Azana Hafizah Mohd Aman

Azana Hafizah Mohd Aman
National University of Malaysia | ukm · School of Computer Science

PhD in Engineering (Computer and Information)

About

101
Publications
30,019
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,667
Citations

Publications

Publications (101)
Article
An essential component of the Internet Protocol Suite is Transmission Control Protocol (TCP). In this article, the effectiveness of three distinct TCP congestion control algorithms, namely Reno, NewReno, and Cubic, in the context of wired lines has been examined. In a series of simulations, we changed the congestion control technique while maintain...
Article
This article analyses the parametric used for Maximum Transmission Unit (MTU) in User Datagram Protocol (UDP) for online video streaming based on 1080p HD video and 720p HD video. Using a one-to-one node network design, this article has offered an investigation of the performance of UDP in NS3. UDP experiences rather considerable packet losses duri...
Article
The influence of producer mobility on Named Data Networking (NDN) networks in dynamic networking environments is amplified, hence necessitating an escalation in the demand for performance analysis. When producers transition between different sites or nodes relocation, there is a significant increase in packet loss. Consequently, the present work ce...
Article
The Internet of Things (IoT) and Blockchain paradigms have offered significant benefits in recent technological innovations. Blockchain has been rated one of the top ten strategic technologies in a recent Gartner survey, and it is increasingly being employed in a range of industries. Blockchains provide transparent, tamper-proof, and secure platfor...
Article
Full-text available
One promising paradigm for content-centric communication is Named Data Networking (NDN), which revolutionizes data delivery and retrieval. A crucial component of NDN, producer mobility, presents new difficulties and opportunities for network optimization. This article reviews simulation strategies designed to improve NDN producer mobility. Producer...
Article
Full-text available
Deep learning-driven side-channel analysis (SCA) is a promising approach to side-channel analytic profiling. Recent studies have shown that neural networks can successfully attack defended targets, even with a small number of attack traces. However, developing neural networks requires fine-tuning hyperparameters, which is challenging and time-consu...
Article
Full-text available
Internet of Things (IoT) is transforming how we live and work and its applications are widespread, spanning smart homes, industrial monitoring, smart cities, healthcare, agriculture, and retail Considering its wide range applications, it is vital to address the security challenges arising from the massive collection and transmission of user data by...
Article
Full-text available
During the years 2018-2024, considerable advancements have been achieved in the use of deep learning for side channel attacks. The security of cryptographic algorithm implementations is put at risk by this. The aim is to conceptually keep an eye out for specific types of information loss, like power usage, on a chip that is doing encryption. Next,...
Article
Full-text available
The advent of technological advancements in the era of globalization has given significant advantages upon developing nations. However, it has also led to certain drawbacks, notably the increase of cybercrimes such as Internet fraud (commonly known as scams). Among the contributing factors to this issue in Malaysia are the low level of public aware...
Article
Full-text available
Deep learning (DL) is a new option that has just been made available for side-channel analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research till now. In this attack, the attacker has complete control over the profiling device and can collect many traces for a range of critical parameters to characterise device leak...
Article
Full-text available
Having a large number of device connections provides attackers with multiple ways to attack a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can cause fiscal harm and corrupt data. Thus, irregularity detection in traffic data is crucial in detecting malicious behavior in a network, which is essential for net...
Article
Full-text available
Named Data Networking (NDN) is developed to accommodate future internet traffic. In recent years, NDN’s popularity has grown due to the evolution of the Internet of Things, Artificial Intelligence, Cloud Services, and Blockchain. As part of Future Internet Architecture, the NDN architecture enables dynamic content management, mobility, privacy, and...
Article
Full-text available
In this paper, an active equalization circuit based on resonant converter is presented. This equalization circuit has been proposed to equalize the direct cell-to-cell voltage in a string. All electrochemical energy storage devices are connected in series. Using this equalization circuit energy transfer from higher energy and charge capacitive cell...
Conference Paper
Full-text available
A software-defined-networking (SDN)-based controller (SeerEngine-Campus) provides service intelligence. This controller sets up connections, enforces service levels, and automates operations in order to provide full policy management. When the H3C Application-Driven Campus (AD-Campus) solution SD- W AN architecture is used, it gives users secure ne...
Article
Full-text available
For the betterment of human life, smart Internet of Things (IoT)-based systems are needed for the new era. IoT is evolving swiftly for its applications in the smart environment, including smart airports, smart buildings, smart manufacturing, smart homes, etc. A smart home environment includes resource-constrained devices that are interlinked, monit...
Article
Full-text available
Rivers are the agents on earth and act as the main pathways for transporting the continental weathered materials into the sea. The estimation of suspended sediment yield (SSY) is important in the design, planning and management of water resources. The SSY depends on many factors and their interrelationships, which are very nonlinear and complex. Th...
Article
Full-text available
In-network caching has evolved into a new paradigm, paving the way for the creation of Named Data Networking (NDN). Rather than simply being typical Internet technology, NDN serves a range of functions, with a focus on consumer-driven network architecture. The NDN design has been proposed as a method for replacing Internet Protocol (IP) addresses w...
Article
The replacement of conventional synchronous generator (SG) with wind energy conversion system (WECS) greatly reduces the available inertial support in the electrical network. In order to avoid mechanical stress on wind turbine (WT) which is caused by kinetic energy (KE) extraction in providing the virtual inertial support (VIS), this paper proposed...
Article
Code tampering is serious issue in Internet of Things(IOT). IoT devices are used to collect environment data like temperature value, light intensity, hart pulse etc. Once an IoT device deployed it will left untouched forever. In that situation an adversary can tamper running code through malicious software. This paper discusses a novel way to prote...
Conference Paper
As the number of devices connected to the Internet increase and the amount of data available online grow, the cyber-attacks will keep increasing in number and their severity. For Malaysia specifically, as of the second quarter of 2022, a total of 44.2 million accounts have been breached putting the security, privacy, and confidentiality of the acco...
Article
Full-text available
The Internet is evolving, and data is a critical component of today’s Internet. People are more interested in data than data location. An information-centric network (ICN) uses this idea and makes data, instead of host addresses, an integral component. Another essential topic in the contemporary period is cloud or edge computing, as well as the Int...
Conference Paper
Full-text available
Multi-Objective Evolutionary Algorithms (MOEAs) maximize multiple objective functions using heuristic random searching to identify a collection of non-dominated solutions. In particular, multi-objective searching ranks solutions based on a subset of non-dominated solutions. The state-of-the-art, which is one of the evolutionary algorithms, is the s...
Article
Full-text available
Nowadays, the rapid deployment of Wireless Sensor Networks (WSNs) and the integration of Internet of Things (IoT) technology has enabled their application to grow in various industrial fields in our country. Various factors influence the success of WSN development, particularly improvements in Medium Access Control (MAC) protocols, for which WSNs-I...
Chapter
Full-text available
The Internet of Things (IoT) is a network of devices, mechanical and digital machines, objects, or persons with unique identifiers to transfer data over a network. The internet helps people live and work more smartly. Technology contributes to helping from environmental threatening such as flooding, and tornadoes which cost people's lives. In this...
Article
Full-text available
The smart grid idea was implemented as a modern interpretation of the traditional power grid to find out the most efficient way to combine renewable energy and storage technologies. Throughout this way, big data and the Internet always provide a revolutionary solution for ensuring that electrical energy linked intelligent grid, also known as the en...
Chapter
Architecture technology Networking Data Named (NDN) is an alternative technology to the existing Internet Protocol (IP) network. These technologies can solve various problems such as safety and mobility. The basic concept of NDN uses content data for routing purposes rather than using location addresses such as IP addresses. However, NDN automatica...
Article
Full-text available
Data has become an increasingly significant component of the Internet as it has increased in popularity. Where people care more about the data than the location of data. The Named Data Network (NDN) took this concept and paired it with the idea of making data a core component rather than host addresses. Because of its in-network caching capability,...
Article
Full-text available
Recently, Wireless Sensor Network (WSN) technology has emerged extensively. This began with the deployment of small-scale WSNs and progressed to that of larger-scale and Internet of Things-based WSNs, focusing more on energy conservation. Network clustering is one of the ways to improve the energy efficiency of WSNs. Network clustering is a process...
Article
Full-text available
The development of Medium Access Control (MAC) protocols for Internet of Things should consider various aspects such as energy saving, scalability for a wide number of nodes, and grouping awareness. Although numerous protocols consider these aspects in the limited view of handling the medium access, the proposed Grouping MAC (GMAC) exploits prior k...
Article
Wireless Sensor Network Deployment (WSND) is an active research topic. This mechanism involves optimal placement of a wireless sensor network in a 2D environment for optimizing a set of metrics, such as coverage and cost. The topic of WSND has two challenging parts. First, it has a Multiobjective Optimization (MOO) nature instead of a single optima...
Article
Machine learning is becoming an attractive topic for researchers and industrial firms in the area of computational intelligence because of its proven effectiveness and performance in resolving real-world problems. However, some challenges such as precise search, intelligent discovery and intelligent learning need to be addressed and solved. One mos...
Conference Paper
Full-text available
Among various vehicle thefts, thieves steal vehicles to use them for terrorism, kidnapping, armed robberies, and other illegal operations. Therefore, the proposed study aimed to design and implement a vehicle tracking system that recognizes the vehicle’s locations for theft case detection. Accordingly, this paper focuses on identifying the vehicle’...
Article
Full-text available
In recent times, Wireless Sensor Network (WSN) technology has received significant attention owing to its numerous applications in various mission critical services, such as healthcare, military monitoring, public safety systems, and forest monitoring. However, sensor node’s low computational power and inadequate advancements in battery design hind...
Article
Active learning commonly entails learning techniques that engage students in the learning process. Two important elements of active learning are student activity and student engagement. The objective of this paper is to establish the effectiveness of an Active Learning framework based on multiple approaches to increase student engagement. This rese...
Article
Full-text available
Internet of Things (IoT) is proliferating in our real world, and it is a promising technology that serves a very comfortable service to the users. IoT’s underlying technology is to connect to central Cloud Computing (CC), which is a huge data center collecting the generated data by IoT devices, and it is located in different areas on demand. Howeve...
Article
Full-text available
The reason to explain the cloud computing assimilation, as well as the understanding of the operational performance, still remains unclear. To investigate this issue, this study has examined the assimilation of cloud computing by examining the organization’s implementation of cloud computing and performance in the Malaysian public sector. Grounded...
Conference Paper
Network Simulator is a current and ongoing networking tool for research, especially in the mobile networking area. Network simulation simplifies the design and analysis of network protocols such as AODV routing protocol in MANET. NS-3 is one of the active open source discrete event simulators that supports various characteristic of AODV routing pro...
Article
Fuel cells efficiently turn chemicals in fuel into electricity by chemical reaction and have been described as among the most recent advances in the upcoming cleaner energy sector. In recent times, fuel cells are being used in medicine, including experimental studies and current and potential goods, having numerous benefits over previous batteries,...
Article
Full-text available
The internet of things (IoT) is a distributed heterogeneous network of lightweight nodes with very minimal power and storage. The IoT energy system for smart applications such as smart grid, smart building, and smart transportations depends on the IoT architecture, determining the high or low‐energy consumption levels. Most of the IoT objects are p...
Article
Full-text available
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of application...
Article
Full-text available
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of application...
Article
Full-text available
Fog computing is an emerging technology. It has the potential of enabling various wireless networks to offer computational services based on certain requirements given by the user. Typically, the users give their computing tasks to the network manager that has the responsibility of allocating needed fog nodes optimally for conducting the computatio...
Article
Full-text available
Mobile Ad-hoc Network (MANETs) is a wireless network topology with mobile network nodes and movable communication routes. In addition, the network nodes in MANETs are free to either join or leave the network. Typically, routing in MANETs is multi-hop because of the limited communication range of nodes. Then, routing protocols have been developed fo...
Article
Full-text available
With the evolution of the fifth-generation (5G) wireless network, the Internet of Things (IoT) has become a revolutionary technique that enables a diverse number of features and applications. It can able a diverse amount of devices to be connected in order to create a single communication architecture. As it has significantly expanded in recent yea...
Article
Full-text available
Prevalent years have witnessed the rise in a plethora of data security issues that run across the board from copyright to content security issues due to the multitudinous transmission and sharing of multimedia activities across communications conduit that utilizes the network, which is not secure. Consequently, the requirement for the latest securi...
Article
Full-text available
The Internet of Things (IoT) is shaping the current and next generation of the Internet. The vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and dense heterogeneous devices network. This vision includes the adaptation of secure mobile networks, anytime, anywhere, by anyone or anything with new intelligent...
Article
Full-text available
This study presents the proposed testbed implementation for the Advanced Technology Training Center (ADTEC) Batu Pahat, one of Malaysia’s industrial training institutes. The objectives of this study are to discover the issues regarding network congestion, propose a suitable method to overcome such issues, and generate output data for the comparison...
Article
Full-text available
This study explored radiology procedure cost across available units in the Radiology’s Department UKMMC (University Kebangsaan Malaysia Medical Centre). In 2011, the total number of radiology procedures carried out in this department was 121,221. Nevertheless, the estimating expenses of offering these procedures are not known. An economic evaluatio...
Article
Full-text available
The Internet of things (IoT) composed of numerous smart devices and communication technologies. The IoT devices interchange the information through wireless or wired network connections. Compared to the wired connection, the wireless connection in IoT is the current primary concern. In general, there are few wireless network protocols that can be u...