Shahrulniza Musa

Shahrulniza Musa
University of Kuala Lumpur | unikl · Malaysian Institute of Information Technology

PhD (Loughborough University, UK)
My current research interests are in the area of CyberSecurity, IoT Security, SCADA Security and BigData.

About

102
Publications
62,028
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,205
Citations
Introduction
My current research interests are in the area of CyberSecurity, IoT Security, SCADA Security, block chain and BigData. In addition, Software Defined Networking (SDN) and software engineering are also my research interest as the research trend currently.
Additional affiliations
October 1995 - present
University of Kuala Lumpur
Position
  • Professor (Full)
Education
October 2005 - October 2008
Loughborough University
Field of study
  • Communication Network Security
October 2003 - September 2005
Loughborough University
Field of study
  • Postgraduate Diploma in Integrated Research Studies (Digital Communication System)

Publications

Publications (102)
Article
Full-text available
The ubiquitous and ever-evolving nature of cyber threats demands innovative approaches that can adapt to the dynamic relationships and structures within network data. Traditional models struggle to adapt to the continuously changing nature of network traffic, where both structural dependencies and temporal evolution must be accurately captured to d...
Article
Full-text available
Effective transfer learning, within medical image classification, is probably one of the most critical areas of research due to the associated complexities with the nature of medical images. These involve variations in the acquisition techniques of images, resolutions, modalities, and patient demographics. This study aims to develop a robust transf...
Article
Full-text available
Social media applications, such as Twitter and Facebook, allow users to communicate and share their thoughts, status updates, opinions, photographs, and videos around the globe. Unfortunately, some people utilize these platforms to disseminate hate speech and abusive language. The growth of hate speech may result in hate crimes, cyber violence, and...
Article
Full-text available
The ever-increasing heterogeneous connections and the demands of the users pose many new challenges to the network service providers to sustain by providing improved quality of service (QoS). Software-defined networking (SDN) is a game changer in networking by allowing user customization to enhance performance. With the advent of 5G and the increas...
Article
Full-text available
In today’s competitive world, software organizations are moving towards global software development (GSD). This became even more significant in times such as COVID-19 pandemic, where team members residing in different geographical locations and from different cultures had to work from home to carry on their tasks and responsibilities as travelling...
Article
Full-text available
Software development through teams at different geographical locations is a trend of modern era, which is not only producing good results without costing lot of money but also productive in relation to its cost, low risk and high return. This shift of perception of working in a group rather than alone is getting stronger day by day and has become a...
Article
Full-text available
Over the last two decades, social media platforms have grown dramatically. Twitter and Facebook are the two most popular social media platforms, with millions of active users posting billions of messages daily. These platforms allow users to have freedom of expression. However, some users exploit this facility by disseminating hate speeches. Manual...
Article
Full-text available
The demand for global software development is growing. The nonavailability of software experts at one place or a country is the reason for the increase in the scope of global software development. Software developers who are located in different parts of the world with diversified skills necessary for a successful completion of a project play a cri...
Article
Full-text available
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern, decisive, secure, and insight-driven arena to address the current and future challenges. The key technologies l...
Article
Full-text available
Fault Tolerance (FT) is one of the cloud’s very critical problems for providing security assistance. Due to the diverse service architecture, detailed architectures & multiple interrelationships that occur in the cloud, implementation is complicated. A few other previous studies attempt to integrate the different fault tolerance frameworks and solu...
Article
Full-text available
Software development through teams at different geographical locations is a trend of modern era, which is not only producing good results without costing lot of money, but also productive in relation to its cost with low risk and high return. This shift of perception of working in a group rather than alone is getting stronger day by day and has bec...
Article
Full-text available
Software development through teams at different geographical locations is a trend of modern era, which is not only producing good results without costing lot of money, but also productive in relation to its cost with low risk and high return. This shift of perception of working in a group rather than alone is getting stronger day by day and has bec...
Article
Full-text available
Abstract: The emerging technologies trending up in information and communication technology are tuning the enterprises for betterment. The existing infrastructure and operations (I&O) are supporting enterprises with their services and functionalities, considering the diverse requirements of the end-users. However, they are not free of the challenge...
Article
Full-text available
The emerging technologies trending up in information and communication technology are tuning the enterprises for betterment. The existing infrastructure and operations (I&O) are supporting enterprises with their services and functionalities, considering the diverse requirements of the end-users. However, they are not free of the challenges and issu...
Article
Full-text available
Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid...
Article
Full-text available
The past few years have witnessed the emergence of a novel paradigm called cloud computing. CC aims to provide computation and resources over the internet via dynamic provisioning of services. There are several challenges and issues associated with implementation of CC. This research paper deliberates on one of CC main problems i.e. load balancing...
Article
Full-text available
Model-based requirements engineering (MBRE) is an approach that empowers requirements engineers with adequate models to perform requirements engineering (RE) activities. This approach is increasingly becoming an essential part of system engineering projects as it reduces development time, enhances analysis capability and increases the potential for...
Article
Full-text available
The traditional networks are facing difficulties in managing the services offered by cloud computing, big data, and the Internet of Things as the users have become more dependent on their services. Software-Defined Networking (SDN) has pulled enthusiasm in the integration process of technologies and function as per the user's requirements for both...
Article
In today’s competitive world software organizations are moving towards global software development environment where experts in teams from different geographical locations and different cultures are working on their roles and responsibilities to deliver a quality and cost-effective product. These teams are distributed in nature and work on same set...
Chapter
Full-text available
Numerous security researchers have a growing interest in the vulnerabilities of the in-vehicle Controller Area Network (CAN) bus system to cyber-attacks. The adversaries can leverage these vulnerabilities in manipulating vehicle functions and harming the drivers’ safety. Some security mechanisms proposed for CAN bus in detecting anomalies have favo...
Preprint
Full-text available
With a rapid growth in the IT industry, Internet of Things (IoT) has gained a tremendous attention and become a central aspect of our environment. In IoT the things (devices) communicate and exchange the data without the act of human intervention. Such autonomy and proliferation of IoT ecosystem make the devices more vulnerable to attacks. In this...
Preprint
Full-text available
The Internet of Things (IoT) is undergoing rapid growth in the IT industry, but, it continues to be associated with several security and privacy concerns as a result of its massive scale, decentralised topology, and resource-constrained devices. Blockchain (BC), a distributed ledger technology used in cryptocurrency has attracted significant attent...
Preprint
Full-text available
Internet of Things (IoT) occupies a vital aspect of our everyday lives. IoT networks composed of smart-devices which communicate and transfer the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make these devices threatened and prone to a severe kind of threats. In this paper,...
Conference Paper
Full-text available
In recent years, Internet of Things (IoT) occupies a vital aspect of our daily lives. IoT networks composed of smart-devices which communicate and exchange the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make the devices more vulnerable and prone to a severe kind of threats...
Chapter
Full-text available
With the emerging wireless technology integrated into modern vehicles, this introduces an enormous number of vulnerabilities for adversaries to compromise the vehicle internal system. Nonetheless, the attacks can be alleviated using anomaly detection mechanism which have been proven to be effective in monitoring and detecting attacks. In this paper...
Article
Full-text available
Software Product Lines (SPLs) can aid modern ecosystems by rapidly developing large-scale software applications. SPLs produce new software products by combining existing components that are considered as features. Selection of features is challenging due to the large number of competing candidate features to choose from, with different properties,...
Conference Paper
Full-text available
With a rapid growth in the IT industry, Internet of Things (IoT) has gained a tremendous attention and become a central aspect of our environment. In IoT the things (devices) communicate and exchange the data without the act of human intervention. Such autonomy and proliferation of IoT ecosystem make the devices more vulnerable to attacks. In this...
Preprint
Full-text available
In Cloud computing environment the resources are managed dynamically based on the need and demand for resources for a particular task. With a lot of challenges to be addressed our concern is Load balancing where load balancing is done for optimal usage of resources and reduces the cost associated with it as we use pay-as-you-go policy. The task sch...
Preprint
Full-text available
Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack...
Article
Full-text available
Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack...
Article
Full-text available
All the services offered by cloud computing are bundled into one service know as IT as a Service (ITaaS). The user’s processes are executed using these services. The scheduling techniques used in the cloud computing environment execute the tasks at different datacenters considering the needs of the consumers. As the requirements vary from one to on...
Article
Full-text available
The majority of pilgrims do not speak Arabic and may encounter difficulties performing Hajj in terms of appropriate procedures and places due to their unfamiliarity. Most pilgrims are there for the first time. Researchers and practitioners have sought to develop mobile-based applications to assist pilgrims in various tasks such as finding their way...
Article
Full-text available
Malware analysis for Android systems has been the focus of considerable research in the past few years due to the large customer base moving towards Android, which has attracted a corresponding number of malware writers. Several techniques have been used to detect the malicious behavior of Android applications as well as that of the complete system...
Article
Full-text available
The Internet of Things (IoT) is undergoing rapid growth in the IT industry, but, it continues to be associated with several security and privacy concerns as a result of its massive scale, decentralised topology, and resource-constrained devices. Blockchain (BC), a distributed ledger technology used in cryptocurrency has attracted significant attent...
Article
Full-text available
Security of applications running on remote devices has become an essential need of enterprises. For this purpose, several software-based solutions have been proposed. However, it has been observed that software solutions are vulnerable to several kinds of attacks. Moreover, they cannot protect and monitor all parts of the system. To overcome this p...
Article
Full-text available
The Internet of Things (IoT) is undergoing rapid growth in the IT industry, but, it continues to be associated with several security and privacy concerns as a result of its massive scale, decentralised topology, and resource-constrained devices. Blockchain (BC), a distributed ledger technology used in cryptocurrency has attracted significant attent...
Article
Full-text available
Developing Software through a globally distributed team is a modern trend, which is not only cost effective but also yields best project results mitigating risk and increasing return on investment. This is easily achieved by ensuring through put in production is maintained at all times irrespective of the clock time and geographical boundaries. Thi...
Article
Full-text available
The growing number of malware attacks poses serious threats to private data and to the expensive computing resources. To detect malware and their associated families, anti-malware companies rely on signatures which indeed include regular expressions and strings. The recent malware attacks in the last few years including the resurgence of ransomware...
Chapter
Full-text available
Cloud computing and the services offered by cloud computing in the field of Information and Communication Technology has impacted the enterprises and is stimulating at a more prominent pace in the recent years. Various studies have been conducted in the field to meet the client’s requirements and raise the quality of services offered. Based on the...
Conference Paper
Full-text available
Cloud computing and the services offered by cloud computing in the field of Information and Communication Technology has impacted the enterprises and is stimulating at a more prominent pace in the recent years. Various studies have been conducted in the field to meet the client's requirements and raise the quality of services offered. Based on the...
Conference Paper
Full-text available
Lean is a quality improvement methodology that can identify and eliminate waste from processes. While the methodology is widely implemented in manufacturing and automotive, it is also applicable in another area such as service industry of healthcare. Institutions who concern with health, such as the hospital involve complicated and lengthy business...
Article
Full-text available
In the real time processing, a new emerging technology where the need of connecting smart devices with cloud through Internet has raised. IoT devices processed information is to be stored and accessed anywhere needed with a support of powerful computing performance, efficient storage infrastructure for heterogeneous systems and software which confi...
Conference Paper
Full-text available
Computer mediated communication (CMC) applications are widely used in academic field. Students have considerably usage of CMC applications in several applications including learning and social communication. social media networks are commonly used in student's daily life, A few studies focused on exploiting students' opinions on social media networ...
Article
Full-text available
Software product lines (SPL) can speed up the production of software through the auto-generation of products and related subproducts, reducing the need for developer involvement. There are some proposals for defining the requirements for SPL, but they do not propose any method for identifying the eco-systems required for a successful life cycle of...
Article
Full-text available
Lean is a quality improvement methodology that can identify and eliminate waste from processes. While the methodology is widely implemented in manufacturing and automotive, it is also applicable to another area such as the service industry of healthcare. Institutions who concern with health, such as the hospital involve complicated and lengthy busi...
Conference Paper
Full-text available
In the real time processing, a new emerging technology where the need of connecting smart devices with cloud through Internet has raised. IoT devices processed information is to be stored and accessed anywhere needed with a support of powerful computing performance, efficient storage infrastructure for heterogeneous systems and software which confi...
Article
One of the key activities in software product line engineering (SPLE) is the software product management. The shared artifacts of the SPL management is focused on to enable software adaptation and reuse. Considerable improvements are expected in terms of the time it takes to take a product to market, improved flexibility, and reduction in costs, co...
Article
Full-text available
In this era of technology, cloud computing technology has become essential part of the IT services used the daily life. In this regard, website hosting services are gradually moving to the cloud. This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious th...
Conference Paper
Full-text available
Security is an important factor in today's IT infrastructure due to complex and vast variety of malware threats. One way to tackle these malware is via signature based techniques. However, this requires human e�ort in identification of threats and is not scalable. The second way is to detect malware via behavior-based reference monitor so called `O...
Article
Full-text available
In Cloud computing environment the resources are managed dynamically based on the need and demand for resources for a particular task. With a lot of challenges to be addressed our concern is Load balancing where load balancing is done for optimal usage of resources and reduces the cost associated with it as we use pay-as-you-go policy. The task sch...
Article
Full-text available
Security is an important factor in today's IT infrastructure due to complex and vast variety of malware threats. One way to tackle these malware is via signature-based techniques. However, this requires human effort in identification of threats and is not scalable. The second way is to detect malware via behavior-based reference monitor so called '...
Conference Paper
Full-text available
Measurement and reporting of dynamic behavior of a target application is a pressing issue in the Trusted Computing paradigm. Remote attestation is a part of trusted computing, which allows monitoring and verification of a complete operating system or a specific application by a remote party. Several static remote attestation techniques have been pr...