Miss Laiha Mat Kiah

Miss Laiha Mat Kiah
  • PhD (Univ of London)
  • University of Malaya

About

145
Publications
108,035
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,260
Citations
Current institution
University of Malaya
Additional affiliations
March 2012 - present
University of Malaya
Position
  • Implementation of Secure Framework for EMRs
Description
  • Principal Investigator
October 1998 - present
University of Malaya
Description
  • Associate Professor
September 1997 - September 1998
Royal Holloway University of London
Description
  • Master in Information Security
Education
January 2003 - June 2007
Royal Holloway University of London
Field of study
  • Information Security
September 1997 - September 1998
Royal Holloway University of London
Field of study
  • Information Security
June 1993 - April 1997
University of Malaya
Field of study
  • Computer Science

Publications

Publications (145)
Article
Full-text available
Underwater image quality often deteriorates, posing significant challenges in extracting underwater information and affecting advanced visual tasks, for instance, tasks in various fields such as oceanography, marine biology, underwater exploration, underwater archaeology, environmental monitoring, and marine engineering. To overcome these issues, m...
Chapter
Previous chapter explained the justification for conducting qualitative research and described the data collection methods involved, followed by a description of the qualitative data analysis process, which covers the selection of the participants and the interviews that were conducted. This chapter first presents the findings of the qualitative re...
Chapter
The research methodology is the key component of the study that outlines the detailed activities of the research being undertaken. The research method selected is imperative in setting the right direction for the research and ensures the validity of the data collected. The chapter starts by describing the paradigm and various research for the appro...
Chapter
The first chapter explained the research’s context, topic, objectives, questions, and its theoretical and practical contributions. This chapter begins with a literature analysis of BYOD characteristics, benefits and security risks and BYOD security policy compliance models and theories. The aim of thorough review is to lay the foundation for the di...
Chapter
The previous chapter has reviewed theories and factors thoroughly to pave the way for the discovery of important factors impacting the BYOD security policy compliance intention. The identified factors serve as the basis for the conceptualization of the BYOD security policy compliance research framework. Detailed reviews of each hypothesized indepen...
Chapter
Previous studies on BYOD security policy compliance had informed us that little research has been accomplished on identifying factors that influence security policy compliance amongst CNII agencies’ employees. Drawing from various theories namely, Organizational Control Theory, Social Cognitive Theory, security culture, additional factors such as S...
Article
Full-text available
Federated learning (FL) is a popular method where edge devices work together to train machine learning models. This study introduces an efficient network for analyzing healthcare records. It uses VPN technology and applies a federated learning approach over a wireless backhaul network. The study compares different wireless backhaul channels, includ...
Article
Full-text available
This comprehensive review paper examines the challenges faced by blockchain technology in terms of scalability and proposes potential solutions and future research directions. Scalability poses a significant hurdle for Bitcoin and Ethereum, manifesting as low throughput, extended transaction delays, and excessive energy consumption, thereby comprom...
Article
Full-text available
One significant aspect of 5G networks involves expanding radio access into the millimeter-wave spectrum. However, the demand for higher throughput from emerging services necessitates the utilisation of the Terahertz (THz) spectrum. This transition introduces interdisciplinary challenges to wireless communication stacks, influencing network modellin...
Article
Full-text available
Offline signature verification (OfSV) is essential in preventing the falsification of documents. Deep learning (DL) based OfSVs require a high number of signature images to attain acceptable performance. However, a limited number of signature samples are available to train these models in a real-world scenario. Several researchers have proposed mod...
Article
Full-text available
A smart contract is a digital program of transaction protocol (rules of contract) based on the consensus architecture of blockchain. Smart contracts with Blockchain are modern technologies that have gained enormous attention in scientific and practical applications. A smart contract is the central aspect of a blockchain that facilitates blockchain...
Article
Full-text available
The proliferation of the Bring Your Own Device (BYOD) policy has instigated a widespread change across organizations. However, employees’ compliance toward BYOD security policy remains a challenge. Building on the organizational control, security culture, and social cognitive theory, a research framework for analyzing BYOD security policy complianc...
Preprint
Full-text available
A smart contract is a digital program of transaction protocol (rules of contract) based on the consensus architecture of blockchain. Smart contracts with Blockchain are modern technologies that have gained enormous attention in scientific and practical applications. A smart contract is the central aspect of a blockchain that facilitates blockchain...
Article
Full-text available
The regular PIN-entry method has been still the most common method of authentication for systems and networks. However, PINs are easy to be captured through various attacks, including shoulder-surfing, video-recording, and spyware. This could be attributed to the involuntary nature of entering the original PIN during authentication. In this paper,...
Article
Full-text available
Authenticated Encryption (AE) protects confidentiality and integrity at the same time. The sponge construction is based on an iterated permutation or transformation that can be used to implement hashing, and AE schemes, among others. Sponge-based AE schemes offer desirable characteristics like parallelizability and incrementality. In addition, they...
Article
Full-text available
Motivation. Standardization in smart city applications is restricted by the competitive pressures of proprietary innovation and technological compartmentalization. Interoperability across networks, databases, and APIs is essential to achieving the smart objectives of technology-supported urban environments. Methodology. The issues that smart cities...
Article
Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today’s employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security and service delivery, particularly in the government s...
Article
Full-text available
The process of collecting driving data and using a computational model to generate a safety score for the driver is known as driver behavior profiling. Existing driver profiles attempt to categorize drivers as either safe or aggressive, which some experts say is not practical. This is due to the “safe/aggressive” categorization being a state that d...
Article
Full-text available
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and...
Article
Full-text available
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in constructing AE schemes, followed by stream ciphers and compression functions until the sponge construction emerged in 2011. Sponge-based...
Article
Full-text available
Road accidents are increasing every year in Malaysia, and it is always challenging to collect reliable pre-crash data in the transportation community. Existing studies relied on simulators, police crash reports, questionnaires, and surveys to study Malaysia’s drivers’ behavior. Researchers previously criticized such methods for being biased and unr...
Article
Full-text available
In the plan and development of Intelligent Transportation Systems (ITS), understanding drivers behaviour is considered highly valuable. Reckless driving, incompetent preventive measures, and the reliance on slow and incompetent assistance systems are attributed to the increasing rates of traffic accidents. This survey aims to review and scrutinize...
Article
Full-text available
The strength of Vehicular Ad hoc Networks (VANETs) and the rapid deployment capability, can be used in many situations where the network should be arranged in a short time and there is a need to collect sensitive information. We consider cluster-based attack detection in data compilation wherever the neighbor nodes give the important information to...
Preprint
Full-text available
The expeditious growth of the wearable and implantable body sensors and wireless communication technologies have provided both inspiration and motivation for increasingly development of m-healthcare information systems as a promising next generation e-health system. In m-healthcare systems, the authorized mobile patients with the same disease sympt...
Article
Full-text available
The Editors have retracted this article [1] because it shows significant overlap with another publication by the same authors [2].
Article
Full-text available
The offline signatures are the most widely adopted biometric authentication techniques in banking systems, administrative and financial applications due to its simplicity and uniqueness. Several automated techniques have been developed to anticipate the genuineness of the offline signature. However, the recapitulate of the existing literature on ma...
Article
Full-text available
The extensive technological participation in our daily life and business world has transformed the technology model predominantly from last decade and it has created many directions for further research and development. In previous generations of technology, the major development was hardware side but now it is shifting to the smart and intelligent...
Preprint
Full-text available
Previous research in Smart City technologies has been narrow and system-specific in both their orientation and focus. Specificity creates the homogeneity of systems architecture that, while beneficial from an experimental position, is entirely incompatible with the broader needs of a system standard. The current review seeks to examine existing res...
Article
Although conventional PIN-entry methods are widely used in many daily authentication procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry methods have been proposed in the literature to mitigate such attacks. Unfortunately, none of these methods is capable of replacing the conventional PIN-entry method. This...
Article
Over the past few years, the cloud based storage providers such as Google drive, OneDrive, Box and Dropbox are increasingly being used to store users personal profile based data, which users could share over cloud storage devices. Immediately, the users data leaves the user premises and enters the cloud storage, the user has lost all the control ov...
Article
The omnipresence of Bring Your Own Device (BYOD) in organizations and employees’ lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute to security policy compliant behavior to create a secur...
Article
In recent years, group-based applications (GBAs) have gained popularity due to their interesting and promising functionalities such as video on demand, teleconferencing, and pay per view. The advancements in wireless networks and the emergence of mobile devices such as smartphones and tablets have also increased the demands for GBAs. However, the i...
Article
The strength of Vehicular Ad hoc Networks (VANETs) and the rapid deployment capability, can be used in many situations where the network should be arranged in a short time and there is a need to collect sensitive information. We consider cluster-based attack detection in data compilation wherever the neighbor nodes give the important information to...
Article
Full-text available
Financial Technology (FinTech) has attracted a wide range of attention and is rapidly proliferating. As a result of its consistent growth new terms have been introduced in this domain. The term ‘FinTech’ is one such terminology. This term is used for describing various operations that are being frequently employed in the financial technology sector...
Article
Full-text available
A crucial conduct norm for a sensor network is to avoid network failures and packet drop. One of the other essential requirements is to effectively manage the energy levels of the nodes according to the states of the operation required for an application. This paper focuses to propose an energy management model with the aim of allowing energy optim...
Article
The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in com...
Article
Full-text available
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other...
Article
Full-text available
The new and disruptive technologies for ensuring smartphone security are very limited and largely scattered. The available options and gaps in this research area must be analysed to provide valuable insights about the present technological environment. This work illustrates the research landscape by mapping the existing literature to a comprehensiv...
Article
Full-text available
The Editor-in-Chief has retracted this article (Petković et al. 2015a) because validity of the content of this article cannot be verified.
Article
Full-text available
The key management has a fundamental role in securing group communications taking place over vast and unprotected networks. It is concerned with the distribution and update of the keying materials whenever any changes occur in the group membership. Wireless mobile environments enable members to move freely within the networks, which causes more dif...
Article
Full-text available
The Internet today lacks an identity protocol for identifying people and organizations. As a result, service providers needed to build and maintain their own databases of user information. This solution is costly to the service providers, inefficient as much of the information is duplicated across different providers, difficult to secure as evidenc...
Article
Group-based systems, such as e-health systems, have been introduced since the last few decades. E-health systems can be used anytime and anywhere for patient monitoring. Wireless networks are continuously used to monitor patients’ conditions and recovery progress. The confidentiality, integrity and authenticity of patients’ health records are impor...
Article
The new and disruptive technology of smart home applications (hereafter referred to as apps) based on Internet of Things (IoT) is largely limited and scattered. To provide valuable insights into technological environments and support researchers, we must understand the available options and gaps in this line of research. Thus, in this study, a revi...
Article
Full-text available
Cloud computing represents the most recent enterprise trend in information technology and refers to the virtualization of computing resources that are available on demand. Cloud computing saves cost and time for businesses. Moreover, this computing process reflects a radical technological revolution in how companies develop, deploy, and manage ente...
Article
Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on...
Article
Full-text available
Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic computational and storage services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the cloud raises security and p...
Article
Full-text available
Objective: To survey researchers' efforts in response to the new and disruptive technology of smartphone medical apps, mapping the research landscape form the literature into a coherent taxonomy, and finding out basic characteristics of this emerging field represented on: motivation of using smartphone apps in medicine and healthcare, open challen...
Article
In sensing data to the base station, wireless sensor networks (WSNs) face some security challenges since such networks impose resource constraints that need to be addressed by the routing mechanism. This paper surveys, explores, and informs researchers regarding the landscape of multipath routing by providing the motivation behind multipath routing...
Article
District heating systems are important utility systems. If these systems are properly managed, they can ensure economic and environmentally friendly provision of heat to connected customers. Potentials for further improvement of district heating systems' operation lie in the improvement of current control strategies. One of the options is the intro...
Article
Full-text available
Various software packages offer a large number of customizable features to meet the specific needs of organizations. Improper selection of a software package may result in incorrect strategic decisions and subsequent economic loss of organizations. This paper presents a comparative study that aims to evaluate and select open-source electronic medic...
Article
Breast cancer is the top cancer in women worldwide. Scientists are looking for early detection strategies which remain the cornerstone of breast cancer control. Consequently, there is a need to develop an expert system that helps medical professionals to accurately diagnose this disease. Artificial immune recognition system (AIRS) has been used suc...
Article
Tuberculosis is a major global health problem that has been ranked as the second leading cause of death from an infectious disease worldwide, after the human immunodeficiency virus. Diagnosis based on cultured specimens is the reference standard; however, results take weeks to obtain. Slow and insensitive diagnostic methods hampered the global cont...
Article
Full-text available
This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nati...
Article
Purpose – The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to identify the gaps in the cybersecurity awareness asses...
Article
Full-text available
Gripping and holding objects are key tasks for robotic manipulators. The development of universal fingers able to pick up unfamiliar objects of widely varying shapes and surfaces is a very challenging task. Passively compliant underactuated mechanisms are one way to obtain the finger which could accommodate to any irregular and sensitive grasping o...
Article
Full-text available
Evaluating and selecting software packages that meet the requirements of an organization are difficult aspects of software engineering process. Selecting the wrong open-source EMR software package can be costly and may adversely affect business processes and functioning of the organization. This study aims to evaluate and select open-source EMR sof...
Article
Lens system design is an important factor in image quality. The main aspect of the lens system design methodology is the optimization procedure. Since optimization is a complex, non-linear task, soft computing optimization algorithms can be used. There are many tools that can be employed to measure optical performance, but the spot diagram is the m...
Article
This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. T...
Article
Full-text available
This study proposed a pornography classifier using multi-agent learning as a combination of the Bayesian method using color features extracted from skin detection based on the YCbCr color space and the back-propagation neural network method using shape features also extracted from skin detection. The classification of pornographic images was made m...
Article
The current paper presents an investigation of the accuracy of soft computing techniques in precipitation estimation. The monthly precipitation data from 29 synoptic stations in Serbia from 1946 to 2012 are used as case study. Despite a number of mathematical functions having been proposed for modeling precipitation estimation, the models still hav...
Article
Stream flow is an important input for hydrology studies because it determines the water variability and magnitude of a river. Water resources engineering always deals with historical data and tries to estimate the forecasting records in order to give a better prediction for any water resources applications, such as designing the water potential of...
Article
One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly bene...
Article
In this study, a new procedure to determine the optimum dimensions for a rectangular collar to minimize the temporal trend of scouring around a pier model is proposed. Unlike previous methods of predicting collar dimensions around a bridge scour, the proposed approach concerns the selection of different collar dimension sizes around a bridge scour...
Article
Full-text available
Wireless networks are increasingly overwhelmed by Distributed Denial of Service (DDoS) attacks by generating flooding packets that exhaust critical computing and communication resources of a victim's mobile device within a very short period of time. This must be protected. Effective detection of DDoS attacks requires an adaptive learning classifier...
Article
Full-text available
For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services for mobile cloud computing environment should be the resource-constrained mobile devices. The execution of computa...
Article
The quantitative assessment of image quality is an important consideration in any type of imaging system. The modulation transfer function (MTF) is a graphical description of the sharpness and contrast of an imag� ing system or of its individual components. The MTF is also known and spatial frequency response. The MTF curve has different meanings a...
Article
Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to detect such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a game theoretic method is introduced, namely cooperative Game-based Fuzzy Q-learning (G-FQL). G-FQL adopts a combinati...
Article
The wind speed has a huge impact on the wind turbine output energy and safety. Because of this, many control algorithms use a measure of the wind speed to increase performance. Unfortunately, no precise measurement of the effective wind speed is online available from direct measurements, which means that it must be estimated in order to make such c...
Article
Wind energy has become a large contender of traditional fossil fuel energy, particularly with the successful operation of multi-megawatt sized wind turbines. However, reasonable wind speed is not adequately sustainable everywhere to build an economical wind farm. In wind energy conversion systems, one of the operational problems is the changeabilit...
Article
In designing a parallel resonant induction heating system, selecting a suitable capacitor for its parallel circuit is very important. To properly select this capacitor, several solutions have been proposed such as using Lagrange method, standard bacterial foraging and genetic algorithms. Although some of these methods have been performed well, they...
Article
Wind velocity assumes a critical part for measuring the power created by the wind turbines. Nonetheless, power production from wind has a few weaknesses. One significant issue is that wind is a discontinuous energy source which implies that there exists substantial variability in the generation of vigor because of different variables, for example,...
Article
Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to identify such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a bio-inspired method is introduced, namely the Cooperative-based Fuzzy Artificial Immune System (Co-FAIS). It is a mod...
Article
Owing to the scattered nature of Denial-of-Service attacks, it is tremendously challenging to detect such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a hybrid clustering method is introduced, namely a Density-based Fuzzy Imperialist Competitive Clustering Algorithm (D-FI...
Conference Paper
Full-text available
A dynamic and intelligent honeypot have the ability to learn the behavior of the network and automatically configures itself. This research proposed the Case-based Reasoning (CBR) methodology to realize a CBR recommender system for the domain of honeypot configuration and deployment. The prototype recommender system is built using a Java-based CBR...
Article
Full-text available
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, mana...
Article
The development of universal grippers able to pick up unfamiliar objects of widely varying shapes and surfaces is a very challenging task. Passively compliant underactuated mechanisms are one way to obtain the gripper which could accommodate to any irregular and sensitive grasping objects. The purpose of the underactuation is to use the power of on...
Article
Wireless networks are increasingly overwhelmed by Distributed Denial of Service (DDoS) attacks by generating flooding packets that exhaust critical computing and communication resources of a victim's mobile device within a very short period of time. This must be protected. Effective detection of DDoS attacks requires an adaptive learning classifier...
Article
Due to the popularization of digital technology, the demand for high-quality digital products has become critical. The quantitative assessment of image quality is an important consideration in any type of imaging system. Therefore, developing a design that combines the requirements of good image quality is desirable. Lens system design represents a...
Article
A wind power plant which consists of a group of wind turbines at a specific location is also known as wind farm. To maximize the wind farm net profit, the number of turbines installed in the wind farm should be different in depend on wind farm project investment parameters. In this paper, in order to achieve the maximal net profit of a wind farm, a...
Article
Nowadays the use of renewable energy including wind energy has risen dramatically. Because of the increasing development of wind power production, improvement of the prediction of wind turbine output energy using classical or intelligent methods is necessary. To optimize the power produced in a wind turbine, speed of the turbine should vary with wi...
Article
Full-text available
The advancement of information technology has facilitated the automation and feasibility of online information sharing. The second generation of the World Wide Web (Web 2.0) enables the collaboration and sharing of online information through Web-serving applications. Data mashup, which is considered a Web 2.0 platform, plays an important role in in...
Article
Background: There is a high risk of tuberculosis (TB) disease diagnosis among conventional methods. Objectives:This study is aimed at diagnosing TB using hybrid machine learning approaches. Materials and Methods: Patient epicrisis reports obtained from the Pasteur Laboratory in the north of Iran were used. All 175 samples have twenty features. The...

Network

Cited By