DR AZWEEN BIN ABDULLAH

Dr Azween Bin Abdullah

Senior Lecturer

PhD in Information Technology (Cybersecurity)  – Unitar International University, Malaysia (2016)
Master of Software Engineering – University Malaya, Malaysia (1999)
B.Sc Computer Science – University of Southern California, USA (1985)

azween.abdullah@taylors.edu.my

Research Specialization
  • Machine Learning and Cyber Security
  • Software Engineering
  • Secure Software Systems
  • Big Data Security Analytics
  • Mobile and Wireless Security

Professional Education
  • Stanford University – Stanford Advanced Computer Security Certificate - 2016
  • MIT Data Science: Data to Insights"- October 2016 – November 23 2016
  • MIT Cybersecurity – Technology, Applications and Policy"- Jan 16 – Feb 23 2016
  • MIT Tackling the Challenges of Big Data"- Nov 4 – Dec 16 2014
  • Big Data Analytics – Data Science (2-4 March 2016)

IT Consultancy Projects
  • National Contributions (Malaysia) - 2014-2016
    • 11th Malaysian Plan
    • Cybersecurity Framework Development for Public Sector, 2016-2020
    • ICP Strategy Document (ISD) for National Cyber Security
    • National Cyber Security Framework
    • National Cryptography Framewor
    • Technical Committee Member, Cyber Security Global ACE
  • RIMA Education Group - 2013
    • Consultant
  • Institute Bank Malaysia - 2012
    • Learning Management System
  • Cybersecurity Malaysia - 2011
    • Quantum Information Security for Critical IT Infrastructure
  • Government of Malaysia - 2010
    • National IT R&D Roadmap
  • CyEduLab - 2004-2007
    • Chief Security Officer/VP (IT Services, Security Consultancy)

Funded Projects
  • E-Science, Ministry of Science Technology and Innovation, Malaysia
    • Biologically Inspired protocols for Securing Hybrid Mobile Ad Hoc Networks – RM81,160 – Completed October 2009
    • Biologically Inspired Middleware for Self Healing Ubiquitous Systems – RM95,245 – Completed October 2009
    • Nature Inspired Intrusion Prevention and Self-Healing System for Critical Services Technology Infrastructure – Awarded February 2010
  • Short Term Internal research Fund – University Technology Petronas- Completed April 2009
    • Biologically Inspired Self-healing Software Systems Architecture – Completed December 2008, RM16,500
    • Underwater Acoustic Sensor Network Cross-layer MAC Protocol with Data Packet Length Optimization – Completed December 2009, RM25,000
  • Petroleum Research Fund – PETRONAS
    • Virtual Solar Cell- RM7,000,000
  • Ministry of Higher Education, Malaysia
    • FRGS - (Ref: FRGS/1/2014/SG04/TAYLOR/02/1)
      Properties and Estimation of the parameters of Second Order Generalized Autoregressive Moving Average (GARMA) Models – July 2014 – June 2016 – RM82,200 -Co-Researcher.
    • FRGS - (Ref: FRGS/1/2014/ICT04/MUST/01/1)
      Immunosecurity: Theoretical and Algorithmic Extraction and Combination of the Dendritic Cell Mechanism with Statistical Modeling for Improving Cyber Intrusion Detection  - July 2014 – June 2016 – RM71,200 – Co-Researcher.
    • FRGS – Predictive Analytic Theory Generation and Foundation for a Novel Bio-Inspired Intrusion Prevention and Self-Regeneration System for Cyber Defense – November 2013 – RM73,000 – Principal Investigator.
    • FRGS – Foundations for a Novel Bio-Inspired Intrusion Prevention and Self Healing System for Advanced Network Services – Awarded March 2013 – RM65,000 - Principal Investigator.
    • FRGS – Foundation for a Self-Organizing Services-Oriented Architecture in Computational Engineering and Bioinformatics Research – Awarded March 2010 – RM40,000 – Principal Investigator.
    • Cradle Investment Programme – Collaborative Clinical Diagnostic Ecosystem in a Cloud – October 2010 – RM150,000 – Principal Investigator.
  • Taylors University Research Grant Scheme – Determining the properties of Generalized Autoregressive Moving Average (GARMA (2,1:&,1)) and its application in cyber-attack prediction – June 2014-May 2015 – RM19,000 – Co-Researcher.

International Grants
1. Project Title: Proposing Secured & Reliable Wireless Sensor Network (WSN) Based System for Critical Pipeline Infrastructure (120127)
Name of Funding Agency: Deanship of Research King Faisal University, Saudi Arabia
Project Duration: 18 months
Start Date: February 2011
End Date: August 2012

2. Project Title: An Improved Software Development Process for Small and Medium Software Development Enterprises (140151)
Name of Funding Agency: Deanship of Research King Faisal University, Saudi Arabia
Project Duration: 12 months
Start Date: February 2013
End Date: February 2014


Patents
  • Method and System for Semantic Based Service Discovery – PI 2010001422
  • Autonomic, Self-Organizing Service Oriented Architecture – PI 2010001429
  • HOP-by-HOP Dynamic Addressing Routing Protocol – PI 2010001424
  • Application of Neural Network in Intrusion Detection and Performance Evaluation – PI 2010001426
  • Immune Inspired Protocol For Securing Mobile Ad Hoc Networks – PI 2010 001402
  • Intrusion Prevention and Self- Healing System for Network Security – PI 2010001430
  • Collaborative Medical Diagnostic and Decision Making in a Cloud - PI 2010004661

POSTGRADUATE SUPERVISION (GRADUATED)
1 Noreen Kausar Hybrid Approach of Clustered-SVM for Rational Clinical Features in Early Diagnosis of Heart Disease PhD in Informatics 2015
2 Hafiz Muhammad Imran Hybrid Soft Computing Approach for Intrusion Detection System PhD in Informatics 2014
3 Muhammad Agni Catur Bhakti Autonomic Computing Approach Towards  Autonomic  and Intelligent Service Oriented Architecture PhD in IT 2011
4 Asfandyar Khan Energy Efficient Cluster Based Architecture Design for Wireless Sensor Network PhD in IT 2011
5 Iftikhar Ahmed Optimized Intrusion Detection Mechanism Using Soft Computing Techniques PhD in IT 2011
6 Muna Elsadig Mohamed Ahmed Biological Inspired Intrusion Prevention and Self healing system for Critical Services Network PhD in IT 2011
7 Mahamat Issa Hassan Semantic-Based, Scalable, Decentralized, and Dynamic Resource Discovery for Internet-Based Distributed System. PhD in IT 2010
8 Hamada Rasheed Hassan Al Abshi Biologically Inspired Object Recognition System. MSc in IT 2010
9 Yasir Adbelgadir Mohamad Biologically Inspired Protocol for Securing A Class of Networks. PhD in IT 2010
10 Ashraf Ahmed Fadelelmoula A Comprehensive Replication Strategy for Improving Availability and Maintaining Consistency In Large Scale Mobile Distributed Database System. PhD in IT 2009
11 Aiman Moyaid A New Scheme for Extracting Association Rule. MSc in IT 2009
12 Oumar Abderaman Mahamad Bio-inspired Mechanism for Securing Distributed Networked Component Based Software. MSc in IT 2009
13 Maythem Kamal Abbas Formal Specification Language for Vehicular Ad-Hoc Networks. MSc in IT 2009
14 Intan Najua Binti Kamal Nasir Security Specification Language for Distributed Health Information System. MSc in IT 2009
15 Mazin Elhadi Biologically Inspired Self-Healing Software System Architecture. MSc in IT 2008
16 Abdelmajid Oumer Alhussein Musmar An Object Oriented Approach for Business Process Re-engineering. MSc in IT 2008
17 Muhammad Agni catur Bhakti Authentication Mechanism for Ad Hoc Wireless Local Area Network. MSc in IT 2008
18 Irving Putra Paputungan Recovery Model for Survivable System. MSc in IT 2008
19 DickyEkklesia Semantically Integrated e-Learning Interoperability Agent. MSc in IT 2008
 
UNDERGRADUATE FINAL YEAR PROJECT SUPERVISION (LAST FIVE YEARS)
1 Yew Nuo Han
Lam Wai Kiat
Leonard Stuart Madinda
Site Authentication and Validation Toolkit For Soho Network Bachelor,Computer Security and Forensic (Hons) 2016
2 Neoh Weng Hong
Cecilia Marie Ling Berador
Qurrata Ayuni Nasution Saifuddin
NoteFORensics Bachelor,Computer Security and Forensic (Hons) 2016
3 Kok Chee Chung
Chung Yih Chyi
Chin Wai Kit
Modifying NicTool for recording telephony-based addressing in DNS Bachelor,Computer Security and Forensic (Hons) 2016
4 Sara Phan Kay Lyn,
Praveen s/o Raja,
Mukesh Vijaian,
Nazirul Amirin Bin Hamzah
Enhancing Intrusion Detection System with Prediction Module for DDOS and R2L Attacks
 
 
 
Bachelor,Computer Security and Forensic (Hons) 2016
5 Tan Kuan Seng Network Intrusion Detection - Evasion Technique (Fragmentation, Encryption, DDOS) Bachelor,Computer Security and Forensic (Hons) 2015
6 Rico Ong Yu Jiunn Network Intrusion Detection - Evasion Technique (Fragmentation, Encryption, DDOS) Bachelor,Computer Security and Forensic (Hons) 2015
7 Sean Yap Fu Xian Network Intrusion Detection - Evasion Technique (Fragmentation, Encryption, DDOS) Bachelor,Computer Security and Forensic (Hons) 2015
8 Chin Yung Zhen Malicious hyperlink detection system Bachelor,Computer Security and Forensic (Hons) 2015
9 Tan Wun Shing Malicious hyperlink detection system Bachelor,Computer Security and Forensic (Hons) 2015
10 Saravaneshwaran Raja MITMA: Wireless Intrusion Detection System on Mobile Network for Man-in-the Middle-Attack Using Evil Twin. Bachelor,Computer Security and Forensic (Hons) 2014

Subject Taughts
  • Forensic Computing Practice - 2014-2016
  • Intrusion Detection System - 2014-2016
  • Computer Security and Forensic Tools - 2013-2014
  • Security in Computing and IT - 2013
  • Health Informatics and Medical Computing - 2006-2011
  • Software Architecture and Patterns - 2006-2009
  • Software Testing and Reliability - 2006-2008
  • Computer Security - 2006, 2007, 2011
  • Modeling and Simulation for Computer based Systems - 2011-2012
  • Software Process - 2013-2016
  • Software Design - 2013-2016

Postgraduate Examiner
  • Loay Faisal Ibrahim – PhD in Computational Engineering – 2016 – International Islamic University.
  • Omar Zakaria - PhD in Computational Engineering – 2015 – International Islamic University
  • Abba Sulaiman Abubakar – MSc in Information Technology – Prototype Mobile Learning System to Enhance Collaboration and nEvaluation in Postgraduate Research – 2015 - Malaysian University of Science and Technology.
  • Kadar Abdillahi Barreh – PhD in Informatics – A Framework for Mobile Learning for the Enhancement of Learning in Higher Education – 2015 – Malaysian University of Science and Technology
  • Bui Ngoc Dung – PhD in Informatics – Model Free Analysis of Single and Multiple fMRI Time series based on spatial synchronization – 2015 - Malaysian University of Science and Technology.
  • Kashif Munir – PhD in Informatics – A Framework for Securing Cloud Computing – 2014 – Malaysian University of Science and Technology.
  • Shayla Islam - Enhanced Nemo Protocol to Achieve Seamless Handoff, International Islamic University, Malaysia – Master Thesis examiner 2012.
  • N. Kaliammal – Anna University, Coimbatore, India, 2012 – “Certain Investigations for Robust Multicast Routing and Wavelength Assignment Protocol with Dynamic Traffic Grooming in WDM Networks.
  • Azana Hafizah Bt Mohd Aman – An enhanced Scheme for Context Transfer in Mobile Multicast, International Islamic University, Malaysia – Master Thesis examiner -2011.
  • Hatem F.H.Ibrahim – Alternative Transmission Approach for Improved Monitoring Model, International Islamic University, Malaysia – Master Thesis examiner 2011.
  • International Islamic University, Pakistan - External PhD Thesis Examiner - Aneel Rahim - Secure Data Dissemination Scheme For Vehicular Ad-Hoc Network – July 2011.
  • Deepthi Ratnayake, London Metropolitan University, UK – External Examiner - 2011
  • S. Manikandan – Anna University, Chennai, India, 2009 – “Some investigations on feature extraction and image retrieval system for ultra sound kidney image database”.
  • V. Parthasarathy – Anna University, Chennai, India, 2009 – “Theoretical Analysis of Bulk Flow TCP and FPGA implementation of optical router controller”.
  • HELP University College, Program Examiner - 2008

Internal Thesis Examiner
  • Handaru Jati – PhD, 2010 – Evaluation method for Asian Website Quality: An Hybrid Approach – Universiti Teknologi Petronas.
  • Kashif Nisar – PhD, 2011 – A Voice Priority Queue Scheduler and Algorithm for VoIP over WLAN Networks - Universiti Teknologi Petronas

Internal Thesis Examiner
  • Editorial Board Member - Asia-Pacific Journal of Neural Networks and Its Applications, 2016. Springer, Wireless Communications – “Consistent Replicated Mobile Data Broadcasting for Read-Write Mobile Clients (CRMB)" , Impact Factor: 1.055 – October 2014 – Reviewer.
  • Technical Committee – 2nd International Conference on Intelligent Network and Computing August 3-4 2013, Dubai UAE.
  • Program Committee - 12th EANN / 7th AIAI Joint Conferences: 15 - 18 September 2011, Corfu, Greece
  • Technical Committee Member - International Engineering and Technology Education Conference (IETEC'11), Malaysia
  • Technical Committee Member - International Symposium on Information Technology 2008 (ITSim08)
  • Technical Committee Member – International Arab Journal of Information Technology
  • Technical Committee Member – IEEE Symposium on Industrial Electronics and Applications (ISIEA2010)
  • Technical Committee Member – International Conference on Computer and Communication Engineering (ICCCE'2010)
  • Technical Committee Member - International Conference on Science and Social Research (ITSim2010)
  • ITSim08 Conference – Technical Committee Member , 2009
  • NPC 2009 – Technical Committee Member, 2008
  • Biological Procedures Online – Journal Reviewer, 2008
  • International Arab Journal of Computer Science – Journal Reviewer 2010
  • Technical Program Committee - IEEE Symposium on Industrial Electronics and Applications (ISIEA2009), Kuala Lumpur, Malaysia
  • Science Alert
  • Papers reviewed:

University Administration
  • Member – Undergraduate Program Review Committee - School of Computing and IT, Taylors University – 2015 – 2016.
  • Member – Research Advisory Committee – School of Computing and IT, Taylors University – 2013 – Current.
  • Committee Member – Industry Advisory Panel for Research, Taylors University (2014)
  • Member of Postgraduate Admission Committee
  • Senior Manager – Research Grant Specialist and Quality Assurance
  • Chairman – Journal Task Force and Special Subjects
  • Mission-Oriented Research (Intelligent Cities) - Director
  • Member of Research Proposal Evaluation Committee
  • Member of UTP Research Strategic Committee
  • Member of University Transformation Task Force – Research Performance
  • Visiting Professor Coordinator
  • Committee Member on University IP Policy
  • Task Force Member on New Course Development
  • Reviewer for National Postgraduate Symposium
  • Task Force Member, Research Methodology Class for Fresh PG Students

External Contributions
  • Conducted several external and internal grant writing workshops for academic in public and private institutions.
  • Member of International Editorial Advisory Board for International Journal of Latest Technology in Engineering, Management & Applied Science ISSN 2278-2540.
  • Conducted Research Workshop on writing a winning FRGS Research Proposal – SEGI University – 2016
  • Special Advisor to MUST President on Overseas Recruitment and Admissions.
  • Member of Cybersecurity Malaysia – National R&D Masterplan 2010-2015
  • Program Committee – ASCOTE 2011, Corfu, Greece, Sep 15, 2011 - Sep 18, 2011
  • Program Committee Chairs- The 3rd IEEE International Conference on Privacy, Security, Risks and Trust, MIT, Boston, USA, October 9-11 2011.
  • Editorial Board Member – International Journal of Applied Mathematics and Information Science (Impact factor 0.64)
  • Keynote Speaker – International Conference on Mathematics and Information Science(ICMIS 2011), Cairo, Egypt, September 8-13 2011.
  • Guest Editor- Journal of Computers - Special Issue on Intelligent Cities and Systems
  • PhD External Thesis Examiner – Anna University of Technology , Coimbatore, India, N.Kaliammal, ”Certain Investigations for Robust Multicast Routing and Wavelength Assignment Protocol with Dynamic Traffic Grooming in WDM Networks, June 2011
  • Program Committee – ASCOTE 2011, Corfu, Greece, Sep 15, 2011 - Sep 18, 2011
  • Program Committee Chairs- The 3rd IEEE International Conference on Privacy, Security, Risks and Trust, MIT, Boston, USA, October 9-11 2011.
  • Editorial Board Member – International Journal of Applied Mathematics and Information Science (Impact factor 0.64)
  • Keynote Speaker – International Conference on Mathematics and Information Science(ICMIS 2011), Cairo, Egypt, September 8-13 2011.
  • Guest Editor- Journal of Computers - Special Issue on Intelligent Cities and Systems
  • Associate Editor-in-chief – International Journal of Computer Science and Security
  • Editorial Board Member - International Journal of Advance Research in Computing (IJARC)
  • Editorial Board Member – Journal of Engineering Science and Technology (JESTEC)
  • Editorial Board Member – International Journal of Computer Science and Emerging Technology (IJCSET)
  • Reviewer – International Journal of Electronics

Awards
  • UTP Quality Day 2010 – Outstanding Performance Award
  • UTP Quality Day 2010 – Researcher of the Year 2010
  • UTP Quality Day 2010 – Publications Award
  • UTP Quality Day 2010 – 5 Quality Principles Practitioner Award
  • UTP Quality Day 2009 – Researcher of the Year 2009
  • UTP Quality Day 2009 – Publications Award 2009
  • UTP Quality Day 2009 – Effective Education Delivery Award 2009
  • UTP Quality Day 2008 – UTP Most Outstanding Researcher 2008
  • 39th International Exhibition of Inventions, New Techniques and Products in Geneva, Switzerland 2011 – 2 Silver Awards

Professional Affiliation/Membership
  • Fellow of the British Computer Society – 2010 onwards
  • IEEE, Member, 2010-2012, (International)
  • Senior Member, International Association of Computer Science and Information Technology (IACSIT) - Member NO: 80339307 – 2010 onwards
  • Association of Computing Machinery – 2009 onwards
  • International Association of Engineers (IAENG) – 2009 onwards
  • The Society for Modeling and Simulation – 2009 onwards
  • Malaysian National Computer Confederation – 2008-2011
  • American Mathematical Society – 2007-2008
  • IEEE Computer Society – 2006-2007

University Administration
2017
Journal
2016
Journal
  • Azween Abdullah, Ramachandran Ponnan, “Cancer Biomarkers Classification from SELDI-TOF Mass Spectrometry for Clinical Proteomics: An Approach of Dimensionality Reduction”, British Journal of Applied Science & Technology, ISSN: 2231-0843,Vol.: 18, Issue.: 4, pp. 1-12 http://www.journalrepository.org/media/journals/BJAST_5/2017/Jan/Abdulla...
  • Noreen Kausar, Sellapan Palaniappan, Brahim Belhaouari Samir, Azween Abdullah, Nilanjan Dey, “Systematic analysis of applied data mining based optimization algorithms in clinical attribute extraction and classification for diagnosis of cardiac patients”, Applications of Intelligent Optimization in Biology and Medicine, Volume 96 of the series Intelligent Systems Reference Library, pp 217-231, 2016 Publisher: Springer International Publishing, http://link.springer.com/chapter/10.1007/978-3-319-21212-8_9
  • Kausar, Noreen; Abdullah, Azween; Samir, Brahim Belhaouari; Palaniappan, Sellapan; Alghamdi, Bandar Saeed; Dey, Nilanjan, “Ensemble Clustering Algorithm with Supervised Classification of Clinical Data for Early Diagnosis of Coronary Artery Disease”, Journal of Medical Imaging and Health Informatics, Volume 6, Number 1, February 2016, pp. 78-87(10) http://www.ingentaconnect.com/content/asp/jmihi/2016/00000006/00000001/a...
  • Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, "Parametric Comparison of Multicast Support for Network Mobility Management: A Qualitative Analysis", International Journal of Multimedia and Ubiquitous Engineering, Vol. 11, No. 9, September 2016. [Scopus (Q3) indexed, Impact Factor (I.F): 0.23].
  • Shayla Islam, Aisha-Hassan A. Hashim, Mohammad Hadi Habaebi, Azween Abdullah, Mohammad Kamrul Hasan (2016). A Numerical Evaluation on Multi-interfaced Fast Handoff Scheme: Impact of Rising Link Switching Delay for a High Speed Car. Advanced Science Letters. ISSN 19367317 [Scopus (Q3) indexed, Impact Factor (I.F): 0.14].
  • Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, " Multicast Support in Network Based Mobility Management: Current Challenges and Solutions", Advanced Science Letters. ISSN 19367317 [Scopus (Q3) indexed, Impact Factor (I.F): 0.14].
  • Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli " Performance Evaluation on Packet Loss Cost of an Enhanced Mobile Multicast Service in Proxy Network Mobility (Accepted)", ICCCE 2016 International Conference on Computer and Communication Engineering 2016, 25 – 27 July 2016 Kuala Lumpur Malaysia.
  • Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, "A Novel Fast ReRoute Signaling Cost for Multicast Proxy Mobility", ICCSE2016 International Conference on Computational Science and Engineering 2016. 28 – 30 November 2016, Kota Kinabalu, Malaysia.
  • Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, " Advance Signaling Cost for Multicast Fast Reroute Proxy Mobility Management ", Indian Journal of Science and Technology (INDJST), Vol. x, No. x, xxxxx, 20xx. [Scopus (Q1) indexed, Impact Factor (I.F): 1.3].
  • Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, " Evaluation of an Enhanced Multicast Data Flow Technique in Network Mobility", International Journal of Software Engineering and Its Applications, Vol. x, No. x, xxxxx, 20xx. [Scopus (Q4) indexed, Impact Factor (I.F): 0.2].
  • Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam, " Network Simulators Parametric Comparison for Network Mobility Management ", International Journal of Security and Its Applications, Vol. x, No. x, xxxxx, 20xx. [ISI and Scopus (Q3) indexed, Impact Factor (I.F): 0.25].
2015
Journal
  • AB Abdullah, LZ Cai .(2015). Improving Intrusion Detection using Genetic Linear Discriminant Analysis, International Journal of Intelligent Systems and Applications in Engineering, vol 1, issue 1, pp 34-39
  • AB Abdullah, TR Pillai, LZ Cai, (2015). Intrusion Detection Forecasting Using Time Series for Improving Cyber Defence, International Journal of Intelligent Systems and Applications in Engineering, vol 3, issue 1, pp 28-33.
2014
Journal
  • Alsaade, F., Zaman, N., Hassan, M. F., & Abdullah, A. (2014). An Improved Software Development Process for Small and Medium Software Development Enterprises Based on Client's Perspective. Trends in Applied Sciences Research, 9(5).
Conference Proceedings
  • Abdullah, A., Thulasy, R. P., Cai, L. Z., & Abaeian, V. (2014). Intrusion Detection Forcasting Using Time Series for Improving Cyber Defence. Paper presented at the International Conference on Advanced Technology & Sciences (ICAT 2014), Antalya, Turkey.
  • Abdullah, A., & Cia, L. Z. (2014). Improving Intrusion Detection using Genetic Linear Discriminant Analysis. Paper presented at the International Conference on Advanced Technology & Sciences (ICAT 2014), Antalya, Turkey.
  • Aman, M., Khan, A., Ullah, I., & Abdullah, A. (2014). Position-Based Unicast Routing Protocols for Mobile Adhoc Networks using the concept of Blacklisting. Paper presented at the 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014).
2013
Journal
  • Ahmed, I., Abdullah, A. & Quadri, M.H. (2013). On the provisioning of extending the efficiency of intrusive analysis engine through optimal feature subset selection. International Journal on Information, 16(3A), 2053-2062. (Impact Factor 0.36).
  • Ahmed, I., Abdullah, A. & Hussain, M. (2013). The impact of feature subset selection in MLP based intrusion detection mechanism. International Journal on Information, 16(5), 3145-3154. (Impact Factor: 0.36).
  • Ahmad, I., Abdullah, A., Alghamdi, A., & Hussain, M. (2013). Optimized intrusion detection mechanism using soft computing techniques. Telecommunication Systems, 52(4), 2187-2195. (Impact Factor 1.163) (ISI).
  • Imran, H. M., Abdullah, A., & Palaniappan, S. (2013). Towards the Low False Alarms and High Detection Rate in Intrusions Detection System.
  • Khan, M. A., Khan, A., Shah, S. K., & Abdullah, A. (2013). An Energy Efficient Color Based Topology Control Algorithm for Wireless Sensor Networks. Wireless Sensor Network, 5(1).
Conference
  • Khan, M. A., Khan, A., Shah, S. K., Abdullah, A., & Come, M. T. (2013). Scientific Research. Assessment, 4(2).
2012
Journal
  • Ayaz, M., Abdullah, A., Faye, I., & Batira, Y. (2012). An efficient dynamic addressing based routing protocol for underwater wireless sensor networks. Computer Communications, 35(4), 475-486. (ISI)
  • Alsaade, F., Zaman, N., Abdullah, A., & ZafarDawood, M. (2012). Enhancing Surveillance and Security of Oil Pipelines Transportation Using Wireless Sensor Network. Middle-East Journal of Scientific Research, 11(3)
  • Ayaz, M., Abdullah, A., & Faye, I. (2012). A Taxonomy of Routing Techniques in Underwater Wireless Sensor Networks. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 119.
  • Ayaz, M., Jung, L. T., Abdullah, A., & Ahmad, I. (2012). Reliable data deliveries using packet optimization in multi-hop underwater sensor networks. Journal of King Saud University-Computer and Information Sciences, 24(1), 41-48
  • Jung, L. T., & Abdullah, A. (2012). Wireless Sensor Networks: Data Packet Size Optimization. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 305.
  • Khan, A., Abdullah, A., & Hasan, N. (2012). Event Based Data Gathering in Wireless Sensor Networks. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 445.
  • Mohamed, Y., & Abdullah, A. (2012). I²MANET Security Logical Specification Framework. International Arab Journal of Information Technology (IAJIT), 9(6). (ISI)
  • Ponnusamy, V., Abdullah, A., & Downe, A. G. (2012). Energy Efficient Routing Protocols in Wireless Sensor Networks: A Survey. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 237-261.
  • Zaman, N., & Abdullah, A. (2012). Energy Optimization through Position Responsive Routing Protocol (PRRP) in Wireless Sensor Network.
  • Zaman, N., Abdullah, A., & Ragab, K. (2012). Wireless Sensor Network: Quality of Service (QoS). Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management, 339.
Book Section/Book
  • Ahmed, S., Abdullah, A., & Raja, M. Y. A. (2012). Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures Networked Digital Technologies (pp. 197-207): Springer.
  • Zaman, N., Ragab, K., Abdullah, A., & Global, I. (2012). Wireless Sensor Networks and Energy Efficiency: Protocols, Routing, and Management: Information Science Reference.
2011
Journal
  • Ahmad, I., Abdullah, A., Alghamdi, A., Hussain, M., & Nafjan, K. (2011). Intrusion detection using feature subset selection based on MLP. Sci Res Essays, 6(34), 6804-6810.
  • Ahmad, I., Abdullah, A., Alghamdi, A. S., & Hussain, M. (2011). Distributed Denial of Service Attacks Detection Using Support Vector Machine. INFORMATION An Int. Interdisciplinary J, 14(1), 127-134. (ISI,Scopus)
  • Ahmad, M., Abdullah, A., Ahmad, I., & Zaman, N. (2011). An Optimized Indicator Sequence for Coding Identification in Eukaryotes. An International Interdisciplinary Jounral of Information, 14(10), 3305-3311. (ISI and Scopus)
  • Ahmad, M., Abdullah, A., & Buragga, K. (2011a). DNA Splicing in Eukaryotes by an Enhanced and Robust Technique. Australian Journal of Basic & Applied Sciences, 5(3).
  • Ahmad, M., Abdullah, A., & Buragga, K. (2011b). A novel optimized approach for gene identification in dna sequences. Journal of Applied Sciences, 11(5), 806-814.
  • Ahmed, A., Dominic, D. D., & Abdullah, A. (2011). A Novel Replication Strategy for Large-scale Mobile Distributed Database Systems. Science And Technology, 6(3), 268-299.
  • Ayaz, M., Baig, I., Abdullah, A., & Faye, I. (2011). A survey on routing techniques in underwater wireless sensor networks. Journal of Network and Computer Applications, 34(6), 1908-1927. (ISI)
  • Hassan, M. I., & Abdullah, A. (2011a). A new grid resource discovery framework. Int. Arab J. Inf. Technol., 8(1), 99-107. (ISI)
  • Iftikhar , A., & Abdullah, A. (2011). Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques. PhD, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/5710/
  • Mukhtar, M. A. O., Abdullah, A., & Downe, A. G. (2011). Behavior Model Mapping and Transformation using Model-Driven Architecture. World Academy of Science, Engineering and Technology, 50.
  • Mukhtar, M. A. O., & Abdullah, A. (2011). Mapping of Behavior Model using Model-Driven Architecture. International Journal of Computer Applications, 13, 35-39.
  • Shahzad, B., Al-Ohali, Y., & Abdullah, A. (2011). Trivial model for mitigation of risks in software development life cycle. International journal of the physical sciences, 6(8), 2072-2082.
  • Zaman, N., & Abdullah, A. (2011). Different techniques towards enhancing Wireless Sensor Network (WSN) routing energy efficiency and Quality of Service (QOS). World Applied Sci, 1(13), 798-805.
Conference Proceedings
  • Ahmad, I., Abdullah, A., Alghamdi, A. S., Hussain, M., & Nafjan, K. (2011). Features subset selection for network intrusion detection mechanism using genetic eigen vectors. Paper presented at the Proceedings of International Conference on Telecommunication Technology and Applications (ICTTA 2011).
  • Ahmed, S., & Abdullah, A. (2011a). E-healthcare and data management services in a cloud. Paper presented at the High Capacity Optical Networks and Enabling Technologies (HONET 2011).
  • Ahmed, S., & Abdullah, A. (2011b). Telemedicine in a cloud—A review. Paper presented at the IEEE Symposium on Computers & Informatics (ISCI 2011).
  • Al-Absi, H. R., Abdullah, A., & Hassan, M. I. (2011). Soft computing in medical diagnostic applications: A short review. Paper presented at the National Postgraduate Conference (NPC 2011).
  • Bhakti, M. A. C., & Abdullah, A. (2011). Autonomic computing approach in service oriented architecture. Paper presented at the IEEE Symposium on Computers & Informatics (ISCI) (Scopus)
  • Bhakti , M. A. C., & Abdullah, A. (2011). Formal Modelling of an Autonomic Service Oriented Architecture. Paper presented at the International Conference on Computer Communication and Management (ICCCM 2011), Sydeny, Australia. http://eprints.utp.edu.my/5523/
  • Jung, L. T., & Abdullah, A. (2011). Underwater Acoustic Communications: Optimizing Data Packet Size With Respect to Throughput Efficiency, BER, and Energy Efficiency. Paper presented at the International Conference on Computer Communication and Management (ICCCM 2011), Sydeny, Austrelia. http://eprints.utp.edu.my/5524/
  • Jung, L. T., & Abdullah, A. (2011). Underwater Acoustic Communications: Relationship Between Data Packet Size, Throughput, BER, and Distance. Paper presented at the Proceedings of the Fourth Global Conference On Power Control and Optimization. (ISI)
  • Jung, L. T., & Abdullah, A. (2011). Underwater Wireless Network Energy Efficiency and Optimal Data Packet Size. Paper presented at the International Conference on Electrical, Control and Computer Engineering, Pahang, Malaysia. http://eprints.utp.edu.my/6335/
  • Mukhtar, M. A. O., Abdullah, A., & Downe, A. G. (2011). Preliminary overview about relations QVT: Query/View/Transformation model transformation language. Paper presented at the National Postgraduate Conference (NPC 2011).
  • Nordin, M. I., Abdullah, A., & Hassan, M. I. (2011). Goal-based request cloud resource broker in medical application. Proceedings of World Academy of Science: Engineering & Technology, 770-774.
  • Nordin, M. I. B., Abdullah, A., & Hassan, M. I. (2011). Goal-based cloud broker for medical informatics application: a proposed goal-based request and selection strategy. Paper presented at the International Conference on Telecommunication Technology and Applications.
  • Shahzad, B., Abdullah, A., & Al-Mudimigh, A. S. (2011). A probabilistic model for risk forecasting in medical informatics. Paper presented at the 10th WSEAS International Conference on Software Engineering Parallel and distributed Systems, Cambridge, UK. (Scopus)
  • Sivaji, A., Abdullah, A., & Downe, A. G. (2011). Usability Testing Methodology: Effectiveness of Heuristic Evaluation in E-Government Website Development. Paper presented at the Asia International Conference on Modeling & Simulation.
  • Sivaji, A., Downe, A. G., Mazlan, M. F., Soo, S.-T., & Abdullah, A. (2011). Importance of incorporating fundamental usability with social & trust elements for e-commerce website. Paper presented at the International Conference on Business, Engineering and Industrial Applications (ICBEIA 2011)
  • Zainuddin, S. A., Abdullah, A., & Downe, A. G. (2011). Social Networking Sites For Learning: A Review From Vygotskian Perspective. Proc. of CSIT, 5, 41-46.
  • Zaman, N., & Abdullah, A. (2011). Position Responsive Routing Protocol (PRRP). Paper presented at the 13th International Conference on Advanced Communication Technology (ICACT 2011). (Scopus)
  • Zaman, N., Abdullah, A., & Jung, L. T. (2011). Optimization of energy usage in wireless sensor network using Position Responsive Routing Protocol (PRRP). Paper presented at the IEEE Symposium on Computers & Informatics (ISCI 2011). (Scopus)
Book Section/Book
  • Al-Absi, H. R., Abdullah, A., Hassan, M. I., & Shaban, K. B. (2011). Hybrid intelligent system for disease diagnosis based on Artificial Neural Networks, Fuzzy Logic, and Genetic Algorithms Informatics Engineering and Information Science (pp. 128-139): Springer Berlin Heidelberg. (ISI)
  • Hassan, M. I., & Abdullah, A. (2011b). A Semantic Service Discovery Framework for Intergrid Software Engineering and Computer Systems (pp. 448-462): Springer. (ISI)
  • Kausar, N., Samir, B. B., Abdullah, A., Ahmad, I., & Hussain, M. (2011). A Review of Classification Approaches Using Support Vector Machine in Intrusion Detection Informatics Engineering and Information Science (pp. 24-34): Springer. (ISI)
  • Mukhtar, M. A. O., Abdullah, A., & Downe, A. G. (2011). A Proposed Compiler to Integrate Model Driven Architecture with Web Services Road Map
  • Ratnayake, D. N., Kazemian, H. B., Yusuf, S. A., & Abdullah, A. (2011). An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks Engineering Applications of Neural Networks (pp. 372-381): Springer. (ISI)
2010
Journal
  • Agni, C. B. M., & Abdullah, A. (2010). An Autonomic Service Oriented Architecture in Computational Engineering Framework. Journal of Advanced in Computer Research, 1(2), 1.
  • Yasir Abdelgadir , M., & Abdullah, A. (2010b). BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS. PhD, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2696/
  • Mohamed, Y. A., & Abdullah, A. (2010). Immune-based Distributed Detection System for MANETs. IJCSIS, 8(3).
  • Iftikhar , A., Abdullah, A., & Abdullah , S. A. (2010a). Investigating Supervised Neural Networks to Intrusion Detection. ICIC Express Letters, 4(6), 1-6.
  • Iftikhar , A., Abdullah, A., & Abdullah , S. A. (2010b). Towards the Selection of Best Neural Network System for Intrusion Detection. International Journal of Physical Sciences, 5(12), 1830-1839. (ISI)
  • Hamada , R. H. A.-A., & Abdullah, A. (2010b). A Biology Inspired Object Recognition System. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2738/
  • Ahmad, M., Abdullah, A., & Burraga, K. (2010). Optimal nucleotides range estimation in diffused intron-exon noise. World Applied Sciences Journal, 11(2), 178-183
  • Ahmed, A., Dominic, P., Abdullah, A., & Ibrahim, H. (2010). A New Optimistic Replication Strategy for Large-scale Mobile Distributed Database Systems. International Journal of database management systems, 2(4).
Conference Proceedings
  • Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010a). Applying neural network to U2R attacks. Paper presented at the IEEE Symposium on Industrial Electronics & Applications (ISIEA). (Scopus)
  • Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010a). Comparative Analysis of Intrusion Detection Approaches. Paper presented at the 12th International Conference on Computer Modelling and Simulation (UKSim 2010) (ISI and Scopus)
  • Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010b). Evaluating Intrusion detection Approaches using Analytic Hierarchy process.
  • Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010c). Evaluating neural network intrusion detection approaches using Analytic Hierarchy Process. Paper presented at the International Symposium in Information Technology (ITSim 2010) (Scopus)
  • Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2010b). Remote to Local attack detection using supervised neural network. Paper presented at the International Conference for Internet Technology and Secured Transactions (ICITST 2010). (Scopus)
  • Ahmad, M., Abdullah, A., & Buragga, K. (2010). A better way for exon identification in DNA splicing. Paper presented at the IEEE EMBS Conference on Biomedical Engineering and Sciences.
  • Al-Absi, H. R., & Abdullah, A. B. (2010). Biologically inspired object recognition system. Paper presented at the International Symposium in Information Technology (ITSim 2010). (Scopus)
  • Asfandyar , k., & Abdullah, A. (2010). Climate Control and Monitoring with Wireless Sensor Network: A Case Study. Paper presented at the International Symposium on Information Technology (ITSim 2010), Kuala Lumpur. http://eprints.utp.edu.my/988/
  • Ayaz, M., Abdullah, A., & Faye, I. (2010). Hop-by-hop reliable data deliveries for underwater wireless sensor networks. Paper presented at the International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010)
  • Ayaz, M., Abdullah, A., & Jung, L. T. (2010). Temporary cluster based routing for Underwater Wireless Sensor Networks. Paper presented at the International Symposium in Information Technology (ITSim 2010).
  • Bhakti, M. A. C., & Abdullah, A. (2010a). Design of an autonomic services oriented architecture. Paper presented at the International Symposium in Information Technology (ITSim 2010). (Scopus)
  • Bhakti, M. A. C., & Abdullah, A. (2010b). Towards an autonomic Service Oriented Architecture in computational engineering framework. Paper presented at the 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA 2010) Kuala Lumpur, Malaysia, 10-13 May 2010. (Scopus)
  • Bhakti, M. A. C., Abdullah, A., & Jung, L. T. (2010). Autonomic, self-organizing service-Oriented Architecture in service ecosystem. Paper presented at the 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST). (Scopus)
  • Elsadig, M., Abdullah, A., & Samir, B. B. (2010a). Immune multi agent system for intrusion prevention and self healing system implement a non-linear classification. Paper presented at the International Symposium in Information Technology (ITSim 2010).
  • Elsadig, M., Abdullah, A., & Samir, B. B. (2010b). Intrusion Prevention and self-healing algorithms inspired by danger theory. Paper presented at the The 2nd International Conference on Computer and Automation Engineering (ICCAE 2010).
  • Hamada , R. H. A.-A., & Abdullah, A. (2010a). Biologically Inspired Object Recognition System. Paper presented at the ITSIM'10. http://eprints.utp.edu.my/2256/
  • Hamzah, H. I., & Abdullah, A. (2010). A soft computing approach for the memory storage of a sound signal processor. Paper presented at the International Symposium on Information Technology (ITSim 2010).
  • Hassan, M. I., & Abdullah, A. (2010). Semantic-based grid resource discovery systems a literature review and taxonomy. Paper presented at the International Symposium on Information Technology (ITSim, 2010).
  • I. , A., & Abdullah, A. (2010). Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique (Vol. 1, pp. 60-67): IJISCE.
  • M.A.C., B., & Abdullah, A. (2010). Nature-Inspired Self Organizing Service Oriented Architecture : A Proposal. Paper presented at the International Conference on Information Technology in Asia (CITA 2009), Kuching, Sarawak, Malaysia. http://eprints.utp.edu.my/732/
  • Mahamat Issa , H., & Abdullah, A. (2010). Semantic-Based Scalable Decentralized Resource Discovery. Paper presented at the National Post Graduate conference. http://eprints.utp.edu.my/700/
  • Mohamed, M. E., Samir, B. B., & Abdullah, A. (2010). Immune Multiagent System for Network Intrusion Detection use Non-linear Classification Algorithm.
  • Mohamed, Y., & Abdullah, A. (2010). Implementation of IDS with response for securing MANETs. Paper presented at the International Symposium in Information Technology (ITSim 2010) (Scopus)
  • Mohamed, Y. A., & Abdullah, A. (2010). Novel immune-based framework for securing ad hoc networks. Paper presented at the Proceedings of the 2010 ACM Symposium on Applied Computing. (Scopus)
  • Muhammad, A., & Azween, A. (2010). Dynamic Cluster Based Routing for Underwater Wireless Sensor Networks. Paper presented at the International Symposium on Information Technology (ITSim 2010), Kuala Lumpur. http://eprints.utp.edu.my/1023/
  • Muna, E., & Abdullah, A. (2010a). Biological Intrusion Prevention and Self-Healing Model for Network Security. Paper presented at the International Conference on Computer and Network Technology. http://eprints.utp.edu.my/2591/
  • Muna, E., & Abdullah, A. (2010b). Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security. Paper presented at the National Post Graduate conference, UTP. http://eprints.utp.edu.my/2257/
  • Noor , Z., & Abdullah, A. (2010). Energy Efficient Routing in Wireless Sensor Network : Research Issues and Challenges. Paper presented at the International Conference on Intelligence and Information Technology, United Kingdom. http://eprints.utp.edu.my/2695/
  • Ponnusamy, V., & Abdullah, A. (2010a). A bio-inspired framework for wireless sensor network using mobile sensors. Paper presented at the International Conference for Internet Technology and Secured Transactions (ICITST 2010)
  • Ponnusamy , V., & Abdullah, A. (2010). A Biologically Based Self-Healing Wireless Sensor Network. Paper presented at the The 4th Global Conference on Power Control and Optimization, Kuching, Sarawak Malaysia. http://eprints.utp.edu.my/3196/
  • Ponnusamy, V., & Abdullah, A. (2010b). Biologically Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network. Paper presented at the Sixth International Conference on Intelligent Environments (IE 2010)
  • Vasaki , P., & Abdullah, A. (2010). Biologically-Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network. Paper presented at the Sixth International Conference on Intelligent Environments, K.L, MALAYSIA. http://eprints.utp.edu.my/2504/
  • Yasir Abdelgadir , M., & Abdullah, A. (2010a). Biologically Inspired Model for Securing Mobile Ad Hoc Networks. Paper presented at the International Symposium on Information Technology (ITSim 2008), Kuala Lumpur. http://eprints.utp.edu.my/688/
Book Section/Books
  • Ahmad, I., Abdullah, A., & Abdullah , S. A. (2010). Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks Advances in Computer Science and Information Technology (Vol. 6059, pp. 597-602): SpringerLink.
Thesis
  • Hamada , R. H. A.-A., & Abdullah, A. (2010). A Biology Inspired Object Recognition System. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2738/
  • Hassan, M. I., & Abdullah, A. (2010). Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System. PhD, Universiti Teknologi PETRONAS. Retrieved from http://eprints.utp.edu.my/3344/
  • Yasir Abdelgadir , M., & Abdullah, A. (2010). BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS. PhD, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2696/
2009
Journal
  • Mahamat Issa , H., & Abdullah, A. (2009b). A Semantic Description and Registration Framework for Large Grid Resource Discovery Systems. Computer science letters, 1(1).
  • Maythem Kamal , A., & Abdullah, A. (2009a). Formal Specification Language for Vehicular Ad-Hoc Networks. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2697/
  • Mohamed, Y., & Abdullah, A. (2009). Immune Inspired Approach for Securing Wireless Ad hoc Networks. International Journal of Computer Science and Security (IJCSNS), 9(7), 206-212.
  • Paputungan, I., & Abdullah, A. (2009). Survivable System by Critical Service Recovery Model: Single Service Analysis. International Arab Journal of Information Technology (IAJIT), 6(4). (ISI)
  • Said, A. M., Dominic, P., & Abdullah, A. (2009). A comparative study of FP-growth variations. International Journal of Computer Science and Network Security, 9(5), 266-272.
  • Hikmat, A., & Abdullah, A. (2009). The Impact of Overclocking the CPU to the Genetic Algorithm. IJCSNS, 9(5), 175.
  • Khan, A., Abdullah, A., & Hasan, N. (2009). Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method. International Journal of Computer Science and Security (IJCSS), 3(6), 583.
  • Elsadig, M., & Abdullah, A. (2009). Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory. International Journal of Video & Image Processing & Network Security, 9(9).
  • Fadelelmoula, A. A., Dominic, P., Abdullah, A., & Ibrahim, H. (2009). A binary replication strategy for large-scale mobile environments. Int. J. Comp. Sci. Secu, 3, 83-104
  • Abdullah, A. (2009). Survivability Using Adaptive Reconfigurable Systems. IJCSNS, 9(1), 95.
  • Abdullah, A., Candrawati, R., & Bhakti, M. A. C. (2009). Multi-Tiered Bio-Inspired Self-Healing Architectural Paradigm for Software Systems. Jurnal Teknologi Maklumat dan Multimedia, 6, 1-24.
Conference Proceedings
  • Ahmad, I., Abdullah, A., & Alghamdi, A. S. (2009). Application of artificial neural network in detection of DOS attacks. Paper presented at the Proceedings of the 2nd international conference on Security of information and networks. (Scopus)
  • Ahmad, I., Abdullah, A. B., & Alghamdi, A. S. (2009). Application of artificial neural network in detection of probing attacks. Paper presented at the IEEE Symposium on Industrial Electronics & Applications (ISIEA). (Scopus)
  • Ayaz, M., & Abdullah, A. (2009a). Hop-by-Hop Dynamic Addressing Based (H2-DAB) for Underwater Wireless Sensor Networks. Paper presented at the International Conference on Mobile Wireless and Optical Communications (MWOC 2009), Korea.
  • Ayaz, M., & Abdullah, A. (2009b). Hop-by-hop dynamic addressing based (H2-DAB) routing protocol for underwater wireless sensor networks. Paper presented at the International Conference on Information and Multimedia Technology (ICIMT2009). (ISI)
  • Ayaz, M., & Abdullah, A. (2009c). Underwater wireless sensor networks: routing issues and future challenges. Paper presented at the Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
  • Bhakti, M. A. C., & Abdullah, A. B. (2009). Towards self-organizing service oriented architecture. Paper presented at the Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009). (ISI and Scopus)
  • Candrawati, R., & Abdullah, A. (2009). Proposed methods for self-regeneration system. Paper presented at the Student Conference on Research and Development.
  • Hammuzamer , I., & Abdullah, A. (2009a). Biologically-Inspired Modeling of Filtering Noise in Signal Sound. Paper presented at the 6th International Conference on Information Technology in Asia (CITA’09) UNIMAS, Indonesia. http://eprints.utp.edu.my/758/
  • Hammuzamer, I., & Abdullah, A. (2009). A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer. Paper presented at the The Seventh International Conference on Robotic, Vision, Signal Processing, & Power Applications (RoViSP 2009), Langkawi, Kedah, MALAYSIA. http://eprints.utp.edu.my/764/
  • Hammuzamer , I., & Abdullah, A. (2009b). A Proposed Model of Biologically-Inspired Sound Signal Analyzer. Paper presented at the International Conference on Software Engineering & Computer Systems (ICSECS’09), Kuantan, Malaysia. http://eprints.utp.edu.my/762/
  • Hammuzamer Irwan , H., & Abdullah, A. (2009). Biologically-Inspired Abstraction Model to Analyze Sound Signal. Paper presented at the Student Conference on Research and Development (SCOReD 2009), UPM Serdang, Malaysia. http://eprints.utp.edu.my/869/
  • Hamzah, H., & Abdullah, A. (2009). A proposed biologically-inspired model to analyze signal sound. Paper presented at the IEEE International Conference on Control and Automation (ICCA 2009) (ISI)
  • Hamzah, H. I., & Abdullah, A. (2009). Biologically inspired analysis of filtering noise, proceedings of the 2nd national postgraduate conference (NPC 2009). Universiti Teknologi PETRONAS, Malaysia.
  • Hamzah, H. I., & Abdullah, A. (2009). A new abstraction model for biologically-inspired sound signal analyzer. Paper presented at the IEEE Symposium on Industrial Electronics & Applications.
  • Khan, A., Abdullah, A., & Rahman, A. U. (2009). Data delivery optimization by efficient cluster head selection of wireless sensor network. Paper presented at the 5th International Colloquium on Signal Processing & Its Applications (CSPA 2009). (ISI and Scopus)
  • Mahamat Issa , H., & Abdullah, A. (2009a). Semantic-Based Scalable Decentralized Grid Resource Discovery. Paper presented at the The 2009 International Joint Conferences on e-CASE and e-Technology, Grand Copthorne Waterfront Hotel, Singapore. http://eprints.utp.edu.my/699/
  • Maythem Kamal , A., & Abdullah, A. (2009b). Vehicles Speed Control via VANET. Paper presented at the ICMU2009, K.L, MALAYSIA. http://eprints.utp.edu.my/958/
  • Mohamed, Y. A., & Abdullah, A. (2009a). Immune-inspired framework for securing hybrid MANET. Paper presented at the IEEE Symposium on Industrial Electronics & Applications (ISIEA 2009). (Scopus)
  • Mohamed, Y. A., & Abdullah, A. (2009b). Immune inspired framework for ad hoc network security. Paper presented at the IEEE International Conference on Control and Automation (ICCA 2009). (Scopus)
  • Mohamed, Y. A., & Abdullah, A. (2009c). Securing mobile ad hoc domain by immune-inspired mechanism. Paper presented at the IEEE Region 10 Conference (TENCON 2009). (ISI and Scopus)
  • Yasir Abdelgadir , M., & Abdullah, A. (2009a). Immune Inspired Framework for Ad Hoc Network Security. Paper presented at the 7th IEEE International Conference on Control & Automation (ICCA 2009), Christchurch, New Zealand. http://eprints.utp.edu.my/2267/ (ISI)
  • Yasir Abdelgadir , M., & Abdullah, A. (2009b). Immunology Inspired Framework for Securing MANETs. Paper presented at the International Conference on Software Engineering & Computer Systems (ICSECS’09), Kuantan, Malaysia. http://eprints.utp.edu.my/685/
Book Section/Book
  • Agni, M., Bhakti, C., & Abdullah, A. (2009). Towards A Nature Inspired Self Organizing Service Oriented Architecture.
  • Ahmad, i., Azween, A., & Alghamdi, A. (2009). Artificial Neural Network Approaches to Intrusion Detection: A Review. In I. Ahmad, A. Azween & A. Alghamdi (Eds.), Telecomminications and Informatics (pp. 200-205). Department of Computer Information Sciences, Universiti Teknologi, PETRONAS, Malaysia,: World Scientific and Engineering Academy and Society (WSEAS) Stevens Point, Wisconsin, USA. (ISI)
  • Al-Absi, H. R., & Abdullah, A. B. (2009). A Proposed Biologically Inspired Model for Object Recognition Visual Informatics: Bridging Research and Practice (pp. 213-222): Springer. (ISI and Scopus)
Thesis
  • Ashraf Ahmed , F., & Azween, A. (2009). A Comprehensive Replication Strategy for Improving Availability and Maintaining Consistency in Large-Scale Mobile Distributed Database Systems. PhD, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/5709/
  • Maythem Kamal , A., & Abdullah, A. (2009). Formal Specification Language for Vehicular Ad-Hoc Networks. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2697/
2008
Journal
  • Abdullah, A. (2008). Legacy Model Reconfiguration Using Graph-Theoretic. International Journal of Computer Science and Network Security (IJCSNS), 8(11), 177.
  • Bhakti, M. A. C., Abdullah, A., Low, T. J., & Hasbullah, H. (2008). EAP authentication mechanism for Ad Hoc wireless LAN. Jurnal Teknologi Maklumat dan Multimedia, 5, 13-40
  • Mohamed, Y., & Abdullah, A. (2008). Security Mechanism for MANETs. Journal of Engineering and Science Technology, 231-242. (Scopus)
Conference
  • Abdelgadir, Y., & Abdullah, A. (2008). Biologically inspired model for securing hybrid mobile ad hoc networks. Paper presented at the International Symposium on Information Technology (ITSim 2008). (ISI and Scopus)
  • Ahmed, A., Abdullah, A., & Dominic, P. (2008). A multi-agent based replication strategy for improving availability and maintaining consistency of data in large scale mobile traffic control environments. Paper presented at the International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET 2008). (ISI)
  • Asfandyar, k., Imran, M., & Abdullah, A. (2008). Energy Efficient Technique for Cluster Head Selection and Data gathering in Wireless Sensor Network. Paper presented at the International Conference on Information & Communication Technologies, Pakistan. http://eprints.utp.edu.my/738/
  • Bhakti, M., Abdullah, A., & Jung, L. T. (2008). Simulation of EAP method selection and negotiation mechanism. Paper presented at the International Symposium on Information Technology (ITSim 2008) (ISI)
  • Elhadi, M., & Abdullah, A. (2008). Layered biologically inspired self-healing software system architecture. Paper presented at the International Symposium on Information Technology (ITSim 2008). (ISI)
  • Elsadig, M., & Abdullah, A. (2008). Biological inspired approach in parallel immunology system for network security. Paper presented at the International Symposium on Information Technology (ITSim 2008) (ISI)
  • Hammuzamer Irwan, H., & Abdullah, A. (2008). Biologically Inspired Signal Noise Elimination Using Human Ear Model with Concurrent Algorithm. Paper presented at the Seminar Ilmiah Ilmu Komputer Nasional (Silicon 2008), Universitas Pelita Harapan Tangerang, Indonesia. http://eprints.utp.edu.my/866/
  • Hammuzamer Irwan , H., & Abdullah, A. (2008). Signal Noise Removal using Concurrent Algorithm. Paper presented at the Proceedings of the 4th International Conference on Information Technology and Multimedia (ICIMU’ 2008) - UNITEN, Bangi, Selangor. http://eprints.utp.edu.my/867/
  • Hamzah, H. I., & Abdullah, A. (2008). Signal noise removal using concurrent algorithm, proceedings of the 4th international conference on information technology and multimedia (ICIMU’2008). Universiti Tenaga Nasional, Malaysia
  • Hassan, M., & Abdullah, A. (2008). Self-organizing Grid resource discovery. Paper presented at the International Symposium on Information Technology (ITSim 2008) (ISI)
  • Imran, M., & Abdullah, A. (2008). Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks. Paper presented at the International Conference on Science & Technology: Applications in Industry & Education (2008).
  • Intan Najua, K. N., Abdullah, A., & Abdullah Sani, A. R. (2008). A Language to Represent Security Policy for Multi-agency Health Information System. Paper presented at the International Graduate Conference on Engineering and Science (IGCES 2008). http://eprints.utp.edu.my/2518/
  • Mahamat Issa, H., & Abdullah, A. (2008). Scalable Self-Organizing Model for Grid Resource Discovery. Paper presented at the International Conference on Network Applications, Protocols and Services (NetApps 2008) http://eprints.utp.edu.my/696/
  • Maythem kamal, A., & Abdullah, A. (2008). Remote Mobile Nodes Service Delivery via VANET. Paper presented at the NetApps2008, Universiti Utara MALAYSIA. http://eprints.utp.edu.my/5419/ (Scopus)
  • Mohamed, Y., & Abdullah, A. (2008). Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks. Paper presented at the International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET 2008). (ISI)
  • Mohamed, Y. A., & Abdullah, A. (2008). Biologically inspired architecture for securing hybrid mobile ad hoc networks. Paper presented at the International Conference on Innovations in Information Technology (IIT 2008). (Scopus)
  • Muna , E., & Abdullah, A. (2008). Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security. Paper presented at the International Conference on Innovations in Information Technology 2008, Al Ain. http://eprints.utp.edu.my/5414/
  • Musmar, A. O., Abdullah, A., Dominic, P., & Durai, D. (2008). Object orientation with business process modeling for Successful Business Process Reengineering. Paper presented at the International Symposium onInformation Technology (ITSim 2008). (ISI and Scopus)
  • Paputungan, I. V., & Abdullah, A. (2008). Modelling a Survivable System through Critical Service Recovery Process. Paper presented at the Second UKSIM European Symposium on Computer Modeling and Simulation (EMS 2008)
  • Yasir Abdelgadir , M., & Abdullah, A. (2008a). Immune Inspired Framework for MANETs’ Security. Paper presented at the 6th student conference on research and development (SCOReD08), Unviversity Technology MALAYSIA. http://eprints.utp.edu.my/2588/
  • Yasir Abdelgadir , M., & Abdullah, A. (2008b). Security Mechanism for MANETs. Paper presented at the International Conference on Network Applications, Protocols and Services (NetApps2008) Exclusive Development Center , UUM, MALAYSIA. http://eprints.utp.edu.my/2596/ (Scopus)
Thesis
  • Alhussein Musmar, A. O., & Azween, A. (2008). An Object Oriented Approach for Business Process Reengineering. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/5707/
  • M.A.C., B., & Abdullah, A. (2008). Authentication Mechanism for Ad Hoc Wireless Local Area Network. Masters, UNIVERSITI TEKNOLOGI PETRONAS. Retrieved from http://eprints.utp.edu.my/2699/
2007
Conference Proceedings
  • Ahmed, I., Abdul Muhamin , N., Muhammad, I., & Abdullah, A. (2007). Statistical Based Real-Time Selective Herbicide Weed Classifier. Paper presented at the Multitopic Conference (INMIC 2007), Lahore. http://eprints.utp.edu.my/2519/ (Scopus)
  • Bhakti, C., Abdullah, A., & Jung, L. (2007). EAP-based authentication with EAP method selection mechanism: Simulation design. Paper presented at the 5th Student Conference on Research and Development (SCOReD 2007).
  • Bhakti, C., Abdullah, A., & Jung, L. T. (2007). EAP-based authentication with EAP method selection mechanism. Paper presented at the International Conference on Intelligent and Advanced Systems (ICIAS 2007)
  • Bhakti, M. C., Abdullah, A., & Jung, L. T. (2007). EAP-based authentication for ad hoc network. Paper presented at the Proceeding of Seminar Nasional Aplikasi Teknologi Informasi (SNATI 2007)
  • Paputungan, I. V., & Abdullah, A. (2007a). Specifying a Recovery Model for Survivable System. Paper presented at the 5th Student Conference on Research and Development (SCOReD 2007) (ISI)
  • Paputungan, I. V., & Abdullah, A. (2007b). Survivability Assessment: Modeling a Recovery Process. Paper presented at the Seminar Nasional Aplikasi Teknologi Informasi (SNATI 2007).
  • Paputungan, I. V., Abdullah, A., & Jung, L. (2007). Critical service recovery model for system survivability. Paper presented at the Proceedings of the 9th WSEAS international conference on Mathematical and computational methods in science and engineering. (ISI).