Hatim Mohamad tahir

Hatim Mohamad tahir
Universiti Utara Malaysia | UUM · School of Computing

Computer Science

About

32
Publications
15,035
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
171
Citations
Citations since 2017
5 Research Items
119 Citations
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
Additional affiliations
December 1990 - present
Universiti Utara Malaysia
Position
  • Professor (Associate)

Publications

Publications (32)
Article
Security and privacy issues are a major concern to users of social network sites (SNS). These issues range from unauthorized access to personal information to cyber bullying. Previous researchers have been exerting different perspectives including technical, psychological and law to study privacy and security issues. However, the issues of security...
Conference Paper
Full-text available
There is an important growth in the application to detect and protect network from the intrusion and unauthorized party as well as create access control among users around the world through this decade. Contextually, the majority of users expected an integrated platform to address the challenges posed by cyber security while also enabling secure ac...
Article
The concept of security and privacy in Social Networks Sites (SNS) are becoming very popular and the number of users are increasing rapidly. These issues run from unapproved access to individual data to digital harassing. Past researchers have been applying alternate points of view including specialized tools and law to ponder protection and securi...
Article
Full-text available
Now a days, the mosque institution in Malaysia is increasingly becoming the focus of the Muslim community in organizing various activities not only religious activities but also non-religious activities. Mosque portal development is in line with the current situation where it can be used as a mediwn in conveying information and closer relationship...
Article
The problem of password memorability among users has led to the introduction of Single Sign-On (SSO) authentication. It enables users to login using a set of username and password which then allows an access into multiple websites without the hassle of repeating the same usernames and passwords. One of the most common SSO protocol is OpenID which i...
Conference Paper
Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K...
Article
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is pro...
Conference Paper
Full-text available
The utilization of the Internet has grown tremendously resulting in more critical data are being transmitted and handled online. Hence, these occurring changes have led to draw the conclusion that the number of attacks on the important information over the internet is increasing yearly. Intrusion is one of the main threat to the internet. Various t...
Conference Paper
The abstract Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration. A key concept in Data Grids is replication of data, whereby multiple copies of data are stored at different geographical locations, making access to data faster and more...
Article
Full-text available
Competition in the software market for industrial use is very challenging. Quality and productivity of software is very important to the software industry to remain competitive. Most of the commercial and industrial web applications are complex, hard to implement, risky to maintain and customization requires deep understanding of the requirements....
Conference Paper
Full-text available
Most of the commercial and industrial web applications are complex, difficult to implement, risky to maintain and customization requires deep understanding of the requirements. As today’s software market more competitive, productivity becomes a major concern in software development industry. Research showed that customization and reusability can gr...
Chapter
This article presents a research concerning password management and single sign-on for accessing Internet applications. Many Internet applications require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially, which caused ineffective login...
Data
Full-text available
Abstract - Moving from Internet Protocol version Four (IPv4) to Internet Protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been pro-posed by IETF IPng Transition Working Group (NGTrans). One of them is Dual S...
Conference Paper
Mobile ad hoc networks (MANETS) are mobile nodes moving rapidly and they use wireless connections to connect to various networks or nodes. The dynamic nature of MANETs, make it vulnerable to attack by intruders. The sending and passing of nodes are based on several routing protocols. The packets do not reach the destination and some form of secure...
Conference Paper
the challenge for future generation of wireless environment is on how to choose the appropriate wireless access network connection when there are several different wireless networks are existed. Hence, a vertical handover network selection (VHONS) being used to aid in term of service quality for user's satisfaction of the mobile terminal. This arti...
Patent
Full-text available
Disclosure of Invention The aim of this invention is to provide a visual object sharing technique for designing, customizing reusing and visualizing web elements to provide breakthrough solution for reduce software complexity, development efforts and improve quality. According to the present invention, “visual object” is the core element. In th...
Conference Paper
Full-text available
Face recognition is one of the most important and rapidly advanced active research areas of computer science. In spite of the large number of developed algorithms, real-world performance of face recognition has been disappointing. This study enhances invariant recognition of human faces and analysis to improve face verification and identification p...
Article
Full-text available
Most of the business web applications are complex, difficult to implement, risky to maintain and customization requires deep understanding of requirements. In software engineering the needs for software designers has become evident to design an efficient and cost effective software framework. Research shows that reusability can improve software qua...
Conference Paper
Full-text available
In early 2013, household broadband penetration in Malaysia has exceeded 66.7 per cent. However, the digital gap between urban and rural areas still exists. The rural communities still facing some issue in internet connectivity since many internet providers have less motivation to invest their resources in such areas. This project is undertaken with...
Article
Full-text available
A number of methods and measures have been used by researchers in software evaluation. Usability metrics is one of the approaches that has been used as a guideline to evaluate the quality of the system in many mobile applications. However, the metrics used for evaluation method keep changing due to new inventions of mobile phones. Thus, there is a...
Article
Full-text available
Software development remains complex, expensive and risky. Thus, the need for reusability has become obvious. Through reusability web developers/engineers can save countless hours and millions of dollars in development cost. Object-oriented (OO) framework mechanism provides a new vehicle for reuse and enables web engineers to customize or reuse var...
Conference Paper
Short Message Service (SMS) is a widely service for brief communication. With the rise of mobile usage it has become a popular tool for transmitting sensitive information. This sensitive information should be totally secure and reliable to exchange. This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the...
Conference Paper
This paper conduct a comprehensive simulation study on the behavior of TCP-friendly Rate Control (TFRC) protocol over Ad-Hoc On Demand Vector (AODV) routing protocol and Dynamic Source Routing (DSR) protocol. The aim are first, to measure the performance of TFRC in terms of throughput, delay and jitter. The second objective is to identify which Mob...
Article
The need for a reliable transmission protocol that can cover the Transport Control Protocol (TCP) and User Datagram Protocol (UDP) has prompted the Internet Engineering Task Force (IETF) to define a new protocol called the Stream Control Transmission Protocol (SCTP). This paper proposes adding Explicit Congestion Notification (ECN) mechanism into S...
Article
Full-text available
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with buil...
Conference Paper
Full-text available
A Mobile Ad Hoc Network (MANET) is a group of wireless nods that can be dynamically organized as a multi-hop packet radio network without using any existing infrastructure or centralized administration. However, MANET is venerable to attacks due to its mobile and ad hoc natures. The security issue is becoming a main concern in the applications of M...
Article
Full-text available
Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that can eventually lead to large monetary losses. Approach: MD5 Authentication: Due to the major role that routing protocols play in c...
Conference Paper
Full-text available
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with buil...
Conference Paper
Full-text available
Moving from Internet protocol version four (IPv4) to Internet protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been proposed by IETF IPng Transition Working Group (NGTrans). One of them is dual stack transit...
Article
Full-text available
Access control has been a great concern in this Information and Communication Technology (ICT) era. The need to control access to certain information and resources has been taken seriously by the ICT community, This research believes that no single sec1lrity method, algorithm, key or procedure is entirely secure. Hence, a combination of multiple se...

Network

Cited By

Projects

Projects (4)