Staff Directory


Normaziah Binti Abdul Aziz

Academic Qualification

  • Ph.D in Artificial Intelligence - Doctor of Philosophy, University of Edinburgh
  • Master in Computer Science - Masters Degree, Universiti Kebangsaan Malaysia (UKM)
  • Bachelor in Computer Science - Bachelor Degree, University of South of Carolina, USA

Normaziah Binti Abdul Aziz (Assoc. Prof. Dr.)

Associate Professor
IIUM Gombak Campus

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY


naa@iium.edu.my
5663


Expert Profile


Normaziah Abdul Aziz obtained her BSc in Computer Science from the University of South Carolina, USA under a Petronas scholarship. Upon returning, she worked at the Central Bank of Malaysia (Bank Negara Malaysia). She continued her studies in MSc in Computer Science at University Kebangsaan Malaysia and later joined MIMOS in 1989. She was then offered the Asia Development Bank (ADB) scholarship representing MIMOS to pursue her Ph.D at the Department of Artificial Intelligence, University of Edinburgh, Scotland. Her research then was in the area of Cognitive Modelling with a thesis entitled "The Use of Belief Revision to Model Contradiction and Entrenched Misconceptions".
During her 18 years at MIMOS, she had worked on RMKe-7, 8 and 9 projects related to Intelligent Learning Environment and Language Technology which included Machine Translation and Speech Processing. She has a patent in the US patent office on "An English-Malay Translation Memory using Phrase Look-up Approach and Word Alignment Information Database" with Patent number WO/2009/002141, December 2008.
She later joined the academic world as an Associate Professor in the Department of Computer Science at the International Islamic University Malaysia (IIUM). Since 2009, she has been the Regional Contest Director for the ACM International Collegiate Programming Contest (ACM-ICPC) by the ICPC Headquarters in Baylor, Texas. She had headed the IIUM team to the ACM ICPC World Finals in Warsaw 2012 as one of the top-100 best university teams qualified.
Presently, her research work is in the area of Information Security, particularly in Digital Evidence Forensics and Secure Coding. She is also passionate about Computational Thinking where she co-organizes the Malaysian Computing Olympiad, Kangaroo Math Competition (Malaysia) and Beaver Informatics Competition (Malaysia) with a few key individuals in these initiatives.


Area of Specialisation


  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Computational Linguistic - Machine Translation, Multilingual and Multimodal Online Resources
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - Digital Forensics, Secure Programming
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science - Cognitive modelling


Teaching Responsibilities


COMPUTER FORENSIC 2016/2017 2014/2015 2013/2014 2012/2013 2011/2012
DATA STRUCTURE & ALGORITHM 2011/2012
DIGITAL EVIDENCE FORENSICS 2023/2024 2022/2023 2021/2022 2020/2021 2019/2020 2018/2019 2017/2018
FINAL YEAR PROJECT 2017/2018 2016/2017 2014/2015 2013/2014 2012/2013 2011/2012 2010/2011 2009/2010 2008/2009 2007/2008
FINAL YEAR PROJECT I 2021/2022 2020/2021 2019/2020 2017/2018
FINAL YEAR PROJECT II 2020/2021 2019/2020
INDUSTRIAL ATTACHMENT 2017/2018 2016/2017 2014/2015 2013/2014 2011/2012 2010/2011 2009/2010 2008/2009
IT SECURITY I 2014/2015 2013/2014 2012/2013
PRINCIPLES OF ARTIFICIAL INTELLIGENCE 2012/2013 2011/2012 2010/2011 2009/2010 2008/2009 2007/2008
PRINCIPLES OF IT SECURITY 2023/2024 2022/2023 2021/2022 2020/2021 2019/2020 2018/2019 2017/2018 2016/2017


Supervision


Sentiment-Based Support Vector Machine Optimized By Metaheuristic Algorithms For Cryptocurrency Forecasting.
Ph.D Completed 2022 Co-supervisor
Android-Based Malware Classification Using Apriori Algorithm With Particle Swarm Optimization.
Ph.D Completed 2017 Main Supervisor
Enhanced Approach For Non-Negative Matrix Factorization (Nmf) Based Summarization Using Conditional Random Fields (Crf) Segmentation .
Ph.D Completed 2016 Main Supervisor
Image Spam Filtering Through Multi-Features Analysis.
Ph.D Completed 2016 Main Supervisor
Assessing Learners Understanding Through Node-Link Analysis.
Ph.D Completed 2011 Main Supervisor
Assessing Learners Understanding Through Node-Link Analysis.
Ph.D Completed 2011 Main Supervisor
Digital Twin-Based Simulation For Vehicular Controller Area Network (Can) For Security Testing And Research.
Ph.D In Progress Co-supervisor
Data Privacy And Privacy Engineering.
Master Completed 2022 Main Supervisor
Cyber Security Capability Maturity Model Using Maqasid Al-Shariah Approach.
Master Completed 2020 Main Supervisor
Beta Reputation And Subjective Logic-Based Trust Management In Automotive Network.
Master Completed 2020 Co-supervisor
Evolutionary Deep Belief Network With Bootstrap Sampling For Imbalanced Class Data.
Master Completed 2019 Co-supervisor
Motion Analysis On Human Emotions For 3d Walk Cycle Animation.
Master Completed 2017 Main Supervisor
Activity Recognition Using Smart Phone Accelerometer With Naive Bayes Classifier For Emergency Cases.
Master Completed 2016 Main Supervisor
Ra Whiz - Risk Assessment Automation For An Information Security Management System.
Master Completed 2016 Main Supervisor
A Teaching And Learning Tool In Arabic For Non-Native Arabic Speakers.
Master Completed 2016 Main Supervisor
Secure Coding Awareness Learning Tool (Scalt) In Educating Learners On Web Vulnerabilities .
Master Completed 2015 Main Supervisor
Analyzing The Dynamics Of Fast-Flux Dns Through Visualization .
Master Completed 2013 Main Supervisor
Managing Cyber-Attacks And Cyber Incidents Proactively For Critical National Information Infrastructure (Cnii) Through A Coordinate Approach Using Benchmarking At The National Level.
Master In Progress Main Supervisor
A Dissertation Submitted In Fulfillment Of The Requirement For The Degree Of Master Of Computer Science & Information Technology.
Master In Progress Co-supervisor
Interpretable Machine Learning With Catboost Shapley Additive Explanations For Medical Records Analysis.
Master In Progress Co-supervisor
Secure Framework For Digital Forensics Of Vehicle Maintenance.
Master In Progress Co-supervisor
A Deep Learning Multimodal Biometric Technique For Face And Voice Authentication.
Master In Progress Co-supervisor


Research Projects


Completed
2023 - 2023 Development of Machine Learning Model for Testing and Evaluation of Data Privacy in ICT/IoT Products and Applications Project
2022 - 2023 Guideline on Testing and Evaluation Methodology for Data Privacy in ICT/IoT Products and Applications
2022 - 2023 Development of Data Privacy Specification for Developing ICT/IoT Products and Applications
2021 - 2021 Development of Data Privacy Management Framework for ICT/IoT Products and Applications
2020 - 2023 Face Detection Attendance System
2020 - 2022 Secure Water Monitoring and Management (SWaM) System
2020 - 2023 Smart Door Access System
2018 - 2022 A Novel Particle Swarm Optimization with Levy Flight Algorithm for Imputation of Missing Creatinine Value.
2017 - 2017 Development of Teaching Modules on the Subject of Computer Science Form 5 for MDeC and MOE
2017 - 2021 Secure Maintenance Services Logging System for Automotive Systems
2015 - 2016 DIGITAL COMPETENCY STANDARDS (DCS) ANALYTICS & REPORT
2015 - 2016 Digital Competency Standards (DCS) Rubrics Refinement and Post Pilot Analysis
2014 - 2016 Anti-Malware for Mobilephones
2011 - 2014 Formulating Readability Check for Arabic Text and Development of its Online Version
2010 - 2012 Ground Penetrating Radar System using OFDM Technology
2010 - 2012 RU 2011: Feasibility study on the application of object-oriented FRBR model to MARC-based bibliographic records on Al-Quran
2010 - 2011 Preliminary Study for Establishing Children's Screening and Brain Development Understanding using Soft Computing Approach
2009 - 2011 Collection and Analysis of Human Brain Signals in Relation to Emotion using BIMEC, a Biometrical Machine and Software
2009 - 2011 Design and Implementation of An Algorithm for Collaborative Multi Robots in Autonomous Reconnaissance.
- 2018 Privacy and Security in Cloud First Policy Environment (Microsoft Fund)
On-Going
2023 - Present An Alternative Model in Detecting Plagiarism in Academic Writing using the Authorship Attribution Concept
2023 - Present API and Permissioned Blockchain Based Digital Certificates
2019 - Present Secure Hybrid Agile Software Development Lifecycle Framework for Software Engineering Process
2019 - Present Secure framework for digital forensics of vehicle maintenance
2017 - Present Kiram-al-Katibin : Green and Secure IoT Project for Managing Resources and Assist Classroom Related Activities
2016 - Present Cybersecurity Capability Maturity Model based on Maqasid al Shari?ah (MS-C2M2)
2010 - Present Digital Evidence Acquisition and Analysis on Memory-based Devised
2008 - Present Intelligent Cyberspace Security


Award & Recognition


24 Jul, 2019 Murabbi Award (Sciences & Technology) - IIUM University
19 Apr, 2018 ICPC Foundation for Asia Distinguished Leadership Award - ICPC Foundation, Baylor University, Texas, USA International


Publications


Article

2023 M-Kitchen activities with PPR Lembah Subang (PPR-LS1) community - involvement of some KICT colleagues. KICT Newsletter, (8) pp. 3-3
2021 A particle swarm optimization levy flight algorithm for imputation of missing creatinine dataset. International Journal of Advances in Intelligent Informatics, 7 (2) pp. 225-236
2021 Freemium multi-sided platform business model: mosque kitchen as a source of free food, employment and empowerment of B40s food-preneurs. Journal of Information Systems and Digital Technologies, 3 (2) pp. 1-10
2020 Evaluation of the Effectiveness of Movement Control Order to Limit the Spread of COVID-19. Annals of Emerging Technologies in Computing (AETiC), 4 (4) pp. 1-9
2020 Two suggested probabilistic and kinetic models for astrocytic network in spiking neural networks. International Journal of Advanced Trends in Computer Science and Engineering, 9 (5) pp. 7951-7957
2019 Improved Malware detection model with Apriori Association rule and particle swarm optimization. Security and Communication Networks, 2019 () pp. 1-13
2019 Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering, 8 (5) pp. 2408-2413
2018 A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering, 10 (2-5) pp. 109-113
2016 Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology, 4 (1) pp. 19-27
2015 A new efficient text detection method for image spam filtering . International Review on Computers and Software, 10 (1) pp. 1-8
2015 Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security, 10 () pp. 152-163
2014 An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters, 20 (1) pp. 139-143
2013 A Corpus-Based Readability Formula for Estimate of Arabic Texts Reading Difficulty. World Applied Sciences Journal , 21 () pp. 168-173
2013 CRF based feature extraction applied for supervised automatic text summarization . Procedia Technology , 11 () pp. 426-436
2011 Multilingual online resources for minority languages of a campus community. Procedia Social and Behavioral Sciences, 27 () pp. 291-298
2011 Part-of-speech in a node-link scoring techniques for assessing learners' understanding. Procedia Social and Behavioral Sciences, 27 () pp. 131-139
Conference or Workshop Item

2023 Comparative evaluation of anomaly-based controller area network IDS. In: ICSCA 2023: 2023 12th International Conference on Software and Computer Applications,
2023 Performance comparison of feature selection methods for prediction in medical data. In: 7th International Conference on Soft Computing in Data Science, SCDS 2023,
2022 Analysis of optimizers on AlexNet architecture for face biometric authentication system. In: International Conference on Information Technology Research and Innovation (ICITRI) 2022,
2022 Interpretation of machine learning model using medical record visual analytics. In: 8th International Conference on Computational Science and Technology ICCST 2021,
2022 Using streaming data algorithm for intrusion detection on the vehicular controller area network. In: 1st International Conference on Ubiquitous Security, UbiSec 2021,
2021 Business model shifts: masjid kitchens as soup kitchens, jobs employment and empowering asnaf entrepreneurs, and income generation for the masjid. In: International Conference on Information Technology for the Muslim World (ICT4M 2021),
2021 Comparative performance of Convolutional Neural Networks Architecture for face biometric authentication system. In: IEEE 8th International Conference on Computing, Engineering and Design (ICCED),
2021 Cooperative behavior (ta’awun) between mosques and civic organizations in empowering asnafpreneurs through IIUM m-kitchen® project. In: 2nd Kedah International Zakat Conference 2021 (KEIZAC 2021),
2021 Interpretation of machine learning model using medical record visual analytics. In: The Eighth International Conference on Computational Science and Technology (ICCST2021),
2020 NCI evalution: assessment of higher order thinking skills via short free text answer. In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019),
2019 Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018),
2019 Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA),
2019 Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018,
2018 Cyber security maturity model and Maqasid al-Shari'ah. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2018 Early prediction of acute kidney injury using machine learning algorithms. In: Asia Pacific Advanced Network Meeting (APAN 46),
2018 Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018,
2017 Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016),
2016 Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015,
2015 A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2). In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance,
2015 Real time astrocyte in spiking neural network. In: 2015 SAI Intelligent Systems Conference (IntelliSys 2015),
2015 Simple recurrent network in real time astrocyte. In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA),
2014 An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on,
2014 Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014),
2014 CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014 CART-An Arabic teaching-learning tool for non-native Arabic speakers. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014),
2014 Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T),
2014 Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014 Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2013 Corpus-based readability formula for Arabic texts: a prototype. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
2013 Log visualization of intrusion and prevention reverse proxy server against web attacks . In: International Conference on Informatics and Creative Multimedia (ICICM), 2013,
2012 Detecting computer generated images for image spam filtering. In: 2012 International Conference on Advanced Computer Science Applications and Technologies,
2012 NL scoring and Bloom competency test: an experimental result. In: The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12 ),
2012 Risk identification for an information security management system implementation. In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies ,
2012 Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012),
2011 A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance. In: 4th International Conference on Mechatronics (ICOM'11),
2011 Secure coding in software development. In: 2011 5th Malaysian Conference in Software Engineering (MySEC),
2010 Modelling learners' understanding through node-link analysis and scoring. In: 3rd International Conference on Information and Communication Technology for the Muslim World (ICT4M 2010),
2010 Modelling learners’ understanding through Node-link analysis and scoring . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010,
2010 NL scoring technique for the assessment of learners' understanding. In: Second International Conference on Computer Research and Development (ICCRD 2010),
2010 Understanding emotion: Cognitive science perspective . In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010),
2009 Assessment of learner's understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development,
2009 Assessment of learners’ understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development,
2008 An English-Malay translation memory system. In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008),
2008 Assessing learner’s understanding via node-link analysis: an information theory approach. In: International Symposium on Information Technology 2008 (ITSim), Vol.1,
Book

2023 mKitchen™ towards Masyarakat Madani. mKitchen KICT IIUM, ISBN: 9789672656999
2023 Rumah Makan mKitchen for Free Food Distribution. mKitchen, KICT IIUM, ISBN: 978-967-26569-8-2
2022 Batch 3 IIUM mkitchen students. mKitchen, ISBN: 978-967-26569-6-
2022 Budi Ramadan mKitchen IIUM students. mKitchen KICT, ISBN: 978-967-26569-4-4
2022 MKitchen IIUM students integrate food with budi sejahtera. mKitchen Kulliyyah of Information and Communication Technology (KICT), ISBN: 978-967-26569-3-7
2022 MKitchen training and development. Mkitchen, KICT IIUM Gombak, ISBN: 978-967-26569-2-0
2022 Readings on Sejahtera MKitchen Entrepreneurship. mKitchen KICT IIUM, ISBN: 978-967-26569-5-1
2022 مطبخ المسجد: مشروع ريادي تعاوني. Al Manar Resources, ISBN: 978-629-97700-2-2
2021 A journey of ta’awun (cooperative behaviour) in edu-action at IIUM Mkitchen® and Masjid al-Syakirin Gombak (MASG). Meso Publishing, ISBN: 9789671981412
2021 Budi Mkitchen for flood victims. mKitchen, ISBN: 978-967-26569-1-3
2021 Budiman Mahallah kitchen. mKitchen, ISBN: 9789672656906
2021 Inaugural edu-action journey with cooperative behavior (Ta’awun) of mKitchen® students in free food for the needy. Meso Publishing, ISBN: 978-967-19814-4-3
2021 Mkitchen® UIAM penggerak asnaf sejahtera lestari. Meso Publishing, ISBN: 978-967-19814-2-9
Book Section

2021 Redesign business model of masjid kitchens as soup kitchens, providing jobs employment and nurturing of asnaf as entrepreneurs, and income generation for the masjid. In: Pusat Islam UTM, ISBN: , pp. 100-111
2020 Securing online quizzes and test on iTa’LeEM. In: Centre for Professional Development (CPD), International Islamic University Malaysia., ISBN: , pp. 179-184
2020 Simple security guidelines for E-Learning at IIUM. In: Centre for Professional Development (CPD), International Islamic University Malaysia., ISBN: , pp. 185-186
2015 The trend of mobile malwares and effective detection techniques . In: IGI-Global, ISBN: 9781466694385, pp. 219-233
2015 The trend of mobile malwares and effective detection techniques . In: IGI-Global, ISBN: 9781466694385, pp. 219-233
2012 Network forensics: detection and mitigation of botnet malicious code via darknet. In: Atlantis Press, ISBN: 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online), pp. 65-78
2012 Network forensics: detection and mitigation of botnet malicious code via darknet. In: Atlantis Press, ISBN: 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online), pp. 65-78
2011 An online badminton motion tracking system. In: IIUM Press, ISBN: 978-967-418-112-3, pp. 149-158
2011 Computerized observation and motion in badminton tracking system. In: IIUM Press, ISBN: 9789674181062, pp. 11-20
2011 Emotion recognition using EEG signals. In: IIUM Press, ISBN: 9789674181116, pp. 37-57
2011 Investigating computer forensic tools and their searching technique. In: IIUM Press, ISBN: 9789674181062, pp. 69-85
2011 Pronouncing dictionary for minority languages of Muslim community. In: IIUM Press, ISBN: 9789674181062, pp. 157-166
2011 Secure coding in cross site scripting. In: IIUM Press, ISBN: 9789674181062, pp. 143-156
2011 Understanding students’ emotion while solving mathematical questions using EEG signals. In: IIUM Press, ISBN: 9789674181116, pp. 94-110
2011 Web and mobile based phrase dictionary. In: IIUM Press, ISBN: 9789674181062, pp. 1-9
2011 Web application - What makes it secure or insecure? . In: IIUM Press, ISBN: 978-967-418-112-3, pp. 263-271
Monograph

2020 Cyber security capability maturity model based on Maqasid A Shari’ah (MS-C2M2). In: ,
2018 Cyber Security: towards a safe and secure cyber environment. In: Academy of Sciences Malaysia (ASM),
2012 Development of communication module for semi-autonomos UAV and robots. In: s.n,
2012 Feasibility study on the application of object-oriented frbr model to marc-based bibliographic records on al-quran. In: s.n,
2012 Ground penetrating radar system using OFDM technology . In: [s.n],