selected publications academic article RapidMiner and Machine Learning Techniques for Classifying Aircraft Data. Journal of Physics: Conference Series. 1997:012012. 2021 The impact of big data on firm performance in hotel industry. Electronic Commerce Research and Applications. 40:100921. 2020 Automated Test Input Generation for Detecting SQL Injection Vulnerability using Set Theory Concept. International Journal of Recent Technology and Engineering. 8:1378-1381. 2019 Method of Search and Rescue in Dipterocarp Forest Using GPS Technology. Advanced Materials Research. 626:195-199. 2012 chapter Security and Threats in the Internet of Things Based Smart Home. Lecture Notes on Data Engineering and Communications Technologies. 676-684. 2021 Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application. Communications in Computer and Information Science. 160-171. 2015 A Survey on Conducting Vulnerability Assessment in Web-Based Application. Communications in Computer and Information Science. 459-471. 2014 Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing. Communications in Computer and Information Science. 230-239. 2013 conference paper Sentiment analysis on examining students’ opinions regarding NDUM e-learning during COVID-19. AIP Conference Proceedings. 020001. 2024 A vulnerability detection framework for IoT devices: Smart lock. AIP Conference Proceedings. 030007. 2022 Crime Suspect Profiling (CSP) for Forensic Investigation on Smartphone. 1-6. 2019 Framework Of Malay Intelligent Autonomous Helper (Min@H): Text, Speech And Knowledge Dimension Towards Artificial Wisdom For Future Military Training System. 83-87. 2019 Method For Generating Test Data For Detecting SQL Injection Vulnerability in Web Application. 1-5. 2019 Web Vulnerability Assessment: Outsource dilemmas. 1-6. 2011 Customizing GINA for authentication in virtualization. 597-600. 2010 Predicting NDUM Student's Academic Performance Using Data Mining Techniques. 357-361. 2009 Trusted computing - opportunities and risks 2009