
Hatim Mohamad tahirUniversiti Utara Malaysia | UUM · School of Computing
Hatim Mohamad tahir
Computer Science
About
32
Publications
15,035
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
171
Citations
Citations since 2017
Introduction
Additional affiliations
December 1990 - present
Publications
Publications (32)
Security and privacy issues are a major concern to users of social network sites (SNS). These issues range from unauthorized access to personal information to cyber bullying. Previous researchers have been exerting different perspectives including technical, psychological and law to study privacy and security issues. However, the issues of security...
There is an important growth in the application to detect and protect network from the intrusion and unauthorized party as well as create access control among users around the world through this decade. Contextually, the majority of users expected an integrated platform to address the challenges posed by cyber security while also enabling secure ac...
The concept of security and privacy in Social Networks Sites (SNS) are becoming very popular and the number of users are increasing rapidly. These issues run from unapproved access to individual data to digital harassing. Past researchers have been applying alternate points of view including specialized tools and law to ponder protection and securi...
Now a days, the mosque institution in Malaysia is increasingly becoming the focus of the Muslim community in organizing various activities not only religious activities but also non-religious activities. Mosque portal development is in line with the current situation where it can be used as a mediwn in conveying information and closer relationship...
The problem of password memorability among users has led to the introduction of Single Sign-On (SSO) authentication. It enables users to login using a set of username and password which then allows an access into multiple websites without the hassle of repeating the same usernames and passwords. One of the most common SSO protocol is OpenID which i...
Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K...
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is pro...
The utilization of the Internet has grown tremendously resulting in more critical data are being transmitted and handled online. Hence, these occurring changes have led to draw the conclusion that the number of attacks on the important information over the internet is increasing yearly. Intrusion is one of the main threat to the internet. Various t...
The abstract Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration. A key concept in Data Grids is replication of data, whereby multiple copies of data are stored at different geographical locations, making access to data faster and more...
Competition in the software market for industrial use is very challenging. Quality and productivity of software is very important to the software industry to remain competitive. Most of the commercial and industrial web applications are complex, hard to implement, risky to maintain and customization requires deep understanding of the requirements....
Most of the commercial and industrial web applications are complex, difficult to implement, risky to maintain and customization requires deep understanding of the requirements. As today’s software market more competitive, productivity becomes a major concern in software development industry. Research showed that customization and reusability can gr...
This article presents a research concerning password management and single sign-on for accessing Internet applications. Many Internet applications require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially, which caused ineffective login...
Abstract - Moving from Internet Protocol version Four (IPv4) to Internet Protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been pro-posed by IETF IPng Transition Working Group (NGTrans). One of them is Dual S...
Mobile ad hoc networks (MANETS) are mobile nodes moving rapidly and they use wireless connections to connect to various networks or nodes. The dynamic nature of MANETs, make it vulnerable to attack by intruders. The sending and passing of nodes are based on several routing protocols. The packets do not reach the destination and some form of secure...
the challenge for future generation of wireless environment is on how to choose the appropriate wireless access network connection when there are several different wireless networks are existed. Hence, a vertical handover network selection (VHONS) being used to aid in term of service quality for user's satisfaction of the mobile terminal. This arti...
Disclosure of Invention
The aim of this invention is to provide a visual object sharing technique for designing, customizing reusing and visualizing web elements to provide breakthrough solution for reduce software complexity, development efforts and improve quality.
According to the present invention, “visual object” is the core element. In th...
Face recognition is one of the most important and rapidly advanced active research areas of computer science. In spite of the large number of developed algorithms, real-world performance of face recognition has been disappointing. This study enhances invariant recognition of human faces and analysis to improve face verification and identification p...
Most of the business web applications are complex, difficult to implement, risky to maintain and customization requires deep understanding of requirements. In software engineering the needs for software designers has become evident to design an efficient and cost effective software framework. Research shows that reusability can improve software qua...
In early 2013, household broadband penetration in Malaysia has exceeded 66.7 per cent. However, the digital gap between urban and rural areas still exists. The rural communities still facing some issue in internet connectivity since many internet providers have less motivation to invest their resources in such areas. This project is undertaken with...
A number of methods and measures have been used by researchers in software evaluation. Usability metrics is one of the approaches that has been used as a guideline to evaluate the quality of the system in many mobile applications. However, the metrics used for evaluation method keep changing due to new inventions of mobile phones. Thus, there is a...
Software development remains complex, expensive and risky. Thus, the need for reusability has become obvious. Through reusability web developers/engineers can save countless hours and millions of dollars in development cost. Object-oriented (OO) framework mechanism provides a new vehicle for reuse and enables web engineers to customize or reuse var...
Short Message Service (SMS) is a widely service for brief communication. With the rise of mobile usage it has become a popular tool for transmitting sensitive information. This sensitive information should be totally secure and reliable to exchange. This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the...
This paper conduct a comprehensive simulation study on the behavior of TCP-friendly Rate Control (TFRC) protocol over Ad-Hoc On Demand Vector (AODV) routing protocol and Dynamic Source Routing (DSR) protocol. The aim are first, to measure the performance of TFRC in terms of throughput, delay and jitter. The second objective is to identify which Mob...
The need for a reliable transmission protocol that can cover the Transport Control Protocol (TCP) and User Datagram Protocol (UDP) has prompted the Internet Engineering Task Force (IETF) to define a new protocol called the Stream Control Transmission Protocol (SCTP). This paper proposes adding Explicit Congestion Notification (ECN) mechanism into S...
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with buil...
A Mobile Ad Hoc Network (MANET) is a group of wireless nods that can be dynamically organized as a multi-hop packet radio network without using any existing infrastructure or centralized administration. However, MANET is venerable to attacks due to its mobile and ad hoc natures. The security issue is becoming a main concern in the applications of M...
Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that can eventually lead to large monetary losses. Approach: MD5 Authentication: Due to the major role that routing protocols play in c...
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with buil...
Moving from Internet protocol version four (IPv4) to Internet protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been proposed by IETF IPng Transition Working Group (NGTrans). One of them is dual stack transit...
Access control has been a great concern in this Information and Communication Technology (ICT) era. The need to control access to certain information and resources has been taken seriously by the ICT community, This research believes that no single sec1lrity method, algorithm, key or procedure is entirely secure. Hence, a combination of multiple se...
Projects
Projects (4)