Mazleena Salleh

Mazleena Salleh
Universiti Teknologi Malaysia | UTM

About

113
Publications
88,908
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,384
Citations
Introduction
Skills and Expertise

Publications

Publications (113)
Article
Full-text available
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, to layers such as layer 5 of the OSI model stack. This coupled with the integration-diversity of other layers and application layer protocols has made identification of user-initiated HTTP web traffic complex, thus increasing user anonymity on the In...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) is interesting area for researchers.To extract the information from seabed to water surface the the majority numbers of routing protocols has been introduced. The design of routing protocols faces many challenges like deployment of sensor nodes, controlling of node mobility, development of efficient route...
Article
Full-text available
The presence of motion artefacts in ECG signals can cause misleading interpretation of cardiovascular status. Recently, reducing the motion artefact from ECG signal has gained the interest of many researchers. Due to the overlapping nature of the motion artefact with the ECG signal, it is difficult to reduce motion artefact without distorting the o...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) is a well interesting area for researchers. To communicate the sensing information from bottom of the sea to its surface; we need the design of routing protocol. Routing protocol designing is not an easy task especially in underwater environment due to the behavior of the acoustic channel. Since the under...
Article
Full-text available
Routing in undersea environment is one of the challenging research areas due to the nature of acoustic channel and underwater harsh environment. In underwater environment the major challenges are propagation delay, high bit error rates, limited bandwidth, uncontrolled node mobility, water current, 3D deployment, and limited resources. Hence, design...
Conference Paper
Wireless Mesh Networks (WMNs) are promising means to provide inexpensive deployment, flexible and fast broadband access. Recent WMNs use multiple-radio and multiple channels to provide high performance. However, interference between channels is considered the key challenge for WMN performance. In WMN, the data flows are directed from/to the gateway...
Conference Paper
The different of memory specification mobile devices or smart phone make it hard for developer to establish a resampling in emergency rescue location for specific smart phone. It took much time for developer to develop it. In this paper, we will introduce a good solution for developer to develop a resampling algorithm for different mobile devices o...
Conference Paper
The range of memory specifications of location aware shopping assistance poses difficulties for the developer (in terms of increased time and effort) when it comes to developing a resampling algorithm for mobile devices. Thus, a new resampling algorithm is required with a flexible capacity that would cater for a range of computing device memory dev...
Article
Full-text available
Cloud Computing have emerged into a very vast growing area which have a great impact towards the development other new technologies and application such as internet of things, sensors, artificial intelligence, social networks and business applications. With the new development of technology and applications, the production of data is increased and...
Conference Paper
Full-text available
The range of memory specifications of mobile pedestrian navigation systems poses difficulties for the developer (in terms of increased time and effort) when it comes to developing a resampling algorithm for mobile pedestrian navigation devices. Thus, a new resampling algorithm is required with a flexible capacity that would cater for a range of com...
Conference Paper
Electrocardiogram (ECG) is beneficial to diagnose various heart diseases. Recently, mobile ECG has received the attention of researchers and practitioners for real time monitoring and automatic diagnosis. However, the performance of ECG’s monitoring system is degraded because of many disturbances created by subject movement, which leads to wrong di...
Article
Full-text available
Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users' private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and cus...
Article
Full-text available
The restrictions that are related to using single distribution resampling for some specific computing devices’ memory gives developers several difficulties as a result of the increased effort and time needed for the development of a particle filter. Thus, one needs a new sequential resampling algorithm that is flexible enough to allow it to be used...
Article
Full-text available
The proliferation of ubiquitous and pervasive computing devices has led to the emergence of research areas like Internet of things, and the Big-Data, which has seen a rise in obfuscation of online identity thus fueling an increase in online anonymity. Online anonymity constitutes a major platform for the exploitation of the potentials of cyber-crim...
Article
The phenomenon of sample impoverishment during particle filtering always contribute computation burden to the inertial-based mobile IPS systems. This is due to the factor of noise measurement and number of particle. Usually, the special strategies resampling algorithms was used. However, these algorithms just can fit in certain environment. This ne...
Conference Paper
This paper studies the NTRU public key cryptosystem to identify the most influential parameters for decryption failure confirming that decryption failure is key-dependent. The study uses binary polynomials and analyzes the correlation between the parameter sets recommended in the EESS 1v2 (2003) and Jeffrey Hoffstein et al. (2003). The observed rel...
Article
NTRU is the leading alternative to ECC and RSA in the post-quantum era. However, it has a probability of decryption failure of 2-k (with k being the security level) according to Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham and William Whyte, 2009. This probability was provided for parameters selected using an algorithm which provid...
Article
Full-text available
Underwater Wireless Sensor Network (UWSN) is the well interesting area for research community due to its versatile applications like: ocean monitoring, underwater mineral extraction, tactical surveillance, marine internal wild life, offshore explorations and ocean monitoring. Majority of the researchers have used deployment and topological structur...
Article
The advent of technology today allows us to stay connected with family and friends, especially through social media applications, where communication can take place easily and in a timely manner. Most of the time we use the applications to share important information and urgent messages or news with our dearest ones because we care. But time and ti...
Conference Paper
Moving in tandem with internet services nowadays, education institutions should leverage cloud computing which is considered as ready-made platform. One of the key performance index (KPI) for educational institutions progress in teaching and learning process is the level of enhancement in e-learning applications such as adopting the cloud computing...
Article
Full-text available
The Underwater Sensor Network (UWSN) is main interesting area due to its most valuable applications like: disaster preventions, distributed tactical surveillance, undersea exploration, seismic monitoring, environmental monitoring and many more. The design of energy efficient routing protocol is a challenging issue because in underwater environment...
Article
Full-text available
User attribution, the process of identifying a human in a digital medium, is a research area that has receive significant attention in information security research areas, with a little research focus on digital forensics. This study explored the probability of the existence of a digital fingerprint based on human thinking style, which can be used...
Article
Full-text available
Underwater Wireless Sensor Network (UWSN) can enable many scientific, military, safety, commercial and environmental applications. Majority of the network models has been introduced for the deployment of sensor nodes through routing schemes and methodologies along with different algorithms but still the design of routing protocol for underwater env...
Article
Full-text available
Nowadays, cloud computing is considered as the 5th utility in the world because of ubiquitous computing needs. For education institutions, cloud computing is a promising technology for leveraging teaching and learning process through electronic learning or e-learning. However, trusting public infrastructure in storing important and confidential dat...
Article
Full-text available
Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, building a characteristic model of human dynamics on the Internet involves a complete analysis of the variations in human activity...
Data
Dataset used in the machine learning process. (RAR)
Conference Paper
In this paper, we look at a mini version of NTRU public key cryptosystem which uses binary polynomials. Mini-NTRU uses smaller parameter sets while maintaining the original structure of NTRU, with the sole purpose of enabling undergraduate and graduate students who have basic cryptography knowledge understand the basic principles of NTRU operation....
Article
Full-text available
Objectives: To study the analysis of non-cross-layer and time-delaying routing protocols for underwater wireless sensor networks which help the researchers for further research in field of proposed routing protocols. Methods/Analysis: This review article focuses the advantages and limitations, analytical and numerical simulation methods for non-cro...
Conference Paper
Full-text available
Electrocardiogram (ECG) is a powerful tool which allows for diagnosing heart condition. Nowadays, wearable ECG recording devices are used in continuous monitoring and to provide health related information. However, these systems suffer from motion artifacts which remains an unsolved problem. In this paper, two wavelet-based techniques are presented...
Article
Recently, the Underwater Wireless Sensor Network (UWSN) is the major research area for researchers due to its versatile applications like: tactical surveillance, seismic monitoring, assisted navigations, pollution monitoring, and many more scientific based applications. Majority numbers of researchers have introduced the routing protocols based on...
Article
Full-text available
The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and...
Article
Full-text available
In Underwater Wireless Sensor Network (UWSN); the sensor node is responsible to extract the valuable application based information from underwater environment. The application based information covers the applications like: tactical surveillance, assisted navigation, disaster prevention, offshore exploration, pollution monitoring and oceanographic...
Article
Full-text available
Nowadays, underwater wireless sensor network (UWSN) is an important field for researchers due to its well know applications like seismic monitoring, disaster prevention, offshore exploration, pollution monitoring, oceanography data collection, equipment monitoring, assisted navigation, and tactical surveillance. Many research challenges are availab...
Conference Paper
Researches on human thinking styles have received wide attention, especially in online education; an aspect of human computer interaction. However, the deciphering of specific thinking styles of an online user has suffered setbacks due to the limited exposition on the probability of online thinking style signature of users. This study explored this...
Article
Full-text available
In Underwater Wireless Sensor Network (UWSN); the sensor node is responsible to extract the valuable application based information from underwater environment. The application based information covers the applications like: tactical surveillance, assisted navigation, disaster prevention, offshore exploration, pollution monitoring and oceanographic...
Article
Full-text available
In these days, information sharing as a crucial part appears in our vision, bringing about a bulk of discussions about methods and techniques of privacy preserving for data mining which are regarded as strong guarantee to avoid information disclosure and protect individuals’ privacy. k-anonymity has been proposed for privacy preserving for data min...
Article
Full-text available
The notion of online anonymity is based on the assumption that on the Internet the means of identification are limited to network and system identifiers, which do not directly relate to the identity of the user. Personality traits as a form of identity have recently been explored. A myriad of relationships between the Internet and human personality...
Conference Paper
Full-text available
Nowadays, cloud computing has been highlighted as the most popular pay-as-use technology. The benefits that have been promised by this 5 th utility of the world cannot be resisted. Education institutions can leverage this ready-made service for teaching and learning process through the characteristics of the cloud itself. Cloud computing support th...
Article
Full-text available
The prevalent conditions in data sharing and mining have necessitated the release and revelation of certain vulnerable private information. Thus the preservation of privacy has become an eminent field of study in data security. In addressing this issue, K-anonymity is amongst the most reliable and valid algorithms used for privacy preservation in d...
Article
Full-text available
Phishing is a serious threat to the web economy and the Internet communication, because phishers put both users and organizations at risk of identity theft and financial losses. Phishers continually exploit new sophisticated features to impersonate legitimate web pages, modify their components and host their phishes. Furthermore, the prediction sus...
Article
Full-text available
IEEE 802.11i authentication framework is composed of the 802.1x and an extensible authentication protocol (EAP) mechanism. One of the most applicable techniques in the EAP methods is EAP-transport layer security (EAP-TLS). The EAP-TLS implementation issues are high execution time; high number of data exchanges between two parties and possibility of...
Article
Distributed storage systems merge a number of storage sites into a collective whole. Files are split into smaller pieces which are computationally manipulated and then distributed to the storage sites. It recovers some subset of pieces when a client wants to read a file whereas those pieces are combined to reconstruct the original file. Distributed...
Article
Full-text available
Web services motivate phishers to evolve more deceptive websites as their never-ending threats to users. This intricate challenge enforces researchers to develop more proficient phishing detection approaches that incorporate hybrid features, machine learning classifiers, and feature selection methods. However, these detection approaches remain inco...
Article
Full-text available
Phishers frequently craft novel deceptions on their websites and circumvent existing anti-phishing techniques for insecure intrusions, users’ digital identity theft, and then illegal profits. This raises the needs to incorporate new features for detecting novel phish websites and optimizing the existing anti-phishing techniques. In this light, 58 n...
Article
Globally, the number of Smartphone users has risen above a billion, and most of users use them to do their day-today activities. Therefore, the security of smartphones turns to a great concern. Recently, Android as the most popular smartphone platform has been targeted by the attackers. Many severe attacks to Android are caused by malicious applica...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) is much more attractive area for the researchers due to its versatile applications like tactical surveillance, assisted navigation, equipment monitoring, oceanography data collection, pollution monitoring, offshore exploration, disaster prevention and seismic monitoring. The researchers are also collectin...
Article
Full-text available
Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated...
Article
Full-text available
Phishers usually evolve their web exploits to defeat current anti-phishing community. Accordingly, that becomes a serious web threat and puts both users and enterprises at the risks of identity theft and monetary losses day by day. In the literature, most computational efforts were dedicated to justify well-performed phishing detection against evol...
Article
Full-text available
Recently, limited anti-phishing campaigns have given phishers more possibilities to bypass through their advanced deceptions. Moreover, failure to devise appropriate classification techniques to effectively identify these deceptions has degraded the detection of phishing websites. Consequently, exploiting as new; few; predictive; and effective feat...
Article
Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is th...
Conference Paper
In cryptography, secret sharing is a technique to share a secret among a group of members, each of which holds a portion of the secret. The secret can only be retrieved when a certain number of members combine their shares together, while any combination with fewer shares has no extra information about the secret. There are many secret sharing sche...
Article
The challenge of providing security for Mobile Ad-hoc Networks (MANETs) due to the inherent problems regarding to the use of mobile devices and nonexistence of fixed infrastructures, made them one of the significant topics in security and cryptography research area. In this way, several works have been done to propose lightweight and less energy co...
Article
Full-text available
The development of cloud computing has revolutionized in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT manufacturing. It has become attractive to businesses and organizations. Although of all the benefits of the cloud, enterprise customers are stil...
Article
Full-text available
In past few years, cloud computing is one of the popular paradigm to host and deliver services over Internet. It is having popularity by offering multiple computing services as cloud storage, cloud hosting and cloud servers etc., for various types of businesses as well as in academics. Though there are several benefits of cloud computing, it suffer...
Article
Full-text available
The development of cloud computing has revolutionized in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT manufacturing. It has become attractive to businesses and organizations. Although of all the benefits of the cloud, enterprise customers are stil...
Article
The borderline separating users on the Internet is limited to the classical object-system identifiers such as users-login-ID, and network parameters, which is assumed to belong to a benign user. These assumptions provide subtle platform for malicious action in addition to exploitation of the vulnerability in online anonymity. The study proposes a h...
Article
Due to the importance of security in many critical applications in MANETs and the limitation of the resources in mobile devices, it is important to have lightweight cryptosystems. Although some lightweight certificateless cryptosystems for MANETs have been proposed, it is possible to improve them in the term of reducing the complexity of the comput...
Article
Nowadays, the topic of multipurpose use of mages is thriving in the fields of security establishment, authentication, watermarking, and etc. Simultaneously, the rise of multidisciplinary fields has drowned more attentions to this topic. Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandw...
Article
Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization enables Cloud computing to provide hardware and software services to the users on demand. Actually, many companies migrates to the Cloud computing for many reasons such as capabilities of processor, bus speed, size of storage, memory and managed to r...
Article
Medical image survivability and confidentiality is an important concern for digital medical image storing in healthcare institution. Survivability issue arises when a storage server goes down due to unexpected disasters whilst medical image confidentiality issue arises due to disclosed data by third party on a conventional storage. This study explo...
Article
Technology is the combination of knowledge and working hard. When users want to accomplish something using special technology, they do not want to know how it works. Technologies are coming to solve and ease our complex problems. It means that users only want to employ technology without any expert skills. Distributed computing is one of the techno...
Chapter
Cloud computing (CC) is a computing model in which technology resources are delivered over the Internet. Nowadays, it has becoming one of the most popular tools used in educational institutions. The salient features of CC can be exploited for both teaching and administration purposes. This paper aims to look into the acceptance of CC in Malaysian p...
Chapter
Due to the resource constrained property of mobile ad hoc networks (MANETs), making their application more lightweight is one of the challenging issues. In this area, there exists a large variety of cryptographic protocols especially in the context of public key cryptosystems. The difficulty of managing complex public key infrastructures in traditi...