UPM Institutional Repository

Items where Author is "Udzir , Nur Izura"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 117.

Article

Chng, Chern Wei and Md. Yasin, Sharifah and Abdullah, Mohd. Taufik and Udzir, Nur Izura (2018) New DNA based dynamical S-Box for block cipher. International Journal of Engineering Research and Applications, 8 (7 part. 4). 64 - 69. ISSN 2248-9622

Jegede, Abayomi and Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan (2018) Revocable and non-invertible multibiometric template protection based on matrix transformation. Pertanika Journal of Science & Technology, 26 (1). pp. 133-160. ISSN 0128-7680; ESSN: 2231-8526

Jegede, Abayomi and Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan (2017) Cancelable and hybrid biometric cryptosystems: current directions and open research issues. International Journal of Advanced and Applied Sciences, 4 (11). 65 - 77. ISSN 2313-626X; ESSN: 2313-3724

Jegede, Abayomi and Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan (2017) State of the art in biometric key binding and key generation schemes. International Journal of Communication Networks and Information Security, 9 (3). pp. 333-344. ISSN 2076-0930; ESSN: 2073-607X

Hajamydeen, Asif Iqbal and Udzir, Nur Izura (2016) A refined filter for UHAD to improve anomaly detection. Security and Communication Networks, 9 (14). pp. 2434-2447. ISSN 1939-0122

Ibrahim, Hamidah and Mohammed, Waheed Yasin and Udzir, Nur Izura and Abdul Hamid, Nor Asilah Wati (2016) Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems. Journal of Information and Communication Technology, 15 (2). pp. 85-116. ISSN 1675-414X; ESSN: 2180-3862

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatima (2016) An efficient approach for processing skyline queries in incomplete multidimensional database. Arabian Journal for Science and Engineering, 41 (8). pp. 2927-2943. ISSN 1319-8025; ESSN: 2191-4281

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura (2015) A model for processing skyline queries over a database with missing data. Journal of Advanced Computer Science and Technology Research, 5 (3). pp. 71-82. ISSN 2231-8852

Halboob, Waleed Abduljabbar Mohammed and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik (2015) Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation. Procedia Computer Science, 56. pp. 370-375. ISSN 1877-0509

Mirabi, Meghdad and Ibrahim, Hamidah and Fathi, Leila and Udzir, Nur Izura and Mamat, Ali (2015) A dynamic compressed accessibility map for secure XML querying and updating. Journal of Information Science and Engineering, 31. pp. 59-93. ISSN 1016-2364

Roslan, Nuur Alifah and Mahmod, Ramlan and Udzir, Nur Izura and Ahmad Zulkarnain, Zuriati (2014) Primitive structural method for high capacity text steganography. Journal of Theoretical and Applied Information Technology, 67 (2). pp. 373-383. ISSN 1992-8645; ESSN: 1817-3195

Abdul Aziz, Nor Azah and Udzir, Nur Izura and Mahmod, Ramlan (2014) Extending TLS with mutual attestation for platform integrity assurance. Journal of Communications, 9 (1). pp. 63-72. ISSN 2374-4367; ESSN: 1796-2021

Teh, Jia Yew and Samsudin, Khairulmizam and Udzir, Nur Izura and Hashim, Shaiful Jahari (2014) Buffer overflow attack mitigation via Trusted Platform Module (TPM). Infrastructure University Kuala Lumpur Research Journal, 2 (1). pp. 73-84. ISSN 2289-4144

Barjini, Hassan and Othman, Mohamed and Ibrahim, Hamidah and Udzir, Nur Izura (2014) HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks. Cluster Computing, 17 (2). pp. 551-568. ISSN 1386-7857; ESSN: 1573-7543

Barati, Mehdi and Abdullah, Azizol and Udzir, Nur Izura and Behzadi, Mostafa and Mahmod, Ramlan and Mustapha, Norwati (2014) Intrusion detection system in secure shell traffic in cloud environment. Journal of Computer Science, 10 (10). pp. 2029-2036. ISSN 1549-3636; ESSN: 1552-6607

Lisehroodi, Mazyar Mohammadi and Muda, Zaiton and Yassin, Warusia and Udzir, Nur Izura (2014) KM-NEU: an efficient hybrid approach for intrusion detection system. Research Journal of Information Technology, 6 (1). pp. 46-57. ISSN 1815-7432; ESSN: 2151-7959

Adinehnia, Reza and Udzir, Nur Izura and Affendey, Lilly Suriani and Ishak, Iskandar and Mohd Hanapi, Zurina (2014) User-independent and self-optimizing intrusion detection framework for large database systems. WSEAS Transactions on Information Science and Applications, 12. art. no. 26. pp. 269-276. ISSN 1790-0832; ESSN: 2224-3402

Yasin, Waheed and Ibrahim, Hamidah and Udzir, Nur Izura and Abdul Hamid, Nor Asilah Wati (2014) Windows web proxy caching simulation: a tool for simulating web proxy caching under windows operating systems. Journal of Computer Science, 10 (8). pp. 1380-1388. ISSN 1549-3636; ESSN: 1552-6607

Halboob, Waleed and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik and Deghantanha, Ali (2014) An ordered selective imaging and distributed analysis computer forensics model. Journal of Applied Sciences, 14 (21). pp. 2704-2712. ISSN 1812-5654; ESSN: 1812-5662

Yasin, Waheed and Ibrahim, Hamidah and Udzir, Nur Izura and Abdul Hamid, Nor Asilah Wati (2014) An overview of media streams caching in peer-to-peer systems. The Computer Journal, 57 (8). pp. 1167-1177. ISSN 0010-4620; ESSN: 1460-2067

Farjamfar, Anahita and Abdullah @ Selimun, Mohd Taufik and Mahmod, Ramlan and Udzir, Nur Izura (2014) A review on mobile device's digital forensic process models. Research Journal of Applied Sciences, Engineering and Technology, 8 (3). pp. 358-366. ISSN 2040-7459; ESSN: 2040-7467

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) A survey on privacy impacts of digital investigation. Journal of Next Generation Information Technology, 4 (8). pp. 57-68. ISSN 2092-8637; ESSN: 2233-9388

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) Analysis of known and unknown malware bypassing techniques. International Journal of Information Processing and Management, 4 (6). pp. 50-59. ISSN 2093-4009; ESSN: 2233-940X

Muda, Zaiton and Ab. Ahfaidha, Abdeladeem and Udzir, Nur Izura and Mahmod, Ramlan (2013) A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion. International Journal of Advancements in Computing Technology, 5 (11). pp. 109-117. ISSN 2005-8039; ESSN: 2233-9337

Asmawi, Aziah and Affendey, Lilly Suriani and Udzir, Nur Izura and Mahmod, Ramlan (2013) XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment. International Journal of Advancements in Computing Technology, 5 (10). pp. 69-77. ISSN 2005-8039; ESSN:2233-9337

Mahboubian, Mohammad and Udzir, Nur Izura (2013) A naturally inspired statistical intrusion detection model. International Journal of Computer Theory and Engineering, 5 (3). pp. 578-581. ISSN 1793-8201; ESSN: 1793-821X

Alwan, Ali A. and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2013) Preference evaluation techniques of preference queries in database. International Journal of Advancements in Computing Technology, 5 (5). pp. 756-766. ISSN 2005-8039; ESSN: 2233-9337

Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura (2013) Towards green frameworks for digital forensics investigation. Journal of Convergence Information Technology, 8 (2). pp. 669-678. ISSN 1975-9320; ESSN: 2233-9299

Ganji, Majid and Dehghantanha, Ali and Udzir, Nur Izura and Damshenas, Mohsen (2013) Cyber warfare trends and future. Advances in Information Sciences and Service Sciences, 5 (13). pp. 1-10. ISSN 1976-3700; ESSN: 2233-9345

Abd Aziz, Norazah and Setapa, Sharipah and Udzir, Nur Izura (2013) Mutual remote attestation in IPSec based VPN. International Journal of Cryptology Research, 4 (1). pp. 55-67. ISSN 1985-5753

Yew, Teh Jia and Samsudin, Khairulmizam and Udzir, Nur Izura and Hashim, Shaiful Jahari (2013) Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM. Pertanika Journal of Science & Technology, 21 (2). pp. 507-520. ISSN 0128-7680; ESSN: 2231-8526

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) A survey about impacts of cloud computing on digital forensics. International Journal of Cyber-Security and Digital Forensics, 2 (2). pp. 77-94. ISSN 2305-0012

Alwan, Ali Amer and Ibrahim, Hamidah and Tan, Chik Yip and Udzir, Nur Izura and Sidi, Fatimah (2012) A Performance evaluation of preference evaluation techniques in real high dimensional database. Procedia Computer Science, 10. pp. 894-901. ISSN 1877-0509

Mirabi, Meghdad and Ibrahim, Hamidah and Udzir, Nur Izura and Mamat, Ali (2012) A compact bit string accessibility map for secure XML query processing. Procedia Computer Science, 10. pp. 1172-1179. ISSN 1877-0509

Esfahani, Faramarz Safi and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura (2011) Adaptable decentralized Service Oriented Architecture. Journal of Systems and Software, 84 (10). 1591 -1617. ISSN 1873-1228

Abdullah, Zul Hilmi and Udzir, Nur Izura and Mahmod, Ramlan and Samsudin, Khairulmizam (2011) Towards a dynamic file integrity monitor through a security classification. International Journal of New Computer Architectures and Their Applications, 1 (3). pp. 766-779. ISSN 2412-3587; ESSN: 2220-9085

Tabatabaie, Zahra Sadri and O. K. Rahmat, Rahmita Wirza and Udzir, Nur Izura and Kheirkhah, Esmaeil (2011) Adaptive skin color classification technique for color-based face detection systems using integral image. International Review on Computers and Software, 6 (1). pp. 32-39. ISSN 1828-6003; ESSN: 1828-6011

Hajamydeen, Asif Iqbal and Udzir, Nur Izura and Mahmod, Ramlan and Abd Ghani, Abdul Azim (2011) Filtering events using clustering in heterogeneous security logs. Information Technology Journal, 10 (4). pp. 798-806. ISSN 1812-5638; ESSN: 1812-5646

Muda, Zaiton and Yassin, Warusia and Sulaiman, Md. Nasir and Udzir, Nur Izura (2011) A K-Means and Naive Bayes learning approach for better intrusion detection. Information Technology Journal, 10 (3). pp. 648-655. ISSN 1812-5638; ESSN: 1812-5646

Jazayeriy, Hamid and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura (2011) Pareto-optimal algorithm in bilateral automated negotiation. International Journal of Digital Content Technology and its Applications, 5 (3). pp. 1-11. ISSN 1975-9339; ESSN: 2233-9310

Alwan, Ali Amer and Ibrahim, Hamidah and Tan, Chik Yip and Sidi, Fatimah and Udzir, Nur Izura and Mohd Saad, Nurul Husna (2011) Performance evaluation of preference queries techniques over a high multidimensional database. International Journal of Computational Linguistics Research, 2 (1). pp. 37-47. ISSN 0976-416X; ESSN: 0976-4178

Teo, Poh Kuang and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2011) Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments. American Journal of Economics and Business Administration, 3 (1). pp. 101-111. ISSN 1945-5488; ESSN: 1945-5496

Roslan, Nuur Alifah and Mahmod, Ramlan and Udzir, Nur Izura (2011) Sharp-edges method in Arabic text steganography. Journal of Theoretical and Applied Information Technology, 33 (1). pp. 32-41. ISSN 1992-8645; ESSN: 1817-3195

Barjini, Hassan and Othman, Mohamed and Ibrahim, Hamidah and Udzir, Nur Izura (2011) Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks. Peer-to-Peer Networking and Applications, 5 (1). pp. 1-13. ISSN 1936-6442; ESSN: 1936-6450

Golzari, Shahram and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura (2011) An efficient and effective immune based classifier. Journal of Computer Science, 7 (2). pp. 148-153. ISSN 1549-3636; ESSN: 1552-6607

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura (2011) A framework for checking and ranking integrity constraints in a distributed database. Journal of Next Generation Information Technology, 2 (1). pp. 37-48. ISSN 2092-8637; ESSN: 2233-9388

Almurtadha, Yahya Mohammed and Sulaiman, Md. Nasir and Mustapha, Norwati and Udzir, Nur Izura (2011) iPACT: improved web page recommendation system using profile aggregation based on clustering of transactions. American Journal of Applied Sciences, 8 (3). pp. 277-283. ISSN 1546-9239; ESSN: 1554-3641

Jazayeriy, Hamid and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura (2011) A review on soft computing techniques in automated negotiation. Scientific Research and Essays, 6 (24). art. no. 2FC710D32038. pp. 5100-5106. ISSN 1992-2248

Yasin, Waheed and Ibrahim, Hamidah and Abdul Hamid, Nor Asila Wati and Udzir, Nur Izura (2011) A systematic review of file sharing in mobile devices using peer-to-peer systems. Computer and Information Science, 4 (1). pp. 28-41. ISSN 1913-8989; ESSN: 1913-8997

Mirabi, Meghdad and Ibrahim, Hamidah and Mamat, Ali and Udzir, Nur Izura and Fathi, Leila (2010) Controlling label size increment of efficient XML encoding and labeling scheme in dynamic XML update. Journal of Computer Science, 6 (12). pp. 1535-1540. ISSN 1549-3636

Udzir, Nur Izura and Ibrahim, Hamidah and Demesie, Sileshi (2010) Finer garbage collection in LINDACAP. International Journal of Information Technology and Web Engineering, 5 (3). pp. 1-26. ISSN 1554-1045

AlMurtadha, Yahya M. and Sulaiman, Md. Nasir and Mustapha, Norwati and Udzir, Nur Izura (2010) Mining web navigation profiles for recommendation systems. Information Technology Journal, 9 (4). pp. 790-796. ISSN 1812-5638; ESSN: 1812-5646

Alwan, Ali A. and Ibrahim, Hamidah and Udzir, Nur Izura (2010) A model for ranking and selecting integrity tests in a distributed database. International Journal of Information Technology and Web Engineering, 5 (3). pp. 65-84. ISSN 1554-1045

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura (2009) Improved integrity constraints checking in distributed databases by exploiting local checking. Journal of Computer Science and Technology, 24 (4 ). pp. 665-674. ISSN 1000-9000

Heidarinezhad, Mohammad Reza and Ahmad Zukarnain, Zuriati and Udzir, Nur Izura and Othman, Mohamed (2009) A host mobility support with adaptive network selection method in hybrid wireless environment. International Journal of Digital Content Technology and its Applications, 3 (1). pp. 34-39. ISSN 1975-9339

Golzari, Shahram and Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura (2009) Effect of fuzzy resource allocation method on AIRS classifier accuracy. Journal of Theoretical and Applied Information Technology, 5 (1). pp. 18-24. ISSN 1992-8645

Bagherian, Elham and O. K. Rahmat, Rahmita Wirza and Udzir, Nur Izura (2009) Extract of facial feature point. International Journal of Computer Science and Network Security, 9 (1). pp. 49-53. ISSN 1738-7906

Heidarinezhad, Mohammad Reza and Ahmad Zukarnain, Zuriati and Udzir , Nur Izura and Othman, Mohamad (2009) Mobility support across hybrid IP-based wireless environment : review of concepts, solutions and related issues. Annals of Telecommunications, 64. pp. 677-691. ISSN 0003-4347

Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura and Ahmad Zulkarnain, Zuriati (2009) UPEM : user-centered privacy evaluation model in pervasive computing system. Ubiquitous Computing and Communication Journal, 4 (4). pp. 50-57. ISSN 1992-8424; ESSN: 1992-8424‎

Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura and Ahmad Zulkarnain, Zuriati (2009) UPEM : user-centered privacy evaluation model in pervasive computing systems. Ubiquitous Computing and Communication Journal, 4 (4). pp. 50-57. ISSN 1992-8424

Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura (2009) A XML based, user-centered privacy model in pervasive computing systems. International Journal of Computer Science and Network Security, 9 (10). pp. 167-173. ISSN 1738-7906

Golzari, Shahram and C. Doraisamy, Shyamala and Udzir, Nur Izura and Sulaiman, Md. Nasir (2009) The effect of noise on RWTSAIRS classifier. European Journal of Scientific Research, 31 (4). pp. 632-641. ISSN 1450-216X; ESSN: 1450-202X

Tabatabaie, Zahra Sadri and O. K. Rahmat, Rahmita Wirza and Udzir, Nur Izura and Kheirkhah, Esmaeil (2009) A hybrid face detection system using combination of appearance-based and feature-based methods. International Journal of Computer Science and Network Security, 9 (5). pp. 181-185. ISSN 1738-7906

Safi, Faramarz and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura (2008) Business process distribution: an intelligent approach. Journal of Theoretical and Applied Information Technology, 4 (10). pp. 1236-1245. ISSN 1992-8645

Ahmad Zukarnain, Zuriati and Udzir, Nur Izura and Othman, Mohamed (2008) HTS : a hierarchical method for load balancing in autonomous networks. International Journal of Computer Science and Network Security, 8 (6). pp. 1-4. ISSN 1738-7906

Book

Udzir, Nur Izura and Yaakob, Razali and Zakaria, Mohamed Nordin (2001) C++: pengenalan kepada pengaturcaraan. Prentice Hall, Petaling Jaya, Selangor. ISBN 9839236814

Book Section

Udzir, Nur Izura and Abdullah, Azizol and Mahmod, Ramlan (2017) A secure and privacy preserving iris biometric authentication scheme with matrix transformation. In: Information Security Applications. Springer International Publishing, Germany, 341 - 352. ISBN 9783319565484

Halboob, Waleed and Alghathbar, Khaled S. and Mahmod, Ramlan and Udzir, Nur Izura and Abdullah @ Selimun, Mohd Taufik and Deghantanha, Ali (2014) An efficient computer forensics selective imaging model. In: Future Information Technology. Lecture Notes in Electrical Engineering, 276 . Springer, Heidelberg, Germany, pp. 277-284. ISBN 9783642408601; EISBN: 9783642408618

Barjini, Hassan and Othman, Mohamed and Ibrahim, Hamidah and Udzir, Nur Izura (2012) Analytical studies and experimental examines for flooding-based search algorithms. In: Information Computing and Applications. Lecture Notes in Computer Science (7473). Springer, Berlin Heidelberg, pp. 299-306. ISBN 9783642340628; EISBN: 9783642340628

Conference or Workshop Item

Salji, Mohd Rafiz and Udzir, Nur Izura and Ninggal, Mohd Izuan Hafez and Mohd Sani, Nor Fazlida and Ibrahim, Hamidah (2019) Trust, purpose, and role-based access control model for privacy protection. In: International Symposium on ICT Management and Administration (ISICTMA2019), 31 July-2 Aug. 2019, Putrajaya Marriott Hotel, Malaysia. (pp. 69-73).

Yusof, Ahmad Riza'ain and Udzir, Nur Izura and Selamat, Ali and Hamdan, Hazlina and Abdullah @ Selimun, Mohd Taufik (2017) Adaptive feature selection for denial of services (DoS) attack. In: 2017 IEEE Conference on Application, Information and Network Security (AINS), 13-14 Nov. 2017, Miri Marriott Resort & Spa, Miri, Sarawak. (pp. 81-84).

Babanejaddehaki, Ghazaleh and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah and Aljuboori, Ali Amer Alwan (2017) Deriving skyline points over dynamic and incomplete databases. In: 6th International Conference on Computing and Informatics (ICOCI 2017), 25-27 Apr. 2017, Kuala Lumpur, Malaysia. (pp. 77-83).

Teo, Poh Kuang and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura (2017) Modality conflict analysis in XACML policy evaluation. In: 6th International Conference on Computing and Informatics (ICOCI 2017), 25-27 Apr. 2017, Kuala Lumpur, Malaysia. (pp. 708-713).

Babanejaddehaki, Ghazaleh and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah and Dehaki, Ghoncheh Babanejad and Aljuboori, Ali Amer Alwan (2015) Identifying skylines in dynamic incomplete database. In: 9th International Conference on Computer Engineering and Applications (CEA '15), 22-24 Feb. 2015, Dubai, United Arab Emirates. (pp. 231-236).

Maharani, Sitti Syarah and Yaakob, Razali and Udzir, Nur Izura (2015) An investigation of back-propagation neural network on university selection. In: 2nd International Conference on Computer, Communications, and Control Technology (I4CT 2015), 21-23 Apr. 2015, Kuching, Sarawak, Malaysia. (pp. 248-252).

Barati, Mehdi and Abdullah, Azizol and Udzir, Nur Izura and Mahmod, Ramlan and Mustapha, Norwati (2014) Distributed Denial of Service detection using hybrid machine learning technique. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 26-27 Aug. 2014, Kuala Lumpur, Malaysia. (pp. 268-273).

Adinehnia, Reza and Udzir, Nur Izura and Affendey, Lilly Suriani and Ishak, Iskandar and Mohd Hanapi, Zurina (2014) Effective mining on large databases for intrusion detection. In: International Symposium on Biometrics and Security Technologies (ISBAST 2014), 26-27 Aug. 2014, Kuala Lumpur, Malaysia. (pp. 204-207).

Teo, Poh Kuang and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2014) Heterogeneity XACML policy evaluation engine. In: Malaysian National Conference of Databases 2014 (MaNCoD 2014), 17 Sept. 2014, Universiti Putra Malaysia, Serdang, Selangor. (pp. 230-238).

Ibrahim, Hamidah and Yasin, Waheed and Abdul Hamid, Nor Asilah Wati and Udzir, Nur Izura (2014) Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm. In: Malaysian National Conference of Databases 2014 (MaNCoD 2014), 17 Sept. 2014, Universiti Putra Malaysia, Serdang, Selangor. (pp. 69-74). (Unpublished)

Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Muda, Zaiton and Zulzalil, Hazura (2014) Packet header anomaly detection using statistical analysis. In: 7th International Conference on Computational Intelligence in Security for Information Systems (CISIS14), 25-27 June 2014, Bilbao, Spain. (pp. 473-482).

Abd Aziz, Norazah and Udzir, Nur Izura and Mahmod, Ramlan (2014) Performance analysis for extended TLS with mutual attestation for platform integrity assurance. In: 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems (IEEE-CYBER 2014), 4-7 June 2014, Hong Kong, China. (pp. 13-18).

Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Zulzalil, Hazura and Muda, Zaiton (2014) Signature-based anomaly intrusion detection using integrated data mining classifiers. In: International Symposium on Biometrics and Security Technologies (ISBAST 2014), 26-27 Aug. 2014, Kuala Lumpur, Malaysia. (pp. 232-237).

Yassin, Warusia and Udzir, Nur Izura and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik and Muda, Zaiton and Zulzalil, Hazura (2013) Host-based packet header anomaly detection using statistical analysis. In: International Seminars on Mathematics and Natural Sciences (ISMNS 2013), 15-17 Aug. 2013, Samarkand, Uzbekistan. (pp. 1-8).

Mohamed Yassin, Warusia and Udzir, Nur Izura and Muda, Zaiton and Sulaiman, Md. Nasir (2013) Anomaly-based intrusion detection through K-means clustering and naives Bayes classification. In: 4th International Conference on Computing and Informatics (ICOCI 2013), 28-30 Aug. 2013, Sarawak, Malaysia. (pp. 298-303).

Alwan, Ali A. and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2013) Estimating missing values of skylines in incomplete database. In: The Second International Conference on Digital Enterprise and Information Systems (DEIS 2013), 4-6 Mar. 2013, Kuala Lumpur, Malaysia. (pp. 220-229).

Barati, Mehdi and Abdullah, Azizol and Mahmod, Ramlan and Mustapha, Norwati and Udzir, Nur Izura (2013) Features selection for ids in encrypted traffic using genetic algorithm. In: 4th International Conference on Computing and Informatics (ICOCI 2013), 28-30 Aug. 2013, Sarawak, Malaysia. (pp. 279-285).

Yasin, Waheed and Ibrahim, Hamidah and Abdul Hamid, Nor Asilah Wati and Udzir, Nur Izura (2013) The affects of caching in browser stage on the performance of web items delivery. In: The Second International Conference on Digital Enterprise and Information Systems (DEIS 2013), 4-6 Mar. 2013, Kuala Lumpur, Malaysia. (pp. 212-219).

Udzir, Nur Izura and Wood, Alan and Muda, Zaiton and Dehghantanha, Ali and Abdullah @ Selimun, Mohd Taufik and Abdullah, Azizol (2012) Access control in open distributed systems. In: Workshop on Information Technology and Applications (WIT-A 2012), 4-5 June 2012, Istanbul, Turkey. (pp. 1-5).

Salehian, Solmaz and Masoumiyan, Farzaneh and Udzir, Nur Izura (2012) Energy-efficient intrusion detection in wireless sensor network. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 207-212).

Manavi, Sina and Mohammadalian, Sadra and Udzir, Nur Izura and Abdullah, Azizol (2012) Hierarchical secure virtualization model for cloud. In: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012) , 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 219-224).

Asmawi, Aziah and Affendey, Lilly Suriani and Udzir, Nur Izura and Mahmod, Ramlan (2012) Model-based system architecture for preventing XPath injection in database-centric web services environment. In: 7th International Conference on Computing and Convergence Technology (ICCCT 2012), 3-5 Dec. 2012, Seoul, Korea. (pp. 621-625).

Abd Aziz, Norazah and Setapa, Sharipah and Udzir, Nur Izura (2012) Mutual remote attestation in IPSec based VPN. In: 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012), 4-6 June 2012, Langkawi, Malaysia. (pp. 1-5). (Unpublished)

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin (2012) Towards secure model for SCADA systems. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 60-64).

Mahboubian, Mohammad and Udzir, Nur Izura and Subramaniam, Shamala and Abdul Hamid, Nor Asila Wati (2012) An alert fusion model inspired by artificial immune system. In: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012) , 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 317-322).

Yassin, Warusia and Udzir, Nur Izura and Muda, Zaiton and Abdullah, Azizol and Abdullah @ Selimun, Mohd Taufik (2012) A cloud-based intrusion detection service framework. In: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012) , 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 213-218).

Abdullah, Zul Hilmi and Udzir, Nur Izura and Mahmod, Ramlan and Samsudin, Khairulmizam (2011) File integrity monitor scheduling based on file security level classification. In: Second International Conference on Software Engineering and Computer Systems (ICSECS 2011), 27-29 June 2011, Kuantan, Pahang, Malaysia. (pp. 177-189).

Almurtadha, Yahya Mohammed and Sulaiman, Md. Nasir and Mustapha, Norwati and Udzir, Nur Izura (2011) Improved web page recommender system based on web usage mining. In: 3rd International Conference on Computing and Informatics (ICOCI 2011), 8-9 June 2011, Bandung, Indonesia. (pp. 32-36).

Muda, Zaiton and Mohamed Yassin, Warusia and Sulaiman, Md. Nasir and Udzir, Nur Izura (2011) Intrusion detection based on K-means clustering and Naïve Bayes classification. In: 7th International Conference on Information Technology in Asia (CITA 2011), 12-13 July 2011, Kuching, Sarawak. .

Muda, Zaiton and Mohamed Yassin, Warusia and Sulaiman, Md. Nasir and Udzir, Nur Izura (2011) Intrusion detection based on k-means clustering and OneR classification. In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec. 2011, Melaka, Malaysia. (pp. 192-197).

Teo, Poh Kuang and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura (2011) Policy inconsistency detection based on RBAC model in cross-organizational collaboration. In: 3rd International Conference on Computing and Informatics (ICOCI 2011), 8-9 June 2011, Bandung, Indonesia. (pp. 333-338).

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2011) Skyline queries over incomplete multidimensional database. In: 3rd International Conference on Computing and Informatics (ICOCI 2011), 8-9 June 2011, Bandung, Indonesia. (pp. 201-206).

Dehghantanha, Ali and Udzir, Nur Izura and Mahmod, Ramlan (2011) Towards data centric mobile security. In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec. 2011, Melaka, Malaysia. (pp. 62-67).

Abu Bakar, Azreena and Abdullah, Rusli and Udzir, Nur Izura and Ibrahim, Hamidah (2011) An empirical study of the characteristics of access control model towards secure KMS in collaborative environment. In: International Conference on Electrical Engineering and Informatics (ICEEI 2011), 17-19 July 2011, Bandung, Indonesia. .

Nooshabadi, Meghdad Mirabi and Ibrahim, Hamidah and Fathi, Leila and Mamat, Ali and Udzir, Nur Izura (2011) A fractional number based labeling scheme for dynamic XML updating. In: 3rd International Conference on Computing and Informatics (ICOCI 2011), 8-9 June 2011, Bandung, Indonesia. (pp. 194-200).

Lee, Soon and Othman, Mohamed and Udzir, Nur Izura (2009) IP spoofing defense: an introduction. In: Second International Conference on Computing and Informatics 2009 (ICOCI09), 24-25 June 2009, Kuala Lumpur, Malaysia. .

Hormozi, Shahram Golzari and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura (2009) Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase. In: 2009 IEEE Congress on Evolutionary Computation (CEC 2009), 18-21 May 2009, Trondheim, Norway. (pp. 3040-3044).

Hormozi, Shahram Golzari and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura and Mohd Norowi, Noris (2008) Artificial immune recognition system with nonlinear resource allocation method and application to traditional Malay music genre classification. In: 7th International Conference on Artificial Immune Systems (ICARIS 2008), 10-13 Aug. 2008, Phuket, Thailand. (pp. 132-141).

Hormozi, Shahram Golzari and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura (2008) Effect of nonlinear resource allocation on AIRS classifier accuracy. In: Knowledge Management International Conference 2008 (KMICe 2008), 10-12 June 2008, Langkawi, Kedah. (pp. 596-600).

Udzir, Nur Izura and Sulaiman, Md. Nasir and Muda, Zaiton and Zulzalil, Hazura and Abdullah, Rusli (2008) Refined garbage collection for open distributed systems with multicapabilities. In: 3rd International Symposium on Information Technology (ITSim'08), 26-28 Aug. 2008, Kuala Lumpur, Malaysia. .

Heidarinezhad, Mohammed Reza and Ahmad Zukarnain, Zuriati and Udzir, Nur Izura and Othman, Mohamed (2008) A connection selection method for vertical handoff in hybrid wireless environment. In: First International Symposium on Applied Sciences on Biomedical and Communication Technologies (ISABEL 2008), 25-28 Oct. 2008, Aalborg University, Denmark. .

Hamzah, Rosliza and Ibrahim, Hamidah and Udzir, Nur Izura (2008) A framework for mobile web query searching using ontology domain. In: Knowledge Management International Conference 2008 (KMICe 2008), 10-12 June 2008, Langkawi, Kedah. (pp. 433-438).

Hormozi, Shahram Golzari and C. Doraisamy, Shyamala and Sulaiman, Md. Nasir and Udzir, Nur Izura (2008) A hybrid approach to traditional Malay music genre classification: combining feature selection and artificial immune recognition system. In: 3rd International Symposium on Information Technology (ITSim'08), 26-28 Aug. 2008, Kuala Lumpur, Malaysia. .

Jazayeriy, Hamid and Azmi Murad, Masrah Azrifah and Sulaiman, Md. Nasir and Udzir, Nur Izura (2008) A neural network-based model to learn agent's utility function. In: 3rd International Symposium on Information Technology (ITSim'08), 26-28 Aug. 2008, Kuala Lumpur, Malaysia. .

Doraisamy, Shyamala and Golzari, Shahram and Mohd. Norowi, Noris and Sulaiman, Md. Nasir and Udzir, Nur Izura (2008) A study on feature selection and classification techniques for automatic genre classification of traditional Malay music. In: 9th International Conference on Music Information Retrieval, ISMIR 2008, 14-18 Sep. 2008, Philadelphia, USA. (pp. 331-336).

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura (2007) Analysis of integrity tests for checking integrity constraints in a distributed database. In: 1st Regional Conference on Computational Science and Technologies (RCCST 2007), 29-30 Nov. 2007, Shangri-la Tanjung Aru Resort and Spa, Kota Kinabalu, Sabah. (pp. 321-325).

Udzir, Nur Izura and Wood, Alan (2006) Establishing private communications in open systems using multicapabilities. In: 2nd International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA 2006), 24-28 Apr. 2006, Damascus, Syria. (pp. 3371-3376).

Thesis

Udzir, Nur Izura (1998) Rangkaian Neural Untuk Sistem Dapatan Semula Perkataan Daripada Pangkalan Data. Masters thesis, Universiti Putra Malaysia.

This list was generated on Mon Feb 24 02:42:42 2020 UTC.