Azween Bin Abdullah

Azween Bin Abdullah
  • B.Sc Computer Science, Master of Software Engineering, PhD in IT (Cybersecurity), Stanford University-Advanced Computer Security Certified
  • Professor (Full) at Taylor's University

About

232
Publications
87,242
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,252
Citations
Introduction
Azween Abdullah has been contributing to research, teaching, consulting and in administrative services to the institutions that he has been working for thus far. His work experience includes twenty six years as a academic in institutions of higher learning and as director of research and academic affairs at two institutions of higher learning, vice-president for educational consultancy services, ten years in commercial companies as Software Engineer.
Current institution
Taylor's University
Current position
  • Professor (Full)
Additional affiliations
January 2009 - September 2017
MUST, Taylor's University
Position
  • Professor
May 2013 - December 2020
Malaysia University of Science and Technology
Position
  • Research Professor of Cybersecurity
May 2013 - May 2020
Taylor's University
Position
  • Professor (Associate)
Description
  • Teaching, Research and Supervision. Director of Postgraduate Programs
Education
May 2016 - April 2017
Stanford University
Field of study
  • Computer Security
January 2014 - December 2016
Massachusetts Institute of Technology
Field of study
  • Cyber security, Big Data, Data Analytics
March 2013 - March 2016
Unitar International University
Field of study
  • Cybersecurity

Publications

Publications (232)
Article
Full-text available
At present, the application of remote sensing (RS) data achieved from satellite imagery or unmanned aerial vehicles (UAV) has become common for crop classification procedures, i.e. crop mapping, soil classification, or prediction of yield. The classification of food crop utilizing RS images (RSI) is one of the major applications of RS in farming. I...
Article
Full-text available
This research shows some of the worthy ecosystem services provided by wetlands are biodiversity support, water regulation, and carbon sequestration. These ecosystems are under threat due to human activities such as urbanization and industrialization, so their identification and classification are very important for their conservation. Synthesis ape...
Article
Full-text available
Agricultural land use and land cover (LULC) classification using synthetic aperture radar (SAR) data is a fundamental application in remote sensing and precision agriculture. Leveraging the abilities of SAR, which can enter over cloud cover and deliver detailed data about surface features, allows a robust analysis of agricultural landscapes. By har...
Article
Full-text available
Farming is regarded as a major industry in India, accounting for 17% of the country's GDP growth. Agriculture employs 60% of the population hence it is considered an important sector in India. The important factors for agriculture are pest management, disease prevention, irrigation management, soil mineral composition, crop management, location, an...
Article
Full-text available
The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party...
Article
Full-text available
Object detection and classification denotes one of the most extensively-utilized machine vision applications given the high requirements put forward for object classification and defect detection with the rise of object recognition scenes. Notwithstanding, conventional image recognition processing technology encounters specific drawbacks. Its benef...
Book
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains. Information Security Handbook addresses the knowledge for emerging mul...
Conference Paper
As the demand for cloud services increases, optimization of resources becomes essential. Static algorithms are no longer sufficient to solve cloud-related challenges such as imbalanced workload distribution in Virtual Machines or improper resource allocation to cloud users. Thus, the need to explore other rich approaches can greatly improve cloud a...
Article
Full-text available
Despite the many past research conducted in the Cloud Computing field, some challenges still exist related to workload balancing in cloud-based applications and specifically in the Infrastructure as service (IaaS) cloud model. Efficient allocation of tasks is a crucial process in cloud computing due to the restricted number of resources/virtual mac...
Article
Full-text available
Cloud Computing is a robust model that allows users and organizations to purchase required services per their needs. The model offers many services such as storage, platforms for deployment, convenient access to web services, and so on. Load Balancing is a common issue in the cloud that makes it hard to maintain the performance of the applications...
Article
Full-text available
In the United States, the manufacturing ecosystem is rebuilt and developed through innovation with the promotion of AMP 2.0. For this reason, the industry has spurred the development of 5G, Artificial Intelligence (AI), and Machine Learning (ML) technologies which is being applied on the smart factories to integrate production process management, p...
Article
Full-text available
The Industrial Revolution 4.0 began with the breakthrough technological advances in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from digitalization and automation to the new era of smart factories. A smart factory can do not only more than just produce products in a digital and automatic system, but also...
Article
Ransomware is a type of malware that blocks access to its victim's resources until a ransom is paid. Crypto-ransomware is a type of ransomware that blocks access to its victim's files by the use of an encryption algorithm. This encrypted file remains permanently blocked, even if the victim is able to remove the ransomware from the infected file. Th...
Article
Full-text available
The educational system of Malaysia fraught with many challenges. Among them, the most alarming issue is the poor learning outcomes among teachers especially in primary schools. The predominant cause of such a bad situation is the weak traditional learning environment. To cater to such chronic educational issues, the world around us strongly relies...
Article
Full-text available
Since the Swiss Davos Forum in January 2017, the most searched keywords related to the Fourth Revolutionary Industry are AI technology, big data, and IoT. In particular, the manufacturing industry seeks to advance information and communication technology (ICT) to build a smart factory that integrates the management of production processes, safety,...
Article
Full-text available
Crypto ransomware is a type of malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber security community due to several successful worldwide attacks. The encryption employed had caused irreversible damage to the victim’s digital files, even when the victim chooses...
Article
Full-text available
All highly centralised enterprises run by criminals do share similar traits, which, if recognised, can help in the criminal investigative process. While conducting a complex confederacy investigation, law enforcement agents should not only identify the key participants but also be able to grasp the nature of the inter-connections between the crimin...
Article
Full-text available
Community detection using graph theory allows us to detect a community within an organized criminal syndicate that has network orientated structures. Classical community detection methods will have problems to detect communities with different network orientated structures even though they have similar nodes. Studying the inter-connections between...
Article
Full-text available
Criminal networks analysis has attracted several numbers of researchers as network analysis gained its popularity among professionals and researchers. In this study, we have presented a comprehensive review of community detection methods based on graph analysis. The concept of community was vividly discussed as well as the algorithms for detecting...
Article
Full-text available
Evidently, criminal network activities have shown an increasing trend in terms of complexity and frequency, particularly with the advent of social media and modern telecommunication systems. In these circumstances, law enforcement agencies have to be armed with advance criminal network analysis (CNA) tools capable of uncovering with speed, probable...
Article
Full-text available
The prediction of hidden or missing links in a criminal network, which represent possible interactions between individuals, is a significant problem. The criminal network prediction models commonly rely on Social Network Analysis (SNA) metrics. These models leverage on machine learning (ML) techniques to enhance the predictive accuracy of the model...
Article
This study examines a study of Generation Z attitudes toward internet usage for E-commerce in selangor, Malaysia. The specific factors studied were attitude toward internet usage; computer literacy; consumer lifestyle; and perceived ease of use. This study drew on a total sample size of 150 respondents and distributed questionnaires to collect the...
Article
Full-text available
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes data unrecoverable once the victim’s files have been encrypted. Therefore, in this research, it...
Article
Full-text available
Software engineering is the process of developing software by utilizing applications of computer engineering. In the present day, predicting the reliability of the software system become a recent issue and an attractive issue for the research area in the field of software engineering. Different techniques have been applied to estimate and predict t...
Article
Full-text available
Cyber-security, as an emerging field of research, involves the development and management of techniques and technologies for protection of data, information and devices. Protection of network devices from attacks, threats and vulnerabilities both internally and externally had led to the development of ceaseless research into Network Intrusion Detec...
Article
Full-text available
This study examines a study of Generation Z attitudes toward internet usage for E-commerce in selangor, Malaysia. The specific factors studied were attitude toward internet usage; computer literacy; consumer lifestyle; and perceived ease of use. This study drew on a total sample size of 150 respondents and distributed questionnaires to collect the...
Article
Full-text available
In this current generation, there is great popularity of student in using internet as well as the web 2.0 for different purposes in their daily life, for instance, the primary uses found are for the email, communication and academic-related work. Nonetheless, according to the past research, there determined there is loose relationship between the t...
Chapter
Objectives: To provide a swift and simple mobile authentication method which are highly secured, easily remembered and prevents shoulder surfing attacks to improve existing mobile authentication methods. Methods: This paper is written using a problem-oriented research in improving the existing mobile authenticator which are vulnerable to shoulder s...
Article
Full-text available
The scale of criminal networks (e.g. drug syndicates and terrorist networks) extends globally and poses national security threat to many nations as they also tend to be technologically advance (e.g. Dark Web and Silk Road cryptocurrency). Therefore, it is critical for law enforcement agencies to be equipped with the latest tools in criminal network...
Article
Full-text available
Criminal network activities, which are usually secret and stealthy, present certain difficulties in conducting criminal network analysis (CNA) because of the lack of complete datasets. The collection of criminal activities data in these networks tends to be incomplete and inconsistent, which is reflected structurally in the criminal network in the...
Article
Full-text available
This research focuses on evaluating whether a website is legitimate or phishing. Our research contributes to improving the accuracy of phishing website detection. Hence, a feature selection algorithm is employed and integrated with an ensemble learning methodology, which is based on majority voting, and compared with different classification models...
Article
Full-text available
Swiftness, simplicity, and security is crucial for mobile device authentication. Currently, most mobile devices are protected by a six pin numerical passcode authentication layer which is extremely vulnerable to Shoulder-Surfing attacks and Spyware attacks. This paper proposes a multi-elemental graphical password authentication model for mobile dev...
Article
Full-text available
Intrusion Detection System (IDS) is an important tool use in cyber security to monitor and determine intrusion attacks This study aims to analyse recent researches in IDS using Machine Learning (ML) approach; with specific interest in dataset, ML algorithms and metric. Dataset selection is very important to ensure model build is suitable for IDS us...
Article
Machine learning (ML) is used for network intrusion detection because of its prediction ability after training with relevant data. ML provides a good method to detect new and unknown attacks. There are many types of attacks in network intrusion: however, this paper concentrates on distributed denial of service (DDoS). DDoS is similar to denial of s...
Article
Full-text available
The social network analysis focuses on investigating the connection of social actors and obtaining useful insights. It involves various techniques and methods, including determining the isomorphism among (sub)graphs. In this study, we have presented a critical analysis of seven different algorithms related to graph analytics, namely, Ullman, VF, VF...
Article
Full-text available
This study investigates the determinants of online purchasing intention towards household appliances among Malaysians in the Klang Valley. The study was piloted to test the proposed hypotheses and research question regarding how e-commerce should be developed. A total of 150 questionnaire and online survey responses were analysed for participants’...
Article
Full-text available
Security is one of the key important factors in ad hoc network due to the open wireless medium and dynamic topology of the network. MANET, VANET and FANET are type of ad hoc network and their applications are served the end users in real environment. VANET and FANET are next generation network and due to safety applications more attractions for end...
Chapter
Grouping of data is recognized as an effective way of managing a huge amount of data. Groups are very important for exploratory analysis of visualized networks. There are different issues with grouping; for instance data gets meshed up together which makes the interaction between the group members difficult to trace, the analysts find it difficult...
Article
Full-text available
:Job placement is becoming an uphill task for new graduates when they do not have the relevant knowledge to start up on their own. This happens when their education is either sub-standard, rendered obsolete upon graduation or cannot be translated into practice at their respective workplaces. Such a shortcoming in the broadcasting industry is not wi...
Article
A profound analysis of signaling cost for multicast network mobility management environment. The evaluation is a innovative integration of Multicast only Fast Reroute (MFR) and Context Transfer (CT). This integration is implemented to network mobility environment which is Proxy Mobile IPv6 (PMIPv6). The signaling cost terms is described based on ha...
Article
The computer aided systems (CAD) commonly provide a collaborative means to help medical practitioners in disease analysis and cure for patients. The accuracy of such systems is highly dependent over enhanced identification of regions of interest in medical diagnostics especially in medical images. Despite the existence of several medical imaging di...
Article
It is generally known that network simulator is a program used to verify new or existing network architecture and its activities. Basically network simulator helps to implement the virtual part of network research. This has save a lot of cost on analysis as the results of a network simulator is very close to real network cases. In recent researches...
Article
Network based mobility management protocol can be termed as Proxy MIPv6 (PMIPv6). It is introduced as a unicast network based mobility management. Route optimization as well as context transfers approaches are some intra domain multicast support mechanisms in PMIPv6. As for inter domain multicast support mechanism on PMIPv6 domain, global mobility...
Article
In Network Mobility (NEMO) environment, recurrent movement of a mobile router is one of the distinguished characteristics since this may affect the performance of the existing mobility management schemes. The movement pattern straightly influence once transmission links among mobile routers are established or failed, which is connected with the sys...
Article
Proxy Mobile IPv6 (PMIPv6) was initially introduced to assist unicast network-based mobility. In recent years, new approaches have been introduced to provide multicast support in PMIPv6. IP multicast is an imperative mechanism for internet video provision. As the usage of internet data traffic remains to develop rapidly, there is a need to optimize...
Article
Full-text available
Network Mobility Basic Support Protocol (NEMO-BSP), the existing IETF standard for mobile network support, signifies an important portion for future heterogeneous wireless access networks. The reason is to provide continuous Internet connectivity during movement of Mobile Router (MR) in NEMO. This paper conducted a quantitative analysis on the hand...
Article
Mobile IPTV applications are becoming very popular worldwide. According to CISCO research, mobile Internet video usage is increasing rapidly each year and soon reaching zettabyte threshold in 2019. With the increase number of traffic, it is a great effort for internet service provider to provide acceptable network performance. The objective of this...
Article
Full-text available
Background/Objectives: Mobile data traffic over IP has grown very rapidly in size. This huge increase in size creates high demand performance on network that supports mobile multicast services. This motivates the development of a better performance procedure with better signaling cost. Methods/Statistical analysis: A mathematical evaluation of sign...
Article
Full-text available
Automatic ECG analysis is significant for diagnosis as well as treatment of critically cases patients. One of the serious threat to the patient recovering from severe cardiac infarction is the arrhythmias. In this work, an ensemble classification algorithm was proposed for diagnosing cardiac arrhythmia by processing extracted features of 12- Lead E...
Conference Paper
As forecasted by recent research, mobile Internet video traffic is reaching zettabyte capacity in 2019. The fast increments and great usage boost demand in providing high internet service performance. It has become an ongoing research trend to enhance available schemes to comply such demand. The aim of this paper is to propose a new mobile multicas...
Chapter
Routing is the backbone of any computer network and mobile ad hoc networks (MANETs) are no exception to this rule. Position-based routing protocols are special kind of routing protocol that uses position information to route packet from source to destination. These protocols are considered as the most scalable solution, as they do not cause floodin...
Article
Full-text available
Vehicular ad hoc network (VANET) is taken more attention from the end user due to its potential safety and non-safety applications. The basic design objective of these applications to serve the users and provide safety of human lives during their journey. The role of the end user is more prominent for next generation vehicular networks. An attacker...
Chapter
Full-text available
This chapter covers the data mining techniques applied to the processing of clinical data to detect cardiovascular diseases. Technology evaluation and rapid development in medical diagnosis have always attracted the researchers to deliver novelty. Chronic diseases such as cancer and cardiac have been under discussion to ease their treatments using...
Conference Paper
The strength of time series modeling is generally not used in almost all current intrusion detection and prevention systems. By having time series models, system administrators will be able to better plan resource allocation and system readiness to defend against malicious activities. In this paper, we address the knowledge gap by investigating the...
Article
Full-text available
The strength of time series modeling is generally not used in almost all current intrusion detection and prevention systems. By having time series models, system administrators will be able to better plan resource allocation and system readiness to defend against malicious activities. In this paper, we address the knowledge gap by investigating the...
Article
Full-text available
The objective of this research is to propose an efficient soft computing approach with high detection rates and low false alarms while maintaining low cost and shorter detection time for intrusion detection. Our results were promising as they showed the new proposed system, hybrid feature selection approach of Linear Discriminant Analysis and Genet...
Article
Full-text available
Coronary artery disease (CAD) has been ranked as the top cause of death by world health organization in many countries especially Asia. In Malaysia, 22.18% of total deaths are caused by CAD. In this paper, our focus is to review possible types of data mining algorithms applied for processing of clinical attributes as well as their classification to...
Chapter
Full-text available
The World Wide Web offers museums the possibility to disseminate information about their collections publically so they may attract people to come and visit the actual museum. In attributing communicative and interactive functions to a museum’s Web site, it is especially important to keep in mind the users and their needs for easy interaction. Some...
Patent
Full-text available
The method and system are disclosed for analyzing the denial of service attack by using a supervised neural network. The methodology used sampled data from an attack database or the judgment of attack detection tools. The system uses multiple layered preceptor architecture and resilient backpropagation for its training and testing and the performan...
Patent
Full-text available
The method and system are disclosed for analyzing the denial of service attack by using a supervised neural network. The methodology used sampled data from an attack database or the judgment of attack detection tools. The system uses multiple layered preceptor architecture and resilient backpropagation for its training and testing and the performan...
Article
Enhancing the detection accuracy of heart anomalies for clinical diagnosis is essential yet complicated because of irrelevant patient’s details and slow systematic processing. In this work, the aim is to select relevant clinical features which can accelerate the classification performance to distinguish abnormal and normal patients. For this purpos...
Article
Full-text available
The advancement of information system led era and increased competition have forced SMEs to reengineer and integrated their business processes for better efficiency and productivity. The SMEs has begun to look into the potential of implementing enterprise software systems in adding value towards their businesses. Thus, the objective of this paper i...
Article
Currently, Intrusions on computer and network systems are the most important security concerns. Therefore, it is very essential to adhere to such tribulations. The focus of this work is to reduce features and increase detection rate. This paper presents a visual analysis of feature subsets based on MLP (Multi Layer Perceptron) with other MLP approa...
Article
A variety of classifiers have been used as intrusive analysis engine in the area of intrusion detection. But they suffer from several problems such as training overhead, architecture's complexity and computational overhead. The efficiency of an intrusive analysis engine can be improved by optimal feature subset selection.Such drawbacks of the exist...
Article
Full-text available
Due to the fast growth of network systems, abundant intrusive approaches have been grown extensively which are escalating many security and solidity threats. Intrusions Detection Systems (IDS) are security programs to decide whether events and activities occurring in the network are intrusive or legitimate. The purpose of IDS is to identify intrusi...
Article
Full-text available
Identification of coding regions in DNA sequences is an important and challenging optimization problem in bioinformatics. Several approaches have been proposed but none is currently satisfactory. Here, the authors propose an optimization methodology to identify protein coding regions in Eukaryotes. Noise reduction in DNA signal indirectly overcomes...
Article
This paper presents an immune-inspired logical specification framework for securing Mobile Ad-hoc Networks (I(2)MANETs). The framework simulates the human immune system in: first response, second response, adaptability, distributability and many other Immune features and properties. The framework has the ability to monitor, detect, classify, and bl...
Article
Full-text available
A fundamental challenge in underwater wireless sensor networks (UWSNs) is that acoustic links are subject to high transmission power with high channel impairments. These channel impairments result in higher error rates and temporary path losses which restrict the efficiency of these networks. Besides this, the availability of limited resources and...
Book
Wireless sensor networks (WSANs) are increasingly being used and deployed to monitor the surrounding physical environments and detect events of interest. In wireless sensor networks, energy is one of the primary issues and requires the conservation of energy of the sensor nodes, so that network lifetime can be maximized. It is not recommended as a...
Article
This chapter presents the studies and analysis on the approaches, the concepts, and the ideas on data packet size optimization for data packets transmission in underwater wireless sensor network (UWSN) and terrestrial wireless sensor network (TWSN) communications. These studies are based on the related prior works accomplished by the UWSN and TWSN...
Article
Wireless Sensor Networks (WSNs) are becoming common in use, with a vast diversity of applications. Due to its resource constraints, it is hard to maintain Quality of Service (QoS) with WSNs. Though they contain a vast variety of applications, at the same time they are also required to provide different levels of QoS, for various types of applicatio...
Article
This research presents a survey of energy efficient routing protocols in sensor network by categorizing into a main classification as architecture based routing. Architecture based routing is further classified into two main areas: flat or location based routing protocol, and hierarchical based routing protocols. Flat based routing is more suitable...
Article
Wireless sensor networks (WSNs) are taking a major share with almost all types of different applications and especially, it is most suited in very harsh and tough environments, where it is too hard to deploy conventional network applications, for example in the forest fire area, battlefields during the war, chemical and thermal sites, and also for...
Chapter
Underwater Wireless Sensor Networks (UWSNs) are finding different applications for offshore exploration and ocean monitoring. In most of these applications, the network consists of a significant number of sensor nodes deployed at different depth levels throughout the area of interest. Sensor nodes on the sea bed cannot communicate directly with the...

Network

Cited By