- Home
- Research
- Research Area
- Cybersecurity
Cybersecurity
The aim of the Cybersecurity research group is to promote research in Cybersecurity domains, produce qualified human capital, and innovative research products which can serve the needs of various stakeholders
Objectives
(a) to exploit the latest tools and technology related to Cybersecurity domain
(b) to nurture human capital that can serve the needs of stakeholders
(c) to collaborate with external stakeholders with similar interests and needs in Cybersecurity
1. Social Sector
-
Secondary Security Layer for Anti-Phishing Technique using Image Processing Algorithm (Associate Professor Dr Chiew Kang Leng)
-
Enhancing the phishing website detection model through uniform resources locator analysis (Associate Professor Dr Chiew Kang Leng)
-
Enhancing Pharming Attack Detection Model (Associate Professor Dr Chiew Kang Leng)
-
Enhancing Phishing Attack Detection Model Through Data Mining and Data Analysis for Better Detection Accuracy (Associate Professor Dr Chiew Kang Leng)
2. Telecommunication
-
A Dynamic and Automated Signature Detection Framework for Malware Analysis (Associate Professor Dr Johari Abdullah)
-
Designing of Security Protocols for Mobile Multihop Relay Based WiMAX Networks (Dr Adnan Shahid Khan)
-
Scalable Rekeying Secrecy Model for D2D Group Communication in 5G Cellular Networks (Dr Adnan Shahid Khan)
-
Mitigating MAC Layer Attacks In 5G Cellular Networks (Dr Adnan Shahid Khan)
-
Quantum Cryptographic Scheme for Mobile Multihop D2D Using Deep Learning Approach (Dr Adnan Shahid Khan)
-
Blockchain-Based Multifactor Authentication for Future 6G Cellular Network (Dr Adnan Shahid Khan)
-
Blockchain Based Cybersecurity (Dr Adnan Shahid Khan)
-
Secure and Dynamic Multiple Junction Selection Routing Protocol in VANET (Dr Adnan Shahid Khan)
-
IoT based Energy Efficient Solar Panel Tracking and Monitoring System (Dr Adnan Shahid Khan)
-
Securing Internet-of-things (IoT) through Blockchain (Dr Adnan Shahid Khan)
-
Securing IoT Devices Through Multi-Factor Authentication Using BlockChain (Dr Adnan Shahid Khan)
-
Securing Deep Learning Model through DNA encoding scheme (Dr Adnan Shahid Khan)
Head
- Associate Professor Dr Johari Abdullah, Blockhain, Malware and Threats detection, Information Governance
Member
- Associate Professor Dr Tan Chong Eng, Other ICT Infrastucture n.e.c., Communication Networks and Services, Sustainable Green Technology, Information, Computer and Communication Technology
- Associate Professor Dr Chiew Kang Leng, Other Information, Computer and Communication Technology (ICT) n.e.c.
- Associate Professor Dr Mohamad Nazim Jambli, Other Information, Computer and Communication Technology (ICT) n.e.c.
- Associate Professor Dr Kartinah Zen, IoT protocol, Cloud Computing, 5G, OWC, WSN
- Dr Noralifah Annuar
- Dr Adnan Shahid Khan, Information Security, Wireless Communication, Blockchain, Cellular Networks, Cryptosystem
- Dr Izzatul Nabila Sharbini, Cryptography, Cryptosystem
- Dr Ling Yeong Tyng, Malware detection, Machine Learning
- Dr Lau Sei Ping
- Mdm Azlina Ahmadi Julaihi, Information, Computer and Communication Technology
- Ts Ahmad Hadinata Fauzi, Information, Computer and Communication Technology
- Mr Rajan Thangaveloo
- Mdm Seleviawati Tarmizi, Multi-factor Authentication
- Junaid Rasool, Deep Learning Based Ethical Hacking for Cybersecurity
- Ahmad Hadinata Fauzi, Detection of Mirai Botnet in IoT Using Deep Learning
- Teshinia Tisa Phang, Botnet Detection on IoT Network using Deep Learning Approach
- Wisnu Hera Pamungkas, Improving Traffic Quality of IoT Sensors in Smart Cities Using Optical Wireless Communication
- Kong Peng, Digital Forensics Based On Internet Of Things Applications
- Siti Nurhamizah Binti Raim, Improving The Integration Of WSN and IoT Applications For Healthcare
- Nur Syazwani Atifah Binti Muhammad Farouk, Improving TCP Congestion Control for 5G Network
- Christopher Chee Chin Fung, Data Analytics Approach to Discover Products Selling Opportunity in e-Commerce Marketplace
- Bian Hui, Enterprise Computer Network Security
- Zeeshan Ahmed, Spectrogram based Anomaly Detection System for Internet-of-Things using deep Convolution Neural Network
- Najmu Nisa, Cross Layer Design for Mitigating Security Threats in Software Defined Networking
- Shehrish Aqeel, Securing Deep Learning Model through DNA encoding scheme
- Shehroz Afzal, Securing IoT Devices Through Multi-Factor Authentication Using BlockChain
- Jamil Asim, Blockchain-Based Multifactor Authentication For Future 6G Cellular Network
- Rehan Ahmad, Quantum Cryptographic Scheme for Mobile Multihop D2D Using Deep Learning Approach
- Mohd Izzat Bin Yahya, Lightweight Multifactor Authentication for Cell-free in Ultra Dense 6G based Cellular Networks
- Cranston Mason, Security Mechanism using One-Time Acknowledgement Rule on Cloud Computing
Past Research Students
- Nayeem Khan, Ensemble Classifier on Malicious JavaScript Attacks Detection using Extended Features
- Chiadighikaobi Ikenna Rene, A Dynamic Approach using Machine Learning and Indicators of Compromise to Detect Malicious Code for High Accuracy Intrusion Detection
- Navein Chanderan, Automated Malware Behaviour Analysis and Detection using Machine Learning
- Muhammad Javed, Strong Mobility Protocols For Mobile Wireless Sensor Networks
- Najm Us Sama, Dealing With Routing Hole Problem In Multi-hop Hierarchical Routing Protocol In Wireless Sensor Network
- Abdul Qahar, Centralized Intelligent Network Management For Energy Efficient Resource Management Mechanism Small Cell Network
- Jeffrey Choo Soon Fatt, Phishdentity: Leverage Website Favicon to Offset Phishing Website
- Colin Tan Choon Lin, Phishing Detection with Identity Keywords and Target Domain Name
- Chang Ee Hung, Phishing Website Detection Using Website Logo
- Tin Tze Chiang, Prediction of Incoming Work-in-Progress in Semiconductor Fabrication Foundry Using Long Short-Term-Memory Recurrent Neural Network
- Colin Tan Choon Lin, Leveraging Ensemble Strategies in Identity Verification and Feature Optimisation for Phishing Website Detection
- Irshad Ahmed Abbasi, Reliable Path Selection Packet Forwarding Routing Protocol for Vehicular Adhoc Networks
- Yasir Javed Kiani, Trust Based Lightweight Security Protocol in Device to Device Communication
- Rashad Mahmood Saqib, Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Networks
- Kuhanraj Balan, Secure Trust-Based Algorithm Using Blockchain to Prevent Attacks in VANET
- Sarawak Information Systems Sdn. Bhd. (SAINS)
- UTeM, Information Security Forensics and Computer Networking (INFORNET)
- CyberSecurity Malaysia
Dataset Link : Phishing Dataset
The Phishing Websites Dataset contains a total of 30,000 samples of webpages, namely, 15,000 legitimate samples and 15,000 phishing samples. All webpage elements (i.e., images, URLs, HTML, screenshot and WHOIS information) are organized according to different folder for each sample.