selected publications academic article Examining the Impact Factors Influencing Higher Education Institution (HEI) Students’ Security Behaviours in Cyberspace Environment. JOIV : International Journal on Informatics Visualization. 9:146. 2025 A Novel Network Optimization Framework Based on Software-Defined Networking (SDN) and Deep Learning (DL) Approach. JOIV : International Journal on Informatics Visualization. 8:2082. 2024 Detecting Distributed Denial-of-Service (DDoS) Attacks Through the Log Consolidation Processing (LCP) Framework. JOIV : International Journal on Informatics Visualization. 8:1064. 2024 The Impact of Online Learning on NDUM Students During COVID-19. JOIV : International Journal on Informatics Visualization. 8:548. 2024 Dynamic QoS: Automatically Modifying QoS Queue's Maximum Bandwidth Rate-Limit of Network Devices for Network Improvement. International Journal on Advanced Science, Engineering and Information Technology. 13:2112-2119. 2023 Optical Flow-Based Algorithm Analysis to Detect Human Emotion from Eye Movement-Image Data. Journal of Image and Graphics. 11:53-60. 2023 Pixel Value Graphical Password Scheme: Analysis on Time Complexity performance of Clustering Algorithm for Passpix Segmentation. Journal of Engineering and Technological Sciences. 55:52-59. 2023 Monitoring of mangroves changes in Pulau Kukup using geographical information system (GIS). IOP Conference Series: Earth and Environmental Science. 1064:012009. 2022 Pixel Value Graphical Password Scheme. International journal of electrical and computer engineering systems. 12:23-29. 2021 SIEM Network Behaviour Monitoring Framework using Deep Learning Approach for Campus Network Infrastructure. International journal of electrical and computer engineering systems. 12:9-21. 2021 STUDENT PERCEPTION STUDY ON SMART CAMPUS: A CASE STUDY ON HIGHER EDUCATION INSTITUTION. Malaysian Journal of Computer Science. 1-20. 2021 Pixel Value Graphical Password: A PassPix Clustering Technique For Password Fault Tolerance. International Journal of Recent Technology and Engineering. 8:2973-2976. 2019 Testing Design for Pixel Value Graphical Password Scheme on Image Specimens. International Journal of Recent Technology and Engineering. 8:1475-1478. 2019 Designing Intelligent Secure Android Application for Effective Chemical Inventory. IOP Conference Series: Materials Science and Engineering. 226:012086. 2017 Enhancing Chemical Inventory Management in Laboratory through a Mobile-Based QR Code Tag. IOP Conference Series: Materials Science and Engineering. 226:012093. 2017 Study of Intelligent Secure Chemical Inventory Management System. IOP Conference Series: Materials Science and Engineering. 226:012085. 2017 AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES. Jurnal Teknologi. 76. 2015 Approaches in Pattern Recognition and Classification Based on Coin Images. Applied Mechanics and Materials. 548-549:1148-1151. 2014 Heave Buoy Energy Converters; Simulation of Heave Buoy Response to Wave in Malaysian Water. Energy Procedia. 62:101-111. 2014 Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements. Applied Mechanics and Materials. 548-549:1561-1565. 2014 Proposed System Model for Android Augmented Reality System in Malaysia Military Operations – Unit Positions. Applied Mechanics and Materials. 548-549:1493-1497. 2014 Responsive Web Design for Mobile Device Screen Optimization. Applied Mechanics and Materials. 548-549:1460-1464. 2014 A New Teaching Approach in Object Oriented Programming Subject in Learning Military Environment. International Journal of Digital Content Technology and its Applications. 6:85-90. 2012 Detection of Steganographic Messages in Email Attachment. Modern Applied Science. 6. 2012 Enhancing Mixing Recognition-Based and Recall-Based Approach in Graphical Password Scheme. International Journal of Advancements in Computing Technology. 4:189-197. 2012 Graphical Password Authentication: Review and Analysis. INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences. 4:25-32. 2012 Information Technology Knowledge Management in Malaysian Armed Forces. Journal of Convergence Information Technology. 7:178-184. 2012 Method of Search and Rescue in Dipterocarp Forest Using GPS Technology. Advanced Materials Research. 626:195-199. 2012 The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System. International Journal of Advancements in Computing Technology. 4:487-492. 2012 The New Design of Computer Controlled Braille. International Journal of Advancements in Computing Technology. 4:255-271. 2012 Artificial Bee Colony based Data Mining Algorithms for Classification Tasks. Modern Applied Science. 5. 2011 Consumers Perception on Prepaid Cards: Survey and Analysis. Modern Applied Science. 6. 2011 Image Classification Technique using Modified Particle Swarm Optimization. Modern Applied Science. 5. 2011 Improved Error Correction Techniques for Digital Multimedia Broadcasting (DMB) Service. Modern Applied Science. 5. 2011 Mobile Agents in Intrusion Detection System: Review and Analysis. Modern Applied Science. 5. 2011 chapter Implementation of a New H.264 Video Watermarking Algorithm with Usability Test. Lecture Notes in Computer Science. 963-970. 2007 conference paper Application to Detect Driver Distraction Using Haar Cascade Method. 40-44. 2023 A machine learning approach using EEG signals to identify emotions and performance level among university students. AIP Conference Proceedings. 020011. 2022 Visual analytics for debris detection using drone observation (VAL-Dr1) for go green concept. AIP Conference Proceedings. 020003. 2022 Identification of Student's Bag using QR Tag Scanner. 215-217. 2016 Optimization in heave buoy energy convertors using SOM clustering and simulation with an auxiliary mass. 127-135. 2016 An intelligent classif ication algorithm for LifeLog multimedia applications. 558-562. 2008 Developing an effective watermarking algorithm for video retrieval. 426-431. 2008 A New Optimized Error-Resilient Coding for Video Applications. 731-734. 2007