selected publications academic article ESTABLISHMENT OF BIG DATA ANALYTICS APPLICATION MODEL FOR MALAYSIAN PUBLIC SECTOR: AN EXPERT VALIDATION. EDPACS. 65:1-20. 2022 Testing Design for Pixel Value Graphical Password Scheme on Image Specimens. International Journal of Recent Technology and Engineering. 8:1475-1478. 2019 Establishment of User Requirements Handbook based on the Situational Awareness Knowledge for Malaysian Military Observers. International Journal of Engineering & Technology. 7:35-38. 2018 Engaging Information Security Awareness on Social Media: A Case Study of Secondary School Students. Advanced Science Letters. 23:7601-7605. 2017 Heave Buoy Energy Converters; Simulation of Heave Buoy Response to Wave in Malaysian Water. Energy Procedia. 62:101-111. 2014 Detection of Steganographic Messages in Email Attachment. Modern Applied Science. 6. 2012 Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme. International Journal of Advancements in Computing Technology. 4:189-197. 2012 Graphical Password Authentication: Review and Analysis. INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences. 4:25-32. 2012 Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview. Journal of Applied Sciences. 10:1656-1661. 2010 Mobile Multimedia Control Model for Fire Disaster of City Building. Journal of Applied Sciences. 9:304-311. 2009 Wireless Spectrum Combination Protocol for 4G Networks. Journal of Applied Sciences. 9:334-340. 2009 Identifying False Alarm for Network Intrusion Detection System Using Hybrid Data Mining and Decision Tree. Malaysian Journal of Computer Science. 21:101-115. 2008 chapter Document Clustering in Military Explicit Knowledge: A Study on Peacekeeping Documents. Lecture Notes in Computer Science. 175-184. 2017 Artificial Bee Colony for Vertical-Handover in Heterogeneous Wireless Networks. Lecture Notes in Electrical Engineering. 307-322. 2016 conference paper Proposing basic information security tasks as part of job specification for employee within an organisation. AIP Conference Proceedings. 050008. 2022 Framework of Knowledge-Based System for United Nations Peacekeeping Operations Using Data Mining Technique. 1-6. 2018 Semantic-based Social Media Threats Detection. 1-4. 2018 Establishing mesh network amongst infantry personnel during military operations: A preliminary study. 218-222. 2016 Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models. 47-50. 2016 Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4). 644-650. 2010 Devising a Biological Model to Detect Polymorphic Computer Viruses Artificial Immune System (AIM): Review. 300-304. 2009 Multi-Network Data Path for 5G Mobile Multimedia. 583-587. 2009 The Future of Mobile Wireless Communication Networks. 554-557. 2009