
Miss Laiha Mat KiahUniversity of Malaya | UM · Faculty of Computer Science & Information Technology
Miss Laiha Mat Kiah
PhD (Univ of London)
About
135
Publications
92,339
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,329
Citations
Introduction
Additional affiliations
Education
January 2003 - June 2007
September 1997 - September 1998
June 1993 - April 1997
Publications
Publications (135)
The proliferation of the Bring Your Own Device (BYOD) policy has instigated a widespread change across organizations. However, employees’ compliance toward BYOD security policy remains a challenge. Building on the organizational control, security culture, and social cognitive theory, a research framework for analyzing BYOD security policy complianc...
A smart contract is a digital program of transaction protocol (rules of contract) based on the consensus architecture of blockchain. Smart contracts with Blockchain are modern technologies that have gained enormous attention in scientific and practical applications. A smart contract is the central aspect of a blockchain that facilitates blockchain...
The regular PIN-entry method has been still the most common method of authentication for systems and networks. However, PINs are easy to be captured through various attacks, including shoulder-surfing, video-recording, and spyware. This could be attributed to the involuntary nature of entering the original PIN during authentication. In this paper,...
A smart contract is a digital program of transaction protocol (rules of contract) based on the consensus architecture of blockchain. Smart contracts with Blockchain are modern technologies that have gained enormous attention in scientific and practical applications. A smart contract is the central aspect of a blockchain that facilitates blockchain...
Authenticated Encryption (AE) protects confidentiality and integrity at the same time. The sponge construction is based on an iterated permutation or transformation that can be used to implement hashing, and AE schemes, among others. Sponge-based AE schemes offer desirable characteristics like parallelizability and incrementality. In addition, they...
Motivation. Standardization in smart city applications is restricted by the competitive pressures of proprietary innovation and technological compartmentalization. Interoperability across networks, databases, and APIs is essential to achieving the smart objectives of technology-supported urban environments. Methodology. The issues that smart cities...
Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today’s employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security and service delivery, particularly in the government s...
The process of collecting driving data and using a computational model to generate a safety score for the driver is known as driver behavior profiling. Existing driver profiles attempt to categorize drivers as either safe or aggressive, which some experts say is not practical. This is due to the “safe/aggressive” categorization being a state that d...
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and...
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in constructing AE schemes, followed by stream ciphers and compression functions until the sponge construction emerged in 2011. Sponge-based...
Road accidents are increasing every year in Malaysia, and it is always challenging to collect reliable pre-crash data in the transportation community. Existing studies relied on simulators, police crash reports, questionnaires, and surveys to study Malaysia’s drivers’ behavior. Researchers previously criticized such methods for being biased and unr...
In the plan and development of Intelligent Transportation Systems (ITS), understanding drivers behaviour is considered highly valuable. Reckless driving, incompetent preventive measures, and the reliance on slow and incompetent assistance systems are attributed to the increasing rates of traffic accidents. This survey aims to review and scrutinize...
The strength of Vehicular Ad hoc Networks (VANETs) and the rapid deployment capability, can be used in many situations where the network should be arranged in a short time and there is a need to collect sensitive information. We consider cluster-based attack detection in data compilation wherever the neighbor nodes give the important information to...
The expeditious growth of the wearable and implantable body sensors and wireless communication technologies have provided both inspiration and motivation for increasingly development of m-healthcare information systems as a promising next generation e-health system. In m-healthcare systems, the authorized mobile patients with the same disease sympt...
The Editors have retracted this article [1] because it shows significant overlap with another publication by the same authors [2].
The offline signatures are the most widely adopted biometric authentication techniques in banking systems, administrative and financial applications due to its simplicity and uniqueness. Several automated techniques have been developed to anticipate the genuineness of the offline signature. However, the recapitulate of the existing literature on ma...
The extensive technological participation in our daily life and business world has transformed the technology model predominantly from last decade and it has created many directions for further research and development. In previous generations of technology, the major development was hardware side but now it is shifting to the smart and intelligent...
Previous research in Smart City technologies has been narrow and system-specific in both their orientation and focus. Specificity creates the homogeneity of systems architecture that, while beneficial from an experimental position, is entirely incompatible with the broader needs of a system standard. The current review seeks to examine existing res...
Although conventional PIN-entry methods are widely used in many daily authentication procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry methods have been proposed in the literature to mitigate such attacks. Unfortunately, none of these methods is capable of replacing the conventional PIN-entry method. This...
Over the past few years, the cloud based storage providers such as Google drive, OneDrive, Box and Dropbox are increasingly being used to store users personal profile based data, which users could share over cloud storage devices. Immediately, the users data leaves the user premises and enters the cloud storage, the user has lost all the control ov...
The omnipresence of Bring Your Own Device (BYOD) in organizations and employees’ lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute to security policy compliant behavior to create a secur...
In recent years, group-based applications (GBAs) have gained popularity due to their interesting and promising functionalities such as video on demand, teleconferencing, and pay per view. The advancements in wireless networks and the emergence of mobile devices such as smartphones and tablets have also increased the demands for GBAs.
However, the i...
The strength of Vehicular Ad hoc Networks (VANETs) and the rapid deployment capability, can be used in many situations where the network should be arranged in a short time and there is a need to collect sensitive information. We consider cluster-based attack detection in data compilation wherever the neighbor nodes give the important information to...
Financial Technology (FinTech) has attracted a wide range of attention and is rapidly proliferating. As a result of its consistent growth new terms have been introduced in this domain. The term ‘FinTech’ is one such terminology. This term is used for describing various operations that are being frequently employed in the financial technology sector...
A crucial conduct norm for a sensor network is to avoid network failures and packet drop. One of the other essential requirements is to effectively manage the energy levels of the nodes according to the states of the operation required for an application. This paper focuses to propose an energy management model with the aim of allowing energy optim...
The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in com...
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other...
The new and disruptive technologies for ensuring smartphone security are very limited and largely scattered. The available options and gaps in this research area must be analysed to provide valuable insights about the present technological environment. This work illustrates the research landscape by mapping the existing literature to a comprehensiv...
The Editor-in-Chief has retracted this article (Petković et al. 2015a) because validity of the content of this article cannot be verified.
The key management has a fundamental role in securing group communications taking place over vast and unprotected networks. It is concerned with the distribution and update of the keying materials whenever any changes occur in the group membership. Wireless mobile environments enable members to move freely within the networks, which causes more dif...
Group-based systems, such as e-health systems, have been introduced since the last few decades. E-health systems can be used anytime and anywhere for patient monitoring. Wireless networks are continuously used to monitor patients’ conditions and recovery progress. The confidentiality, integrity and authenticity of patients’ health records are impor...
The new and disruptive technology of smart home applications (hereafter referred to as apps) based on Internet of Things (IoT) is largely limited and scattered. To provide valuable insights into technological environments and support researchers, we must understand the available options and gaps in this line of research. Thus, in this study, a revi...
Cloud computing represents the most recent enterprise trend in information technology and refers to the virtualization of computing resources that are available on demand. Cloud computing saves cost and time for businesses. Moreover, this computing process reflects a radical technological revolution in how companies develop, deploy, and manage ente...
Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on...
Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic computational and storage services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the cloud raises security and p...
Objective:
To survey researchers' efforts in response to the new and disruptive technology of smartphone medical apps, mapping the research landscape form the literature into a coherent taxonomy, and finding out basic characteristics of this emerging field represented on: motivation of using smartphone apps in medicine and healthcare, open challen...
In sensing data to the base station, wireless sensor networks (WSNs) face some security challenges since such networks impose resource constraints that need to be addressed by the routing mechanism. This paper surveys, explores, and informs researchers regarding the landscape of multipath routing by providing the motivation behind multipath routing...
District heating systems are important utility systems. If these systems are properly managed, they can ensure economic and environmentally friendly provision of heat to connected customers. Potentials for further improvement of district heating systems' operation lie in the improvement of current control strategies. One of the options is the intro...
Various software packages offer a large number of customizable features to meet the specific needs of organizations. Improper selection of a software package may result in incorrect strategic decisions and subsequent economic loss of organizations. This paper presents a comparative study that aims to evaluate and select open-source electronic medic...
Breast cancer is the top cancer in women worldwide. Scientists are looking for early detection strategies which remain the cornerstone of breast cancer control. Consequently, there is a need to develop an expert system that helps medical professionals to accurately diagnose this disease. Artificial immune recognition system (AIRS) has been used suc...
Tuberculosis is a major global health problem that has been ranked as the second leading cause of death from an infectious disease worldwide, after the human immunodeficiency virus. Diagnosis based on cultured specimens is the reference standard; however, results take weeks to obtain. Slow and insensitive diagnostic methods hampered the global cont...
This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nati...
Purpose
– The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to identify the gaps in the cybersecurity awareness asses...
Gripping and holding objects are key tasks for robotic manipulators. The development of universal fingers able to pick up unfamiliar objects of widely varying shapes and surfaces is a very challenging task. Passively compliant underactuated mechanisms are one way to obtain the finger which could accommodate to any irregular and sensitive grasping o...
This study proposed a pornography classifier using multi-agent learning as a combination of the Bayesian method using color features extracted from skin detection based on the YCbCr color space and the back-propagation neural network method using shape features also extracted from skin detection. The classification of pornographic images was made m...
Evaluating and selecting software packages that meet the requirements of an organization are difficult aspects of software engineering process. Selecting the wrong open-source EMR software package can be costly and may adversely affect business processes and functioning of the organization. This study aims to evaluate and select open-source EMR sof...
Lens system design is an important factor in image quality. The main aspect of the lens system design methodology is the optimization procedure. Since optimization is a complex, non-linear task, soft computing optimization algorithms can be used. There are many tools that can be employed to measure optical performance, but the spot diagram is the m...
This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. T...
The current paper presents an investigation of the accuracy of soft computing techniques in precipitation estimation. The monthly precipitation data from 29 synoptic stations in Serbia from 1946 to 2012 are used as case study. Despite a number of mathematical functions having been proposed for modeling precipitation estimation, the models still hav...
Stream flow is an important input for hydrology studies because it determines the water variability and magnitude of a river. Water resources engineering always deals with historical data and tries to estimate the forecasting records in order to give a better prediction for any water resources applications, such as designing the water potential of...
One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly bene...
In this study, a new procedure to determine the optimum dimensions for a rectangular collar to minimize the temporal trend of scouring around a pier model is proposed. Unlike previous methods of predicting collar dimensions around a bridge scour, the proposed approach concerns the selection of different collar dimension sizes around a bridge scour...
Wireless networks are increasingly overwhelmed by Distributed Denial of Service (DDoS) attacks by generating flooding packets that exhaust critical computing and communication resources of a victim's mobile device within a very short period of time. This must be protected. Effective detection of DDoS attacks requires an adaptive learning classifier...