualization of Criminal Networks, Proceedings of the International Symposium on Big Data Management and Analytics (BIDMA 2016), 2017, Springer. (ISI Indexed).

RTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam and Mohammad Hasan Title : Simulation Analysis for Multicast Network Mobility Management 2nd International Conference on Recent Trends in Computer Science and Electronics 02-03 January 2017

RTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam and Mohammad Hasan Title : Integration of Context Transfer and

11

Page 12: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Multicast Fast Reroute to Enhance Network Mobility Management 2nd International Conference on Recent Trends in Computer Science and Electronics 02-03 January 2017

2016JOURNAL

Azween Abdullah, Ramachandran Ponnan, “Cancer Biomarkers Classification from SELDI-TOF Mass Spectrometry for Clinical Proteomics: An Approach of Dimensionality Reduction”, British Journal of Applied Science & Technology, ISSN: 2231-0843,Vol.: 18, Issue.: 4, pp. 1-12

http://www.journalrepository.org/media/journals/BJAST_5/2017/Jan/Abdullah1842016BJAST30660_F.pdf

Noreen Kausar, Sellapan Palaniappan, Brahim Belhaouari Samir, Azween Abdullah, Nilanjan Dey, “Systematic analysis of applied data mining based optimization algorithms in clinical attribute extraction and classification for diagnosis of cardiac patients”, Applications of Intelligent Optimization in Biology and Medicine, Volume 96 of the series Intelligent Systems Reference Library, pp 217-231, 2016

Publisher: Springer International Publishing, http://link.springer.com/chapter/10.1007/978-3-319-21212-8_9

Kausar, Noreen; Abdullah, Azween; Samir, Brahim Belhaouari; Palaniappan, Sellapan; Alghamdi, Bandar Saeed; Dey, Nilanjan, “Ensemble Clustering Algorithm with Supervised Classification of Clinical Data for Early Diagnosis of Coronary Artery Disease”, Journal of Medical Imaging and Health Informatics, Volume 6, Number 1, February 2016, pp. 78-87(10)

http://www.ingentaconnect.com/content/asp/jmihi/2016/00000006/00000001/art00009

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, (2016). "Parametric Comparison of Multicast Support for Network Mobility Management: A Qualitative Analysis", International Journal of Multimedia and Ubiquitous Engineering, vol. 11(9), September 2016. [Scopus (Q3) indexed, Impact Factor (I.F): 0.23].

http://www.sersc.org/journals/IJMUE/vol11_no9_2016/21.pdfShayla Islam, Aisha-Hassan A. Hashim, Mohammad Hadi Habaebi, Azween Abdullah, Mohammad Kamrul Hasan (2016). A Numerical Evaluation on Multi-interfaced Fast Handoff Scheme: Impact of Rising Link Switching Delay for a High Speed Car. Advanced Science Letters. ISSN 19367317 [Scopus (Q3) indexed, Impact Factor (I.F): 0.14].

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, " Multicast Support in Network Based Mobility Management: Current Challenges and Solutions", Advanced Science Letters. ISSN 19367317 [Scopus (Q3) indexed, Impact Factor (I.F): 0.14].

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli " Performance Evaluation on Packet Loss Cost of an Enhanced Mobile Multicast Service in Proxy Network Mobility (Accepted)", ICCCE 2016 International Conference on Computer and Communication Engineering 2016, 25 – 27 July 2016 Kuala Lumpur Malaysia.

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, "A Novel Fast ReRoute Signaling Cost for Multicast Proxy Mobility", ICCSE2016 International Conference on Computational Science and Engineering 2016. Advanced Science Letters. ISSN 19367317 [Scopus (Q3) indexed, Impact Factor (I.F): 0.14].

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, (2016). Advance Signaling Cost for Multicast Fast Reroute Proxy Mobility Management. Indian Journal of Science and Technology (INDJST), Vol. 9 (25). [Scopus (Q2) indexed, Impact Factor (I.F): 0.27]. http://www.indjst.org/index.php/indjst/article/view/96634

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam (2016). Evaluation of an Enhanced Multicast Data Flow Technique in Network Mobility. International Journal of Future Generation Communication and Networking, pp 153-164, Vol. 9(7),

12

Page 13: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

2016, ISSN: 2233-7857. [ESCI and Scopus Indexed]. http://www.sersc.org/journals/IJFGCN/vol9_no7/15.pdf

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, " Network Simulators Parametric Comparison for Network Mobility Management ", International Journal of Security and Its Applications, Vol. x, No. x, xxxxx, 20xx. [ISI and Scopus (Q3) indexed, Impact Factor (I.F): 0.25].

Shayla Islam, Aisha-Hassan A. Hashim, Azween Abdullah, Mohammad Kamrul Hasan (2016). A Numerical Framework for the Analysis of Handoff Delay Component in Proxy NEMO Environment. International Journal of Future Generation Communication and Networking, pp 45-54, Vol. 9(8), 2016, ISSN: 2233-7857. [ESCI and Scopus Indexed]. http://www.sersc.org/journals/IJFGCN/vol9_no8/5.pdf

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, " Multicast Support in Network Based Mobility Management: Current Challenges and Solutions", Advanced Science Letters. ISSN 19367317 [Scopus (Q3) indexed, Impact Factor (I.F): 0.14]. Adv. Sci. Lett. 22, 2794–2798 (2016). A SPECIAL SECTION Selected Peer-Reviewed Articles from the 2016 International Symposium of Information and Internet Technology, (SYMINTECH 2016), Malacca, Malaysia, 26–28 January 2016, Guest Editors: Mohd Azlishah Othman, Naim Che Pee, Hamzah Asyrani Sulaiman, Mohamad Zoinol Abidin Abd Aziz, and Mohd Fairuz Iskandar Othman, Adv. Sci. Lett. 22, 2742–2744 (2016)

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli " Performance Evaluation on Packet Loss Cost of an Enhanced Mobile Multicast Service in Proxy Network Mobility", ICCCE 2016 International Conference on Computer and Communication Engineering 2016, 25 – 27 July 2016 Kuala Lumpur Malaysia.. http://irep.iium.edu.my/52420/13/52420.pdf

2015JOURNAL

AB Abdullah, LZ Cai .(2015). Improving Intrusion Detection using Genetic Linear Discriminant Analysis, International Journal of Intelligent Systems and Applications in Engineering, vol 1, issue 1, pp 34-39

AB Abdullah, TR Pillai, LZ Cai, (2015). Intrusion Detection Forecasting Using Time Series for Improving Cyber Defence, International Journal of Intelligent Systems and Applications in Engineering, vol 3, issue 1, pp 28-33.

2014JOURNAL

Alsaade, F., Zaman, N., Hassan, M. F., & Abdullah, A. (2014). An Improved Software Development Process for Small and Medium Software Development Enterprises Based on Client's Perspective. Trends in Applied Sciences Research, 9(5).

CONFERENCE PROCEEDINGS

Abdullah, A., Thulasy, R. P., Cai, L. Z., & Abaeian, V. (2014). Intrusion Detection Forcasting Using Time Series for Improving Cyber Defence. Paper presented at the International Conference on Advanced Technology & Sciences (ICAT 2014), Antalya, Turkey.

13

Page 14: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Abdullah, A., & Cia, L. Z. (2014). Improving Intrusion Detection using Genetic Linear Discriminant Analysis. Paper presented at the International Conference on Advanced Technology & Sciences (ICAT 2014), Antalya, Turkey.

Aman, M., Khan, A., Ullah, I., & Abdullah, A. (2014). Position-Based Unicast Routing Protocols for Mobile Adhoc Networks using the concept of Blacklisting. Paper presented at the 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014).

2013JOURNAL

Ahmed, I., Abdullah, A. & Quadri, M.H. (2013). On the provisioning of extending the efficiency of intrusive analysis engine through optimal feature subset selection. International Journal on Information, 16(3A), 2053-2062. (Impact Factor 0.36).

Ahmed, I., Abdullah, A. & Hussain, M. (2013). The impact of feature subset selection in MLP based intrusion detection mechanism. International Journal on Information, 16(5), 3145-3154. (Impact Factor: 0.36).

Ahmad, I., Abdullah, A., Alghamdi, A., & Hussain, M. (2013). Optimized intrusion detection mechanism using soft computing techniques. Telecommunication Systems, 52(4), 2187-2195. (Impact Factor 1.163) (ISI).

Imran, H. M., Abdullah, A., & Palaniappan, S. (2013). Towards the Low False Alarms and High Detection Rate in Intrusions Detection System.

Khan, M. A., Khan, A., Shah, S. K., & Abdullah, A. (2013). An Energy Efficient Color Based Topology Control Algorithm for Wireless Sensor Networks. Wireless Sensor Network, 5(1).

CONFERENCE

Khan, M. A., Khan, A., Shah, S. K., Abdullah, A., & Come, M. T. (2013). Scientific Research. Assessment, 4(2).

2012JOURNAL

Ayaz, M., Abdullah, A., Faye, I., & Batira, Y. (2012). An efficient dynamic addressing based routing protocol for underwater wireless sensor networks. Computer Communications, 35(4), 475-486. (ISI)

Alsaade, F., Zaman, N., Abdullah, A., & ZafarDawood, M. (2012). Enhancing Surveillance and Security of Oil Pipelines Transportation Using Wireless Sensor Network. Middle-East Journal of Scientific Research, 11(3).

Ayaz, M., Abdullah, A., & Faye, I. (2012). A Taxonomy of Routing Techniques in Underwater Wireless Sensor Networks. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 119.

Ayaz, M., Jung, L. T., Abdullah, A., & Ahmad, I. (2012). Reliable data deliveries using packet optimization in multi-hop underwater sensor networks. Journal of King Saud University-Computer and Information Sciences, 24(1), 41-48.

Jung, L. T., & Abdullah, A. (2012). Wireless Sensor Networks: Data Packet Size Optimization. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 305.

Khan, A., Abdullah, A., & Hasan, N. (2012). Event Based Data Gathering in Wireless Sensor Networks. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 445.

Mohamed, Y., & Abdullah, A. (2012). I²MANET Security Logical Specification Framework. International Arab Journal of Information Technology (IAJIT), 9(6). (ISI)

Ponnusamy, V., Abdullah, A., & Downe, A. G. (2012). Energy Efficient Routing Protocols in Wireless Sensor Networks: A Survey. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 237-261.

14

Page 15: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Zaman, N., & Abdullah, A. (2012). Energy Optimization through Position Responsive Routing Protocol (PRRP) in Wireless Sensor Network.

Zaman, N., Abdullah, A., & Ragab, K. (2012). Wireless Sensor Network: Quality of Service (QoS). Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 339.

BOOK SECTION/BOOK

Ahmed, S., Abdullah, A., & Raja, M. Y. A. (2012). Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures Networked Digital Technologies (pp. 197-207): Springer.

Zaman, N., Ragab, K., Abdullah, A., & Global, I. (2012). Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management: Information Science Reference.

2011JOURNAL

Ahmad, I., Abdullah, A., Alghamdi, A., Hussain, M., & Nafjan, K. (2011). Intrusion detection using feature subset selection based on MLP. Sci Res Essays, 6(34), 6804-6810.

Ahmad, I., Abdullah, A., Alghamdi, A. S., & Hussain, M. (2011). Distributed Denial of Service Attacks Detection Using Support Vector Machine. INFORMATION An Int. Interdisciplinary J, 14(1), 127-134. (ISI,Scopus)

Ahmad, M., Abdullah, A., Ahmad, I., & Zaman, N. (2011). An Optimized Indicator Sequence for Coding Identification in Eukaryotes. An International Interdisciplinary Jounral of Information, 14(10), 3305-3311. (ISI and Scopus)

Ahmad, M., Abdullah, A., & Buragga, K. (2011a). DNA Splicing in Eukaryotes by an Enhanced and Robust Technique. Australian Journal of Basic & Applied Sciences, 5(3).

Ahmad, M., Abdullah, A., & Buragga, K. (2011b). A novel optimized approach for gene identification in dna sequences. Journal of Applied Sciences, 11(5), 806-814.

Ahmed, A., Dominic, D. D., & Abdullah, A. (2011). A Novel Replication Strategy for Large-scale Mobile Distributed Database Systems. Science And Technology, 6(3), 268-299.

Ayaz, M., Baig, I., Abdullah, A., & Faye, I. (2011). A survey on routing techniques in underwater wireless sensor networks. Journal of Network and Computer Applications, 34(6), 1908-1927. (ISI)

Hassan, M. I., & Abdullah, A. (2011a). A new grid resource discovery framework. Int. Arab J. Inf. Technol., 8(1), 99-107. (ISI)

Iftikhar , A., & Abdullah, A. (2011). Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques. PhD, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/5710/

Mukhtar, M. A. O., Abdullah, A., & Downe, A. G. (2011). Behavior Model Mapping and Transformation using Model-Driven Architecture. World Academy of Science, Engineering and Technology, 50.

Mukhtar, M. A. O., & Abdullah, A. (2011). Mapping of Behavior Model using Model-Driven Architecture. International Journal of Computer Applications, 13, 35-39.

Shahzad, B., Al-Ohali, Y., & Abdullah, A. (2011). Trivial model for mitigation of risks in software development life cycle. International journal of the physical sciences, 6(8), 2072-2082.

Zaman, N., & Abdullah, A. (2011). Different techniques towards enhancing Wireless Sensor Network (WSN) routing energy efficiency and Quality of Service (QOS). World Applied Sci, 1(13), 798-805.

15

Page 16: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

CONFERENCE PROCEEDINGS

Ahmad, I., Abdullah, A., Alghamdi, A. S., Hussain, M., & Nafjan, K. (2011). Features subset selection for network intrusion detection mechanism using genetic eigen vectors. Paper presented at the Proceedings of International Conference on Telecommunication Technology and Applications (ICTTA 2011).

Ahmed, S., & Abdullah, A. (2011a). E-healthcare and data management services in a cloud. Paper presented at the High Capacity Optical Networks and Enabling Technologies (HONET 2011).

Ahmed, S., & Abdullah, A. (2011b). Telemedicine in a cloud—A review. Paper presented at the IEEE Symposium on Computers & Informatics (ISCI 2011).

Al-Absi, H. R., Abdullah, A., & Hassan, M. I. (2011). Soft computing in medical diagnostic applications: A short review. Paper presented at the National Postgraduate Conference (NPC 2011).

Bhakti, M. A. C., & Abdullah, A. (2011). Autonomic computing approach in service oriented architecture. Paper presented at the IEEE Symposium on Computers & Informatics (ISCI) (Scopus)

Bhakti , M. A. C., & Abdullah, A. (2011). Formal Modelling of an Autonomic Service Oriented Architecture. Paper presented at the International Conference on Computer Communication and Management (ICCCM 2011), Sydeny, Australia. http://eprints.utp.edu.my/5523/

Jung, L. T., & Abdullah, A. (2011). Underwater Acoustic Communications: Optimizing Data Packet Size With Respect to Throughput Efficiency, BER, and Energy Efficiency. Paper presented at the International Conference on Computer Communication and Management (ICCCM 2011), Sydeny, Austrelia. http://eprints.utp.edu.my/5524/

Jung, L. T., & Abdullah, A. (2011). Underwater Acoustic Communications: Relationship Between Data Packet Size, Throughput, BER, and Distance. Paper presented at the Proceedings of the Fourth Global Conference On Power Control and Optimization. (ISI)

Jung, L. T., & Abdullah, A. (2011). Underwater Wireless Network Energy Efficiency and Optimal Data Packet Size. Paper presented at the International Conference on Electrical, Control and Computer Engineering, Pahang, Malaysia. http://eprints.utp.edu.my/6335/

Mukhtar, M. A. O., Abdullah, A., & Downe, A. G. (2011). Preliminary overview about relations QVT: Query/View/Transformation model transformation language. Paper presented at the National Postgraduate Conference (NPC 2011).

Nordin, M. I., Abdullah, A., & Hassan, M. I. (2011). Goal-based request cloud resource broker in medical application. Proceedings of World Academy of Science: Engineering & Technology, 770-774.

Nordin, M. I. B., Abdullah, A., & Hassan, M. I. (2011). Goal-based cloud broker for medical informatics application: a proposed goal-based request and selection strategy. Paper presented at the International Conference on Telecommunication Technology and Applications.

Shahzad, B., Abdullah, A., & Al-Mudimigh, A. S. (2011). A probabilistic model for risk forecasting in medical informatics. Paper presented at the 10th WSEAS International Conference on Software Engineering Parallel and distributed Systems, Cambridge, UK. (Scopus)

Sivaji, A., Abdullah, A., & Downe, A. G. (2011). Usability Testing Methodology: Effectiveness of Heuristic Evaluation in E-Government Website Development. Paper presented at the Asia International Conference on Modeling & Simulation.

Sivaji, A., Downe, A. G., Mazlan, M. F., Soo, S.-T., & Abdullah, A. (2011). Importance of incorporating fundamental usability with social & trust elements for e-commerce website. Paper presented at the International Conference on Business, Engineering and Industrial Applications (ICBEIA 2011)

Zainuddin, S. A., Abdullah, A., & Downe, A. G. (2011). Social Networking Sites For Learning: A Review From Vygotskian Perspective. Proc. of CSIT, 5, 41-46.

16

Page 17: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Zaman, N., & Abdullah, A. (2011). Position Responsive Routing Protocol (PRRP). Paper presented at the 13th International Conference on Advanced Communication Technology (ICACT 2011). (Scopus)

Zaman, N., Abdullah, A., & Jung, L. T. (2011). Optimization of energy usage in wireless sensor network using Position Responsive Routing Protocol (PRRP). Paper presented at the IEEE Symposium on Computers & Informatics (ISCI 2011). (Scopus)

BOOK SECTION/BOOK

Al-Absi, H. R., Abdullah, A., Hassan, M. I., & Shaban, K. B. (2011). Hybrid intelligent system for disease diagnosis based on Artificial Neural Networks, Fuzzy Logic, and Genetic Algorithms Informatics Engineering and Information Science (pp. 128-139): Springer Berlin Heidelberg. (ISI)

Hassan, M. I., & Abdullah, A. (2011b). A Semantic Service Discovery Framework for Intergrid Software Engineering and Computer Systems (pp. 448-462): Springer. (ISI)

Kausar, N., Samir, B. B., Abdullah, A., Ahmad, I., & Hussain, M. (2011). A Review of Classification Approaches Using Support Vector Machine in Intrusion Detection Informatics Engineering and Information Science (pp. 24-34): Springer. (ISI)

Mukhtar, M. A. O., Abdullah, A., & Downe, A. G. (2011). A Proposed Compiler to Integrate Model Driven Architecture with Web Services Road Map.

Ratnayake, D. N., Kazemian, H. B., Yusuf, S. A., & Abdullah, A. (2011). An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks Engineering Applications of Neural Networks (pp. 372-381): Springer. (ISI)

2010JOURNAL

Agni, C. B. M., & Abdullah, A. (2010). An Autonomic Service Oriented Architecture in Computational Engineering Framework. Journal of Advanced in Computer Research, 1(2), 1.

Yasir Abdelgadir , M., & Abdullah, A. (2010b). BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS. PhD, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2696/

Mohamed, Y. A., & Abdullah, A. (2010). Immune-based Distributed Detection System for MANETs. IJCSIS, 8(3).

Iftikhar , A., Abdullah, A., & Abdullah , S. A. (2010a). Investigating Supervised Neural Networks to Intrusion Detection. ICIC Express Letters, 4(6), 1-6.

Iftikhar , A., Abdullah, A., & Abdullah , S. A. (2010b). Towards the Selection of Best Neural Network System for Intrusion Detection. International Journal of Physical Sciences, 5(12), 1830-1839. (ISI)

Hamada , R. H. A.-A., & Abdullah, A. (2010b). A Biology Inspired Object Recognition System. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2738/

Ahmad, M., Abdullah, A., & Burraga, K. (2010). Optimal nucleotides range estimation in diffused intron-exon noise. World Applied Sciences Journal, 11(2), 178-183.

Ahmed, A., Dominic, P., Abdullah, A., & Ibrahim, H. (2010). A New Optimistic Replication Strategy for Large-scale Mobile Distributed Database Systems. International Journal of database management systems, 2(4).

CONFERENCE PROCEEDINGS

Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010a). Applying neural network to U2R attacks. Paper presented at the IEEE Symposium on Industrial Electronics & Applications (ISIEA). (Scopus)

17

Page 18: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010a). Comparative Analysis of Intrusion Detection Approaches. Paper presented at the 12th International Conference on Computer Modelling and Simulation (UKSim 2010) (ISI and Scopus)

Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010b). Evaluating Intrusion detection Approaches using Analytic Hierarchy process.

Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010c). Evaluating neural network intrusion detection approaches using Analytic Hierarchy Process. Paper presented at the International Symposium in Information Technology (ITSim 2010) (Scopus)

Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010b). Remote to Local attack detection using supervised neural network. Paper presented at the International Conference for Internet Technology and Secured Transactions (ICITST 2010). (Scopus)

Ahmad, M., Abdullah, A., & Buragga, K. (2010). A better way for exon identification in DNA splicing. Paper presented at the IEEE EMBS Conference on Biomedical Engineering and Sciences.

Al-Absi, H. R., & Abdullah, A. B. (2010). Biologically inspired object recognition system. Paper presented at the International Symposium in Information Technology (ITSim 2010). (Scopus)

Asfandyar , k., & Abdullah, A. (2010). Climate Control and Monitoring with Wireless Sensor Network: A Case Study. Paper presented at the International Symposium on Information Technology (ITSim 2010), Kuala Lumpur. http://eprints.utp.edu.my/988/

Ayaz, M., Abdullah, A., & Faye, I. (2010). Hop-by-hop reliable data deliveries for underwater wireless sensor networks. Paper presented at the International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010)

Ayaz, M., Abdullah, A., & Jung, L. T. (2010). Temporary cluster based routing for Underwater Wireless Sensor Networks. Paper presented at the International Symposium in Information Technology (ITSim 2010).

Bhakti, M. A. C., & Abdullah, A. (2010a). Design of an autonomic services oriented architecture. Paper presented at the International Symposium in Information Technology (ITSim 2010). (Scopus)

Bhakti, M. A. C., & Abdullah, A. (2010b). Towards an autonomic Service Oriented Architecture in computational engineering framework. Paper presented at the 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA 2010) Kuala Lumpur, Malaysia, 10-13 May 2010. (Scopus)

Bhakti, M. A. C., Abdullah, A., & Jung, L. T. (2010). Autonomic, self-organizing service-Oriented Architecture in service ecosystem. Paper presented at the 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST). (Scopus)

Elsadig, M., Abdullah, A., & Samir, B. B. (2010a). Immune multi agent system for intrusion prevention and self healing system implement a non-linear classification. Paper presented at the International Symposium in Information Technology (ITSim 2010).

Elsadig, M., Abdullah, A., & Samir, B. B. (2010b). Intrusion Prevention and self-healing algorithms inspired by danger theory. Paper presented at the The 2nd International Conference on Computer and Automation Engineering (ICCAE 2010).

Hamada , R. H. A.-A., & Abdullah, A. (2010a). Biologically Inspired Object Recognition System. Paper presented at the ITSIM'10. http://eprints.utp.edu.my/2256/

Hamzah, H. I., & Abdullah, A. (2010). A soft computing approach for the memory storage of a sound signal processor. Paper presented at the International Symposium on Information Technology (ITSim 2010).

Hassan, M. I., & Abdullah, A. (2010). Semantic-based grid resource discovery systems a literature review and taxonomy. Paper presented at the International Symposium on Information Technology (ITSim, 2010).

18

Page 19: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

I. , A., & Abdullah, A. (2010). Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique (Vol. 1, pp. 60-67): IJISCE.

M.A.C., B., & Abdullah, A. (2010). Nature-Inspired Self Organizing Service Oriented Architecture : A Proposal. Paper presented at the International Conference on Information Technology in Asia (CITA 2009), Kuching, Sarawak, Malaysia. http://eprints.utp.edu.my/732/

Mahamat Issa , H., & Abdullah, A. (2010). Semantic-Based Scalable Decentralized Resource Discovery. Paper presented at the National Post Graduate conference. http://eprints.utp.edu.my/700/

Mohamed, M. E., Samir, B. B., & Abdullah, A. (2010). Immune Multiagent System for Network Intrusion Detection use Non-linear Classification Algorithm.

Mohamed, Y., & Abdullah, A. (2010). Implementation of IDS with response for securing MANETs. Paper presented at the International Symposium in Information Technology (ITSim 2010) (Scopus)

Mohamed, Y. A., & Abdullah, A. (2010). Novel immune-based framework for securing ad hoc networks. Paper presented at the Proceedings of the 2010 ACM Symposium on Applied Computing. (Scopus)

Muhammad, A., & Azween, A. (2010). Dynamic Cluster Based Routing for Underwater Wireless Sensor Networks. Paper presented at the International Symposium on Information Technology (ITSim 2010), Kuala Lumpur. http://eprints.utp.edu.my/1023/

Muna, E., & Abdullah, A. (2010a). Biological Intrusion Prevention and Self-Healing Model for Network Security. Paper presented at the International Conference on Computer and Network Technology. http://eprints.utp.edu.my/2591/

Muna, E., & Abdullah, A. (2010b). Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security. Paper presented at the National Post Graduate conference, UTP. http://eprints.utp.edu.my/2257/

Noor , Z., & Abdullah, A. (2010). Energy Efficient Routing in Wireless Sensor Network : Research Issues and Challenges. Paper presented at the International Conference on Intelligence and Information Technology, United Kingdom. http://eprints.utp.edu.my/2695/

Ponnusamy, V., & Abdullah, A. (2010a). A bio-inspired framework for wireless sensor network using mobile sensors. Paper presented at the International Conference for Internet Technology and Secured Transactions (ICITST 2010)

Ponnusamy , V., & Abdullah, A. (2010). A Biologically Based Self-Healing Wireless Sensor Network. Paper presented at the The 4th Global Conference on Power Control and Optimization, Kuching, Sarawak Malaysia. http://eprints.utp.edu.my/3196/

Ponnusamy, V., & Abdullah, A. (2010b). Biologically Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network. Paper presented at the Sixth International Conference on Intelligent Environments (IE 2010)

Vasaki , P., & Abdullah, A. (2010). Biologically-Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network. Paper presented at the Sixth International Conference on Intelligent Environments, K.L, MALAYSIA. http://eprints.utp.edu.my/2504/

Yasir Abdelgadir , M., & Abdullah, A. (2010a). Biologically Inspired Model for Securing Mobile Ad Hoc Networks. Paper presented at the International Symposium on Information Technology (ITSim 2008), Kuala Lumpur. http://eprints.utp.edu.my/688/

BOOK SECTION/BOOK

Ahmad, I., Abdullah, A., & Abdullah , S. A. (2010). Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks Advances in Computer Science and Information Technology (Vol. 6059, pp. 597-602): SpringerLink.

THESIS

19

Page 20: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Hamada , R. H. A.-A., & Abdullah, A. (2010). A Biology Inspired Object Recognition System. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2738/

Hassan, M. I., & Abdullah, A. (2010). Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System. PhD, Universiti Teknologi PETRONAS. Retrieved from http://eprints.utp.edu.my/3344/

Yasir Abdelgadir , M., & Abdullah, A. (2010). BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS. PhD, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2696/

2009JOURNAL

Mahamat Issa , H., & Abdullah, A. (2009b). A Semantic Description and Registration Framework for Large Grid Resource Discovery Systems. Computer science letters, 1(1).

Maythem Kamal , A., & Abdullah, A. (2009a). Formal Specification Language for Vehicular Ad-Hoc Networks. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2697/

Mohamed, Y., & Abdullah, A. (2009). Immune Inspired Approach for Securing Wireless Ad hoc Networks. International Journal of Computer Science and Security (IJCSNS), 9(7), 206-212.

Paputungan, I., & Abdullah, A. (2009). Survivable System by Critical Service Recovery Model: Single Service Analysis. International Arab Journal of Information Technology (IAJIT), 6(4). (ISI)

Said, A. M., Dominic, P., & Abdullah, A. (2009). A comparative study of FP-growth variations. International Journal of Computer Science and Network Security, 9(5), 266-272.

Hikmat, A., & Abdullah, A. (2009). The Impact of Overclocking the CPU to the Genetic Algorithm. IJCSNS, 9(5), 175.

Khan, A., Abdullah, A., & Hasan, N. (2009). Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method. International Journal of Computer Science and Security (IJCSS), 3(6), 583.

Elsadig, M., & Abdullah, A. (2009). Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory. International Journal of Video & Image Processing & Network Security, 9(9).

Fadelelmoula, A. A., Dominic, P., Abdullah, A., & Ibrahim, H. (2009). A binary replication strategy for large-scale mobile environments. Int. J. Comp. Sci. Secu, 3, 83-104.

Abdullah, A. (2009). Survivability Using Adaptive Reconfigurable Systems. IJCSNS, 9(1), 95.

Abdullah, A., Candrawati, R., & Bhakti, M. A. C. (2009). Multi-Tiered Bio-Inspired Self-Healing Architectural Paradigm for Software Systems. Jurnal Teknologi Maklumat dan Multimedia, 6, 1-24.

CONFERENCE PROCEEDINGS

Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2009). Application of artificial neural network in detection of DOS attacks. Paper presented at the Proceedings of the 2nd international conference on Security of information and networks. (Scopus)

Ahmad, I., Abdullah, A. B., & Alghamdi, A. S. (2009). Application of artificial neural network in detection of probing attacks. Paper presented at the IEEE Symposium on Industrial Electronics & Applications (ISIEA). (Scopus)

Ayaz, M., & Abdullah, A. (2009a). Hop-by-Hop Dynamic Addressing Based (H2-DAB) for Underwater Wireless Sensor Networks. Paper presented at the International Conference on Mobile Wireless and Optical Communications (MWOC 2009), Korea.

20

Page 21: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Ayaz, M., & Abdullah, A. (2009b). Hop-by-hop dynamic addressing based (H2-DAB) routing protocol for underwater wireless sensor networks. Paper presented at the International Conference on Information and Multimedia Technology (ICIMT2009). (ISI)

Ayaz, M., & Abdullah, A. (2009c). Underwater wireless sensor networks: routing issues and future challenges. Paper presented at the Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia.

Bhakti, M. A. C., & Abdullah, A. B. (2009). Towards self-organizing service oriented architecture. Paper presented at the Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009). (ISI and Scopus)

Candrawati, R., & Abdullah, A. (2009). Proposed methods for self-regeneration system. Paper presented at the Student Conference on Research and Development.

Hammuzamer , I., & Abdullah, A. (2009a). Biologically-Inspired Modeling of Filtering Noise in Signal Sound. Paper presented at the 6th International Conference on Information Technology in Asia (CITA’09) UNIMAS, Indonesia. http://eprints.utp.edu.my/758/

Hammuzamer, I., & Abdullah, A. (2009). A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer. Paper presented at the The Seventh International Conference on Robotic, Vision, Signal Processing, & Power Applications (RoViSP 2009), Langkawi, Kedah, MALAYSIA. http://eprints.utp.edu.my/764/

Hammuzamer , I., & Abdullah, A. (2009b). A Proposed Model of Biologically-Inspired Sound Signal Analyzer. Paper presented at the International Conference on Software Engineering & Computer Systems (ICSECS’09), Kuantan, Malaysia. http://eprints.utp.edu.my/762/

Hammuzamer Irwan , H., & Abdullah, A. (2009). Biologically-Inspired Abstraction Model to Analyze Sound Signal. Paper presented at the Student Conference on Research and Development (SCOReD 2009), UPM Serdang, Malaysia. http://eprints.utp.edu.my/869/

Hamzah, H., & Abdullah, A. (2009). A proposed biologically-inspired model to analyze signal sound. Paper presented at the IEEE International Conference on Control and Automation (ICCA 2009) (ISI)

Hamzah, H. I., & Abdullah, A. (2009). Biologically inspired analysis of filtering noise, proceedings of the 2nd national postgraduate conference (NPC 2009). Universiti Teknologi PETRONAS, Malaysia.

Hamzah, H. I., & Abdullah, A. (2009). A new abstraction model for biologically-inspired sound signal analyzer. Paper presented at the IEEE Symposium on Industrial Electronics & Applications.

Khan, A., Abdullah, A., & Rahman, A. U. (2009). Data delivery optimization by efficient cluster head selection of wireless sensor network. Paper presented at the 5th International Colloquium on Signal Processing & Its Applications (CSPA 2009). (ISI and Scopus)

Mahamat Issa , H., & Abdullah, A. (2009a). Semantic-Based Scalable Decentralized Grid Resource Discovery. Paper presented at the The 2009 International Joint Conferences on e-CASE and e-Technology, Grand Copthorne Waterfront Hotel, Singapore. http://eprints.utp.edu.my/699/

Maythem Kamal , A., & Abdullah, A. (2009b). Vehicles Speed Control via VANET. Paper presented at the ICMU2009, K.L, MALAYSIA. http://eprints.utp.edu.my/958/

Mohamed, Y. A., & Abdullah, A. (2009a). Immune-inspired framework for securing hybrid MANET. Paper presented at the IEEE Symposium on Industrial Electronics & Applications (ISIEA 2009). (Scopus)

Mohamed, Y. A., & Abdullah, A. (2009b). Immune inspired framework for ad hoc network security. Paper presented at the IEEE International Conference on Control and Automation (ICCA 2009). (Scopus)

Mohamed, Y. A., & Abdullah, A. (2009c). Securing mobile ad hoc domain by immune-inspired mechanism. Paper presented at the IEEE Region 10 Conference (TENCON 2009). (ISI and Scopus)

21

Page 22: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Yasir Abdelgadir , M., & Abdullah, A. (2009a). Immune Inspired Framework for Ad Hoc Network Security. Paper presented at the 7th IEEE International Conference on Control & Automation (ICCA 2009), Christchurch, New Zealand. http://eprints.utp.edu.my/2267/ (ISI)

Yasir Abdelgadir , M., & Abdullah, A. (2009b). Immunology Inspired Framework for Securing MANETs. Paper presented at the International Conference on Software Engineering & Computer Systems (ICSECS’09), Kuantan, Malaysia. http://eprints.utp.edu.my/685/

BOOK SECTION/BOOK

Agni, M., Bhakti, C., & Abdullah, A. (2009). Towards A Nature Inspired Self Organizing Service Oriented Architecture.

Ahmad, i., Azween, A., & Alghamdi, A. (2009). Artificial Neural Network Approaches to Intrusion Detection: A Review. In I. Ahmad, A. Azween & A. Alghamdi (Eds.), Telecomminications and Informatics (pp. 200-205). Department of Computer Information Sciences, Universiti Teknologi, PETRONAS, Malaysia,: World Scientific and Engineering Academy and Society (WSEAS) Stevens Point, Wisconsin, USA. (ISI)

Al-Absi, H. R., & Abdullah, A. B. (2009). A Proposed Biologically Inspired Model for Object Recognition Visual Informatics: Bridging Research and Practice (pp. 213-222): Springer. (ISI and Scopus)

THESIS

Ashraf Ahmed , F., & Azween, A. (2009). A Comprehensive Replication Strategy for Improving Availability and Maintaining Consistency in Large-Scale Mobile Distributed Database Systems. PhD, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/5709/

Maythem Kamal , A., & Abdullah, A. (2009). Formal Specification Language for Vehicular Ad-Hoc Networks. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2697/

2008JOURNAL

Abdullah, A. (2008). Legacy Model Reconfiguration Using Graph-Theoretic. International Journal of Computer Science and Network Security (IJCSNS), 8(11), 177.

Bhakti, M. A. C., Abdullah, A., Low, T. J., & Hasbullah, H. (2008). EAP authentication mechanism for Ad Hoc wireless LAN. Jurnal Teknologi Maklumat dan Multimedia, 5, 13-40.

Mohamed, Y., & Abdullah, A. (2008). Security Mechanism for MANETs. Journal of Engineering and Science Technology, 231-242. (Scopus)

CONFERENCE

Abdelgadir, Y., & Abdullah, A. (2008). Biologically inspired model for securing hybrid mobile ad hoc networks. Paper presented at the International Symposium on Information Technology (ITSim 2008). (ISI and Scopus)

Ahmed, A., Abdullah, A., & Dominic, P. (2008). A multi-agent based replication strategy for improving availability and maintaining consistency of data in large scale mobile traffic control environments. Paper presented at the International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET 2008). (ISI)

Asfandyar, k., Imran, M., & Abdullah, A. (2008). Energy Efficient Technique for Cluster Head Selection and Data gathering in Wireless Sensor Network. Paper presented at the International Conference on Information & Communication Technologies, Pakistan. http://eprints.utp.edu.my/738/

22

Page 23: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Bhakti, M., Abdullah, A., & Jung, L. T. (2008). Simulation of EAP method selection and negotiation mechanism. Paper presented at the International Symposium on Information Technology (ITSim 2008) (ISI)

Elhadi, M., & Abdullah, A. (2008). Layered biologically inspired self-healing software system architecture. Paper presented at the International Symposium on Information Technology (ITSim 2008). (ISI)

Elsadig, M., & Abdullah, A. (2008). Biological inspired approach in parallel immunology system for network security. Paper presented at the International Symposium on Information Technology (ITSim 2008) (ISI)

Hammuzamer Irwan, H., & Abdullah, A. (2008). Biologically Inspired Signal Noise Elimination Using Human Ear Model with Concurrent Algorithm. Paper presented at the Seminar Ilmiah Ilmu Komputer Nasional (Silicon 2008), Universitas Pelita Harapan Tangerang, Indonesia. http://eprints.utp.edu.my/866/

Hammuzamer Irwan , H., & Abdullah, A. (2008). Signal Noise Removal using Concurrent Algorithm. Paper presented at the Proceedings of the 4th International Conference on Information Technology and Multimedia (ICIMU’ 2008) - UNITEN, Bangi, Selangor. http://eprints.utp.edu.my/867/

Hamzah, H. I., & Abdullah, A. (2008). Signal noise removal using concurrent algorithm, proceedings of the 4th international conference on information technology and multimedia (ICIMU’2008). Universiti Tenaga Nasional, Malaysia.

Hassan, M., & Abdullah, A. (2008). Self-organizing Grid resource discovery. Paper presented at the International Symposium on Information Technology (ITSim 2008) (ISI)

Imran, M., & Abdullah, A. (2008). Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks. Paper presented at the International Conference on Science & Technology: Applications in Industry & Education (2008).

Intan Najua, K. N., Abdullah, A., & Abdullah Sani, A. R. (2008). A Language to Represent Security Policy for Multi-agency Health Information System. Paper presented at the International Graduate Conference on Engineering and Science (IGCES 2008). http://eprints.utp.edu.my/2518/

Mahamat Issa, H., & Abdullah, A. (2008). Scalable Self-Organizing Model for Grid Resource Discovery. Paper presented at the International Conference on Network Applications, Protocols and Services (NetApps 2008) http://eprints.utp.edu.my/696/

Maythem kamal, A., & Abdullah, A. (2008). Remote Mobile Nodes Service Delivery via VANET. Paper presented at the NetApps2008, Universiti Utara MALAYSIA. http://eprints.utp.edu.my/5419/ (Scopus)

Mohamed, Y., & Abdullah, A. (2008). Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks. Paper presented at the International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET 2008). (ISI)

Mohamed, Y. A., & Abdullah, A. (2008). Biologically inspired architecture for securing hybrid mobile ad hoc networks. Paper presented at the International Conference on Innovations in Information Technology (IIT 2008). (Scopus)

Muna , E., & Abdullah, A. (2008). Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security. Paper presented at the International Conference on Innovations in Information Technology 2008, Al Ain. http://eprints.utp.edu.my/5414/

Musmar, A. O., Abdullah, A., Dominic, P., & Durai, D. (2008). Object orientation with business process modeling for Successful Business Process Reengineering. Paper presented at the International Symposium onInformation Technology (ITSim 2008). (ISI and Scopus)

Paputungan, I. V., & Abdullah, A. (2008). Modelling a Survivable System through Critical Service Recovery Process. Paper presented at the Second UKSIM European Symposium on Computer Modeling and Simulation (EMS 2008)

23

Page 24: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

Yasir Abdelgadir , M., & Abdullah, A. (2008a). Immune Inspired Framework for MANETs’ Security. Paper presented at the 6th student conference on research and development (SCOReD08), Unviversity Technology MALAYSIA. http://eprints.utp.edu.my/2588/

Yasir Abdelgadir , M., & Abdullah, A. (2008b). Security Mechanism for MANETs. Paper presented at the International Conference on Network Applications, Protocols and Services (NetApps2008) Exclusive Development Center , UUM, MALAYSIA. http://eprints.utp.edu.my/2596/ (Scopus)

THESIS

Alhussein Musmar, A. O., & Azween, A. (2008). An Object Oriented Approach for Business Process Reengineering. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/5707/

M.A.C., B., & Abdullah, A. (2008). Authentication Mechanism for Ad Hoc Wireless Local Area Network. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2699/

2007

CONFERENCE PROCEEDINGS

Ahmed, I., Abdul Muhamin , N., Muhammad, I., & Abdullah, A. (2007). Statistical Based Real-Time Selective Herbicide Weed Classifier. Paper presented at the Multitopic Conference (INMIC 2007), Lahore. http://eprints.utp.edu.my/2519/ (Scopus)

Bhakti, C., Abdullah, A., & Jung, L. (2007). EAP-based authentication with EAP method selection mechanism: Simulation design. Paper presented at the 5th Student Conference on Research and Development (SCOReD 2007).

Bhakti, C., Abdullah, A., & Jung, L. T. (2007). EAP-based authentication with EAP method selection mechanism. Paper presented at the International Conference on Intelligent and Advanced Systems (ICIAS 2007)

Bhakti, M. C., Abdullah, A., & Jung, L. T. (2007). EAP-based authentication for ad hoc network. Paper presented at the Proceeding of Seminar Nasional Aplikasi Teknologi Informasi (SNATI 2007)

Paputungan, I. V., & Abdullah, A. (2007a). Specifying a Recovery Model for Survivable System. Paper presented at the 5th Student Conference on Research and Development (SCOReD 2007) (ISI)

Paputungan, I. V., & Abdullah, A. (2007b). Survivability Assessment: Modeling a Recovery Process. Paper presented at the Seminar Nasional Aplikasi Teknologi Informasi (SNATI 2007).

Paputungan, I. V., Abdullah, A., & Jung, L. (2007). Critical service recovery model for system survivability. Paper presented at the Proceedings of the 9th WSEAS international conference on Mathematical and computational methods in science and engineering. (ISI).

24

Page 25: azween.myazween.my/wp-content/uploads/2018/03/AzweenAbdullah…  · Web viewRTCSE 2017 Authors : Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd

25

en search_authors