selected publications academic article Sentiment and Emotion Analysis with Large Language Models for Political Security Prediction Framework. International Journal of Advanced Computer Science and Applications. 16. 2025 A Review on Deep Learning Approaches and Optimization Techniques For Political Security Threat Prediction. JOIV : International Journal on Informatics Visualization. 8:1082. 2024 IoT Attack Detection using Machine Learning and Deep Learning in Smart Home. JOIV : International Journal on Informatics Visualization. 8:510. 2024 Decentralised Access Control Framework using Blockchain: Smart Farming Case. International Journal of Advanced Computer Science and Applications. 14. 2023 Political Security Threat Prediction Framework Using Hybrid Lexicon-Based Approach and Machine Learning Technique. IEEE Access. 11:17151-17164. 2023 Comparative Assessment of Data Mining Techniques for Flash Flood Prediction. International Journal of Advances in Soft Computing and its Applications. 14:126-145. 2022 Decentralized Access Control using Blockchain Technology for Application in Smart Farming. International Journal of Advanced Computer Science and Applications. 13. 2022 Factors Influencing Users’ Satisfaction Towards Image Use in Social Media: A PLS-SEM Analysis. International Journal of Interactive Mobile Technologies (iJIM). 16:172-186. 2022 Assessment of Emotion in Online News based on Kansei Approach for National Security. International Journal of Advanced Computer Science and Applications. 12. 2021 Emotional Evocative User Interface Design for Lifestyle Intervention in Non-communicable Diseases using Kansei. International Journal of Advanced Computer Science and Applications. 12. 2021 Exploring big data traits and data quality dimensions for big data analytics application using partial least squares structural equation modelling. Journal of Big Data. 8:49. 2021 HOW POPULAR IS SOCIAL MEDIA IMAGE GRATIFICATION AS A RESEARCH THEME IN TOP JOURNALS?. Malaysian Journal of Computer Science. 75-84. 2021 Opinion mining for national security: techniques, domain applications, challenges and research opportunities. Journal of Big Data. 8:150. 2021 Evaluation of Blockchain-based Data Sharing Acceptance among Intelligence Community. International Journal of Advanced Computer Science and Applications. 11. 2020 Exploring Students’ Feedback in Online Assessment System Using Opinion Mining Technique. International Journal of Information and Education Technology. 10:664-668. 2020 Opinion mining technique for developing student feedback analysis system using lexicon-based approach (OMFeedback). Education and Information Technologies. 25:2549-2560. 2020 chapter Unraveling Social Media’s Issues on Public Opinion and Activism: A Thematic Review. CSR, Sustainability, Ethics & Governance. 155-163. 2024 A Conceptual Model: Securing Resources Through a Decentralized Access Control Using Blockchain Technology for Smart Farming. Lecture Notes in Computer Science. 399-410. 2021 National Sport Institute Case: Automated Data Migration Using Talend Open Studio with ‘Trickle Approach’. Lecture Notes in Computer Science. 214-223. 2021 Technology Adoption Models: Users’ Online Social Media Behavior Towards Visual Information. Lecture Notes in Electrical Engineering. 15-26. 2021 Conceptualization of User’s Rage Assessment Using Chatbot Interface by Implementing Kansei Engineering Methodology for Information Security. Advances in Intelligent Systems and Computing. 184-193. 2020 Disaster Management Support Model for Malaysia. Lecture Notes in Computer Science. 570-581. 2019 Enhance Multi-factor Authentication Model for Intelligence Community Access to Critical Surveillance Data. Lecture Notes in Computer Science. 560-569. 2019 Identifying Fake Account in Facebook Using Machine Learning. Lecture Notes in Computer Science. 441-450. 2019 Fear as Emotion Assessment in Information Security Using Kansei Engineering Methodology. Advances in Intelligent Systems and Computing. 654-663. 2018 Knowledge Driven Interface to Determine Degree of Exposure of Young Adult to Pedophile Online. Lecture Notes in Computer Science. 727-736. 2017 Implementing Low Level Features for Human Aggressive Movement Detection. Lecture Notes in Computer Science. 296-302. 2015 conference paper Staying Safe Online: Security Measures by University Students to Secure Privacy. 572-576. 2023 Conceptual model for prediction of individual risk in developing colorectal cancer (CRC) using hybrid meta-analysis and machine learning techniques. AIP Conference Proceedings. 020002. 2022 Opinion mining hybrid technique to classify people’s emotions in text using Kansei and lexicon-based approach for national security domain. AIP Conference Proceedings. 030001. 2022 Review on Fake News in Malaysia during the Movement Control Order (MCO) from the Ethics in ICT Perspective. 461-465. 2021 Fear Appeal Inducement in Pop up Design for IS Procedure Compliance. 17-22. 2019 A review on cyberbullying in Malaysia from digital forensic perspective. 246-250. 2016 Comparison between Horn-Schunck and Brox techniques for Motion Detection in Thermal Video. 27-30. 2016 Lecturer Promotion Assessment System based on Fuzzy Logic. 19-22. 2016 Verification of a Battlefield Visualization Framework in Military Decision Making using Holograms (3D) and multi-touch technology. 23-26. 2016 Facial expression change detection algorithm using optical flow technique. 332-335. 2015 Towards t-government in Malaysia: Investigation of citizen's willingness to participate in democratic services and information privacy concern. 366-369. 2013 Towards engineering HCI - Privacy requirement in Malaysia: A preliminary study on Small-Medium e-commerce privacy adoptions. 284-289. 2010