Suhaimi Ibrahim

Suhaimi Ibrahim
  • B.Sc, M.Sc, PhD in Computer Science
  • Head of Faculty at University of Technology Malaysia

About

140
Publications
194,523
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,517
Citations
Introduction
I have been attached to UTM as an academic staff in computer science since 1982 and have about 30 years of experience in teaching and research. My research area of interest includes requirement engineering, software testing, semantic web services, software process improvement and mobile computing.
Current institution
University of Technology Malaysia
Current position
  • Head of Faculty
Additional affiliations
January 2010 - March 2016
University of Technology Malaysia
Position
  • Prof / Deputy Dean (Research & Innovation)
January 2000 - April 2017
University of Technology Malaysia
Position
  • Prof / Deputy Dean (Research & Innovation)
February 1982 - November 2015
University of Technology Malaysia
Position
  • Prof / Deputy Dean (Research & Innovation)

Publications

Publications (140)
Article
Full-text available
The development of the information technology (IT) implementation readiness model for SMEs is required to investigate the status of usage of IT among SMEs in Malaysia towards the industrial revolution 4.0. It also investigates the obstacles in the implementation of IT in SMEs. Literature and empirical studies have identified ten critical success fa...
Conference Paper
Aiming effective information extraction from textual documents, an important task is the Cross-document Coreference Resolution (CCR) in which co-referring entity mentions are resolved across multiple documents. The task of CCR, consists of multiple processing stages in which each stage plays a critical role in the whole process. In this paper, an o...
Article
Full-text available
Recently, software development industry is one of the most rapidly growing businesses and is considered as worthy economic activity of which the SMEs take the main role in such business. Somehow, most of SMEs cannot afford or successfully implement SPI framework like CMMI officially as a result of the financial requirements and difficulties associa...
Conference Paper
Grounded theory is an approach that can be used to analyse qualitative data. It is a systematic approach for data collection, handling and analysis. The objective of this paper is to present adapted grounded theory approach as data analysis strategy to identify value-based factors in software development. The grounded theory procedure started with...
Article
Requirement prioritization are considered crucial towards the development of successful and high quality software. Nowadays, most software development project and people in software industries are confronted with the challenge of implementing a large scale, complex and dynamic software applications. Hence, the need to use a requirement prioritizati...
Article
Full-text available
Ample of research has been carried out on the topic software metrics. Lots of metrics have been projected and validated in the field of software engineering especially for software development. However, metrics that related to software project management are still need to explore more especially from the industrial or practitioners. Identification...
Article
Using the internet, as a dynamic environment thanks to its distributed characteristic, for web service deployment has become a crucial issue in QoS-driven service composition. An accurate adaption should be undertaken to provide a reliable service composition which enables the composited services are being executed appropriately. That is, the criti...
Article
Requirements prioritization is one of process in requirement engineering which aim to manage the order of urgency and implementation a set of requirements. Requirement prioritization also used in software development project to cope with the limited resources allocated. Many research have been done at industrial and academic level in this particula...
Article
Successful implementation of software projects development is entirely depending upon successful monitoring and control mechanism. Software metrics can deliver the necessary information for monitoring and control the software projects development for its enhancement. However, the current software metrics does not widely address the performance crit...
Article
Software process tailoring is an approach to customise the existing software development process or model that able to meet the software project’s needs. Software development project is unique and identical from one and another whereby the practices and decision should not be equally treated. Software process tailoring requires knowledge and intuit...
Article
The software engineering domain has witnessed the emergence of the concept of Value-Based Software Engineering (VBSE), which intends to change conventional software engineering practices to become value-centric, and produce valuable products. However, there is an absence of a main list of value-based factors that focus on software development. This...
Conference Paper
Software development plays a major role in the production of software products. This process must be carefully designed in order to successfully deliver the end product, and at the same time fulfill the values desired. Value-Based Software Engineering (VBSE) aims to convert the value-neutral setting in developing software to become a more value-cen...
Conference Paper
This paper aims at estimating the extant uranium by soft computing approach. The rising contribution of this resource in the energy cycle is the reason to this research. Untidy relations and uncertain values in geological data increase the complexity of estimating extant uranium, and thus it requires a proper approach. This paper applies artificial...
Conference Paper
Successful implementation of software projects development are entirely depending upon successful monitoring and controlling mechanism on software project management. Development of metrics for each element in a software project development will lead the software projects to achieve its objectives. The aim of this study is to formulate a Metric bas...
Article
A regression method desires to fit the curve on a data set irrespective of outliers. This paper modifies the granular box regression approaches to deal with data sets with outliers. Each approach incorporates a three-stage procedure includes granular box configuration, outlier elimination, and linear regression analysis. The first stage investigate...
Conference Paper
Granulation simplifies the data to better understand its complexity. It comforts this understanding by extracting the structure of data, essentially in big data or cloud computing scales. It can extract a simple granular-rules set from a complex data set. Granulation is associated with theory of fuzzy information granulation, which can be supported...
Article
Successful implementation of software projects are completely depending upon successful monitoring and controlling mechanism. The ignorance of monitoring and controlling mechanism by the project managers and the team members in a software projects development, leading to inadequate decision with fruitless outcomes. One of the ways to monitor the so...
Chapter
Customer satisfaction is a measure of how a company meets or surpasses customers' expectations. It is seen as a key element in business strategy; and therefore, enhancing the methods to evaluate the satisfactory level is worth studying. Collecting rich data to know the customers’ opinion is often encapsulated in verbal forms, or linguistic terms, w...
Article
E-portfolio benefits have been widely recognized in literature, although they are most commonly integrated for benefit in academic. This article discusses the benefits observed from integration, as well as the demand for improved portfolio developments, using a small range of peer-reviewed studies as supporting evidence. The discussion and analysis...
Conference Paper
This paper introduces the idea of CVSS-host scores which utilize CVSS parameters to provide impact scoring for Smart Grid Environment. This scoring mechanism presents a novel view of system risk by framing an-upper bounds on the criticality of potential vulnerabilities in that system. Once this scoring system has been established, the CVSS vectors...
Conference Paper
This paper introduces a framework for evaluating the threat exposure of a large scale smart grid environment. The framework utilizes a model based on access graphs to determine the system's attack exposure. This method also implements quantitative metrics to evaluate acceptable exposure levels. This evaluation framework also introduces a method to...
Conference Paper
This paper documents the design and implementation of the platform while proposing cyber attack scenarios which will gave high impact towards grid operations. In addition, we documents the results of an initial cyber vulnerability assessment to evaluate the security posture assessment of the current design.
Conference Paper
Today few organizations have a thorough understanding of what is on their networks at any given time. This study tries to develop Computer and Network Asset Manager (CNAM) that is a network management application which helps large enterprises, and Small medium enterprises (SMEs) service providers, manage their data centers and IT infrastructure eff...
Conference Paper
Full-text available
As the technology trend in the recent years uses the systems with network bases, it is crucial to detect them from threats. In this study, the following methods are applied for detecting the network attacks: support vector machine (SVM) classifier, artificial Neural Networks (ANN), and Genetic Algorithms (GA). The objective of this study is to comp...
Article
The visualization of 3D objects on maps in mobile devices could enhance user perception of the objects on the map. However, in order to improve the interaction of the user with the mobile device that contains the 3D map for navigation, the path and location should be represented with a reasonable degree of accuracy and true to life. This paper util...
Conference Paper
This paper proposes the design of specific programme dedicated for students who want to specialize in software testing at postgraduate level. The motivation behind this proposal is to encourage more higher learning institutions to offer variety of software engineering related programme, in particular software testing so that this area is recognized...
Conference Paper
As defined in various quality models, usability is recognized as an important attribute of software quality. Failing to address usability requirements in a software product could lead to poor quality and high usability problems in software product. Research is still in progress to introduce the best methods for reducing usability problems and incre...
Article
Full-text available
In this paper, a Semantic Web service matchmaker called UltiMatch-NL is presented. UltiMatch-NL applies two filters namely Signature-based and Description-based on different abstraction levels of a service profile to achieve more accurate results. More specifically, the proposed filters rely on semantic knowledge to extract the similarity between a...
Article
This study illustrates the design and implementation of strategy employed for testing the performance of cloud-based system. The strategy involves the analysis of usage scenario of the system, formulation of performance test cases, test environment setup, performance test execution and reporting with the support of open source testing tool. It eval...
Article
Today few organizations have a thorough understanding of what is on their networks at any given time. This study tries to develop Computer and Network Asset Manager (CNAM) that is a network management application which helps large enterprises, and Small medium enterprises (SMEs) service providers, manage their data centers and IT infrastructure eff...
Article
Full-text available
Web services today are among the most widely used groups for Service Oriented Architecture (SOA). Service selection is one of the most significant current discussions in SOA, which evaluates discovered services and chooses the best candidate from them. Although a majority of service selection techniques apply Quality of Service (QoS), the behaviour...
Data
Full-text available
Since the technologies with network base are spreading all over the world, detecting the threats and preventing these systems from threats is becoming more important. In this paper, it has been tried to investigate how the genetic algorithm (GA) along with a classification method of artificial neural network for the feature selection, as well as mo...
Article
The purpose of this study is to provide a review to mining useful information by means of Data Mining. The procedure of extracting knowledge and information from large set of data is data mining that applying artificial intelligence method to find unseen relationships of data. There is more study on data mining applications that attracted more rese...
Article
The following methods detect the attacks intrusion detection system: ANN (artificial neural network) for recognition and GA (genetic algorithm) for optimization of ANN results. We use KDD-CUP dataset to obtain the results, which shows around 0.9998 accuracy of applied methods in detecting the threads. ANN with GA requires 18 features.
Article
Full-text available
This study aims to present a new mathematical based evaluation method for service composition with respects to security aspects. Web service composition as complex problem solver in service computing has become one of the recent challenging issues in today's web environment. It makes a new added value service through combination of available basic...
Article
Full-text available
This research describes the initial effort of building a prediction model for defects in system testing carried out by an independent testing team. The motivation to have such defect prediction model is to serve as early quality indicator of the software entering system testing and assist the testing team to manage and control test execution activi...
Article
Full-text available
Currently network security researchers are focusing on intrusion detection systems. The effectiveness of a Gravitational Search Algorithm in optimizing the results of an Artificial Neural Network is investigated for attack detection in an intrusion detection system. The KDD CUP '99 dataset is used in this study for achieving the ANN results. The re...
Article
Test Cases are treated as one of the most important part of software testing activity. They are responsible for the validation of the software under inspection. Test suites are also used to test changes in the source code during regression testing. In number of cases, the test suites are so big that executing all tests for every source code change...
Conference Paper
Usability is considered as one of the significant factors of software product quality and becoming an emergent property of an entire closed and open system. Existence of usability problem has been discovered to cause many quality problems in several studies. Despite various efforts have been taken to overcome these problems, usability problems stil...
Article
Full-text available
Cyberspace is the digitized and networked work area people enter when using the Internet. Electronic commerce depends on the use of personally identifiable information and unfortunately, identity theft is a growing problem in today's world. Identity theft crime comes out by combination of cybercrimes from one side and lake of users' awareness from...
Article
Full-text available
Requirements traceability is one of the most important and challenging tasks in the industry to ensure that software has been developed according to all user requirements. Requirements need to be specified and traced throughout the software development life cycle in order to map links between different software artifacts. This paper proposes a new...
Conference Paper
SQL injection is one of the biggest challenges for the web application security. Based on the studies by OWASP, SQL injection has the highest rank in the web based vulnerabilities. In case of a successful SQL injection attack, the attacker can have access to the web application database. With the rapid rise of SQL injection based attacks, researche...
Conference Paper
An approach of Web service matching is proposed in this paper. It adopts semantic similarity measuring techniques to calculate the matching level between a pair of service descriptions. Their similarity is then specified by a numeric value. Determining a threshold for this value is a challenge in all similar matching approaches. To address this cha...
Conference Paper
It is almost impossible to obtain and understand all software requirements at early stages of Software Development Life Cycle without changes. Technical requirement evolves after software specification phase by client organization or project team members frequently. This paper classified the software changes problems and list all related software a...
Article
Full-text available
In recent years, many large software projects often fail due to lack of quality of software product and processes. In order to increase the quality aspects of the software, certification process has been introduced in software industry. Previous fundamental software certification models such as SCM-Prod and SPAC were developed to solve the uncertai...
Article
The industrial and research communities in Software Engineering have shown great interest in Software Process Improvement initiatives. There are variety of process improvement that addresses the process improvement practices for software processes and services. Organizations initially started with single model implementation and progresses for more...
Conference Paper
Full-text available
SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different...
Article
Full-text available
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources. By SQL injection an attacker gains access to underlying web application's database and destroys functionality and/or confidentiality. Researchers have proposed...
Chapter
Full-text available
Nowadays, the number of infrastructure strategies based on Service-oriented architecture (SOA) is growing and demands for reusing and composing available Web services have increased significantly. Therefore, a rich Semantic Web service description is required to reach an automated Web service discovery, composition, and invocation. Due to the compl...
Article
This paper describes the effort on applying Six Sigma approach in formulating a defect prediction model for system testing. The motivation behind this effort is to have an early quality indicator of the software entering system testing phase towards optimizing testing process, ensuring comprehensive test coverage, finding as many defects as possibl...
Article
At present there is wide range of process improvement frameworks that are used as reference models for improving an organization's processes. These models are needed to improve the way to develop and manage the software development in an organization. However, this type of process improvement environments where multiple and different models are inv...
Conference Paper
Full-text available
The electronic service concept stands for one prominent application of using the information and communication technologies in dissimilar areas. However, providing an exact definition of e-service is hard to come by as researchers have been using different definitions to describe eservice. This paper presents and examines the e-service definitions...
Article
Full-text available
The growing proliferation of distributed information systems, allows organizations to offer their business processes to a worldwide audience through Web services. Semantic Web services have emerged as a means to achieve the vision of automatic discovery, selection, composition, and invocation of Web services by encoding the specifications of these...
Article
One of the important issues in software testing is to provide an automated test oracle. Test oracles are reliable sources of how the software under test must operate. In particular, they are used to evaluate the actual results produced by the software. However, in order to generate an automated test oracle, it is necessary to map the input domain t...
Conference Paper
Full-text available
Malware writers attempt to generate different shapes of a malware to evade the signature-based scanners. As the number of variants of a metamorphic malware is increased, the analysis of all variants and selecting the appropriate signature and updating the database of the antivirus becomes more tiresome and time-consuming. Furthermore, for automated...
Article
Although some of public wireless Internet access (Wi-Fi) networks are protected by encryption mechanisms such as WEP and WPA, connected hosts are still unnecessarily visible and accessible. Because there is no need to use shared resources in these networks, internal adversaries can misuse IP visibility in shared media. In this paper, some of the co...
Article
Currently, most enterprises deploy their services on the Web. This augments the request for tools to discover, select, compose and invoke Web services, effectively and efficiently. Discovery is considered as the foremost and most important step in attracting a vast number of researches. In this paper, a taxonomy of Web service discovery systems is...
Article
Full-text available
SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different...
Article
Full-text available
Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the process of analyzing and det...
Article
In this paper we investigate the use of multiprocess quality model in the adoption of process improvement frameworks. We analyze an improvement effort based on multiple process quality models adoption. At present, there is a possibility of a software development organization to adopt multi-quality and improvement models in order to remain competiti...
Conference Paper
Nowadays service composition has been received lots of attentions considering the fact that no single service can satisfy users' desires in the majority of service oriented scenarios. In this respects, many enterprises decides to integrate their services and applications to fulfill required goals by service consumers. Despite the importance of Web...
Article
Full-text available
Concurrent adoption of software engineering process improvement frameworks have been widely practiced by the software organizations. The software development organizations leverage these frameworks to better address process improvement challenges. This paper develops an integrated framework for software engineering process improvement practices and...
Conference Paper
Currently, a number of specific international standards are made available within software engineering discipline to support Software Process Improvement (SPI) such as Capability Maturity Model Integration (CMMI), ISO/IEC 15504, ISO/IEC 90003 and ISO/IEC 12207. However, different standards and practices may require substantial resources and cost, r...
Conference Paper
This research focuses on constructing a mathematical model to predict functional defects in system testing by applying Six Sigma approach. The motivation behind this effort is to achieve zero known post release defects of the software delivered to end-user. Besides serving as the indicator of optimizing testing process, predicting functional defect...
Conference Paper
Currently, a number of specific international standards are made available within software engineering discipline to support Software Process Improvement (SPI) such as Capability Maturity Model Integration (CMMI), ISO/IEC 15504, ISO/IEC 90003 and ISO/IEC 12207. Some suggest on integrating and harmonizing these standards to reduce risks and enhance...
Conference Paper
Since the reusing and arranging of available Web services have been raised, the amount of infrastructure strategies based on Service Oriented architecture (SOA) is increasing. Hence, a rich Semantic Web service description is needed to achieve an automated Web service discovery, composition and invocation. On the other hand, the acceptance of Seman...
Conference Paper
Full-text available
Use of morphing engine in metamorphic and polymorphic malware, and virus creation kits aid malware authors to produce a plenty number of variants for a virus. These variants belong to a family and have common behavioral and some statistical characteristics. However, these variants are not detectable via a single common string signature. Some statis...
Conference Paper
Full-text available
Nowadays, with widespread use of Web services in current application systems, the demand for automatic Web service composition has significantly increased. However, Semantic Web service enriches Web services by semantic description to facilitate automatic Web service discovery, composition, invocation, and interoperation. The adoption of semantic d...
Article
Software project success depends on various reasons including project control, software standards and procedures. Software development organizations realize the importance of using best practices to improve software development practices. An increasing number of literature have described about process improvement best practices and standards. Forma...
Article
Full-text available
Most businesses these days use the web services technology as a medium to allow interaction between a service provider and a service requestor. However, both the service provider and the requestor would be unable to achieve their business goals when there are miscommunications between their processes. This research focuses on the process incompatib...
Article
Full-text available
SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different...
Article
ContextOne of the important issues of software testing is to provide an automated test oracle. Test oracles are reliable sources of how the software under test must operate. In particular, they are used to evaluate the actual results that produced by the software. However, in order to generate an automated test oracle, oracle challenges need to be...
Conference Paper
Software Maintenance Testing is essential during software testing phase. All defects found during testing must undergo a re-test process in order to eliminate the flaws. By doing so, test cases are absolutely needed to evolve and change accordingly. In this paper, several maintenance testing approaches namely regression test suite approach, heurist...
Article
Requirements management is critical to software delivery success and project lifecycle. Requirements management and their traceability provide assistance for many software engineering activities like impact analysis, coverage analysis, requirements validation and regression testing. In addition requirements traceability is the recognized component...
Conference Paper
This paper presents the development of a web-based system customized to serve the need of a community, named Taman Keramat Permai (TKP) in Malaysia. The system is designed to replace a paper-based process that gradually become unmanageable due to the increasing large volume of data. Features of the new system include online recording of forms, data...
Conference Paper
Software Documentation is one of the key quality factors in software development. However, many developers are still putting less effort and less priority on documentation. To them writing documentation during project development is very tedious and time consuming. As a result, the documentation tends to be significantly outdated, poor quality and...
Article
E-portfolio is a new education technology; some of the students are not willing to use e-portfolio. e-portfolio features must be designed based on the student's requirements and demands to encourage them to use e-portfolio. Applying features toward employment of fresh graduated can motivate students to use e-portfolio. The aim of this research embe...
Article
the aim of this paper is to present the role of Artificial Intelligence techniques (Expert systems) to enhance reflective e-portfolios quality. Some AI techniques such as the expert system; scheduling; Data Mining can support us to enhance our reflective e-portfolios quality. These tools together will define new intelligent Reflective e-portfolio t...
Article
Full-text available
This paper describes an evaluation on software documentation generated using redocumentation approaches and tools. The evaluation is based on the selected Document Quality Attributes (DQA). Firstly, the paper presents an overview of the software redocumentation and the main components involved in the process for better understanding of the redocume...
Article
Full-text available
E-business systems are known for their frequent changes in business requirements, and traditional software development engineering approaches have difficulties in keeping up with this dynamicity. The use of service oriented architecture in software development has become popular as it provides a solution to frequent changes to business environments...
Article
Full-text available
Open source has emerged as a widely accepted software development phenomenon which has tremendously brought about a significant paradigm shift from traditional software development methodologies such as top down design and stepwise refinement to an unconventional software development approach by means of collaborative software development method am...
Article
Full-text available
Test Coverage is an important indicator of software quality and an essential part of software maintenance. It helps in evaluating the effectiveness of testing by providing data on different coverage items. Although much research effort has been put on how to get coverage information by either code based testing or requirement based testing, not muc...
Article
Full-text available
Test Coverage is an important indicator of software quality and an essential part of software maintenance. It helps in evaluating the effectiveness of testing by providing data on different coverage items. Automated testing tools can be used to enhance the maintainability, testability and stability of the software. This paper aims to provide an eva...
Article
Full-text available
Documentation is one of the key quality factors in software development. However, many developers are still putting less effort and less priority on documentation. To them writing documentation during project development is very tedious and time consuming. As a result, the documentation tends to be significantly outdated , poor quality and difficul...
Article
Full-text available
This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products. In order to stay far from the anti-virus scanners, computer viruses gradually improve their codes to make them invisible. On the other hand, anti-virus technologies continually follow the virus tri...
Article
Full-text available
Nowadays, with widespread use of Web services in current application systems, the demand for automatic Web service composition has significantly increased. However, Semantic Web service enriches Web services by semantic description to facilitate automatic Web service discovery, composition, invocation, and interoperation. The adoption of semantic d...
Conference Paper
Full-text available
Test Oracle is a mechanism to determine if an application executed correctly. In addition, it may be difficult to verify logical software modules due to the complexity of their structures. In this paper, an attempt has been made to study the applications of Artificial Neural Networks as Single-Network Oracles to verify logical modules. First, the l...
Chapter
Web service is a novel distributed computing paradigm, trying to address the problem of enabling interaction between heterogeneous applications distributed over the Web. A problem that has become one of the recent critical issues is automated composition of Web services. A number of approaches like AI-planning have been proposed to resolve the prob...
Article
Full-text available
Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Marketing and Information Systems (IS). This paper is an overview on success factors that could facilitate successful implementation of CRM. Index Terms— information systems, information technology, CRM components, CRM success...
Article
Purpose Automated composition of semantic web services has become one of the recent critical issues in today's web environment. Despite the importance of artificial intelligence (AI)‐planning techniques for web service composition, previous works in that area do not address security issues, which is the focus of this paper. The purpose of this pape...

Network

Cited By