Research Interests: Faculty Supervisors
The list below is intended to help students who are seeking a thesis topic and an appropriate thesis supervisor.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A |
|
Aida Ali |
|
Ahmad Fariz Ali |
|
Anazida Zainal |
Network Security, Intrusion Detection System, Intrusion Prevention System and Soft Computing |
Arafat Mohammed Rashad Al-Dhaqm |
CyberSecurity field, Information Security Management, Digital Forensics (Database Forensics, Mobile Forensics, Network Forensics, Computer Forensics, Multimedia Forensics, IoT Forensics, and Cloud Forensics), Metamodeling Approaches |
B | |
Bander |
Cyber Security, Computer Networks, AI, ML, DL |
F | |
Firoz bin Yusuf Patel Dawoodi |
|
H | |
Haswadi Hasan |
|
Hazinah Kutty Mammi |
Computer Security: Authentication, Risks, Policies, Forensics, Education; Computer Science Education: T&L, Competency, Retention, [Analogia] |
I | |
Ismail Fauzi Isnin |
MANET, VANET, WSN, Computer Networking |
J | |
Johan Mohamad Sharif |
Network, Security, Embedded System, Visualisation, Bioinformatics, Image Processing |
K | |
Kamalrulnizam bin Abu Bakar |
Mobile and Wireless Computing, Ad Hoc and Sensor Networks, Information Security, Grid Computing |
L | |
Lizawati Mi Yusuf |
Numerical Analysis, Optimization, Information Retrieval, Parallel Computing, Machine Learning |
M | |
Maheyzah Md Sirat @ Md Siraj |
Information Security and Assurance including Intrusion Detection, Alert Correlation and Analysis, Intrusion Response and Prevention, Network/Digital Forensic, Biometrics, Privacy Preserving, Big Data Mining, Machine Learning, Soft Computing Techniques, Hybrid Artificial Intelligent |
Marina Md Arshad |
Network & Security, Teaching & Learning, Data Analytics |
Md Asri bin Ngadi |
Computer & Network Security, Wireless & Sensor Network, Network Protocol |
Mohd Fo’ad Rohani |
Pattern Recognition, Digital Signal Processing (DSP), Computer Architecture, Network Communication and Security |
Mohd Murtadha Mohamad |
Ad-Hoc Network; Indoor Positioning |
Muhalim Mohamed Amin |
Computer Network and Security |
N | |
Nur Haliza Abdul Wahab |
indoor location tracking, internet of things, augmented reality, networking, wireless network, ipv6 |
Noh Abdul Samad |
Cyber Security, Real-time system, Computer networking, Computer programming, Software engineering and development |
R | |
Raja Zahilah binti Raja Mohd. Radzi |
Next Generation Network, Wireless Network, Embedded System |
Rashidah Kadir |
Multimedia Security, PRBG & Computer System |
Roselina Sallehuddin |
|
S | |
Sarina Sulaiman |
|
Shafaatunnur Hasan |
|
Shukor Abd Razak |
Mobile Ad-Hoc Network Security, Computer Security, Computer Forensic, Network Security, Wireless Network Security, Computer Network, Wireless Network, Mobile Ad-Hoc Network, Sensor Network, Cloud and Grid Computing |
Siti Hajar Othman |
Conceptual Modelling, Metamodelling, Disaster Management, Information Security, Computer Forensic, Knowledge Retrieval, Disaster Recovery and Business Continuity Planning |
Suriati Sadimon |
|
Syed Hamid Hussain Madni |
Computer Networks, Cloud Computing, Green Computing, Fog Computing, Internet of Things, Big Data, E-Learning, Security and Analysis of Algorithms. |
Syed Othmawi Abd. Rahman |
QoS in cellular network |
Y | |
Yusliza Yusoff |
Machining, Optimization, Genetic Algorithm, Multi objective, Artificial Neural Network, Orthogonal Array |
Z | |
Zuriahati Mohd Yunos |