الكليات

الكليات

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Normaziah Binti Abdul Aziz
Associate Professor

  • KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
  • IIUM Gombak Campus
  • naa@iium.edu.my
  • 5663

Print CV Email Me

Staff Detail


Normaziah Abdul Aziz obtained her BSc in Computer Science from the University of South Carolina, USA under a Petronas scholarship. Upon returning, she worked at the Central Bank of Malaysia (Bank Negara Malaysia). She continued her studies in MSc in Computer Science at University Kebangsaan Malaysia and later joined MIMOS in 1989. She was then offered the Asia Development Bank (ADB) scholarship representing MIMOS to pursue her Ph.D at the Department of Artificial Intelligence, University of Edinburgh, Scotland. Her research then was in the area of Cognitive Modelling with a thesis entitled a? ... show more

  • Ph.D in Artificial Intelligence - Doctor of Philosophy, University of Edinburgh
  • Master in Computer Science - Masters Degree, Universiti Kebangsaan Malaysia (UKM)
  • Bachelor in Computer Science - Bachelor Degree, University of South of Carolina, USA
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - Digital Forensics
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science - Cognitive modelling
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Computational Linguistic - Machine Translation, Multilingual and Multimodal Online Resources
  • 2010 - -1 Regional Contest Director, ACM-ICPC
COMPUTER FORENSIC 2011/2012 2012/2013 2013/2014 2014/2015 2016/2017
DATA STRUCTURE & ALGORITHM 2011/2012
DIGITAL EVIDENCE FORENSICS 2017/2018 2018/2019 2019/2020 2020/2021
FINAL YEAR PROJECT 2007/2008 2008/2009 2009/2010 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2016/2017 2017/2018
FINAL YEAR PROJECT I 2017/2018 2019/2020 2020/2021
FINAL YEAR PROJECT II 2019/2020 2020/2021
INDUSTRIAL ATTACHMENT 2008/2009 2009/2010 2010/2011 2011/2012 2013/2014 2014/2015 2016/2017 2017/2018
IT SECURITY I 2012/2013 2013/2014 2014/2015
PRINCIPLES OF ARTIFICIAL INTELLIGENCE 2007/2008 2008/2009 2009/2010 2010/2011 2011/2012 2012/2013
PRINCIPLES OF IT SECURITY 2016/2017 2017/2018 2018/2019 2019/2020 2020/2021
In Progress
2019 - Present Secure Hybrid Agile Software Development Lifecycle Framework for Software Engineering Process
2019 - Present Secure framework for digital forensics of vehicle maintenance
2018 - Present A Novel Particle Swarm Optimization with Levy Flight Algorithm for Imputation of Missing Creatinine Value.
2017 - Present Secure Maintenance Services Logging System for Automotive Systems
2017 - Present Kiram-al-Katibin : Green and Secure IoT Project for Managing Resources and Assist Classroom Related Activities
2016 - Present Cybersecurity Capability Maturity Model based on Maqasid al Shari?ah (MS-C2M2)
2008 - Present Intelligent Cyberspace Security
Unknown - Present Integrated Secure Framework for Vehicle Forensics
Completed
2017 - -1 Development of Teaching Modules on the Subject of Computer Science Form 5 for MDeC and MOE
2015 - 2016 Digital Competency Standards (DCS) Rubrics Refinement and Post Pilot Analysis
2015 - -1 DIGITAL COMPETENCY STANDARDS (DCS) ANALYTICS & REPORT
2014 - 2016 Anti-Malware for Mobilephones
2011 - 2014 Formulating Readability Check for Arabic Text and Development of its Online Version
2010 - 2012 RU 2011: Feasibility study on the application of object-oriented FRBR model to MARC-based bibliographic records on Al-Quran
2010 - 2011 Preliminary Study for Establishing Children's Screening and Brain Development Understanding using Soft Computing Approach
2010 - 2012 Ground Penetrating Radar System using OFDM Technology
2009 - 2011 Collection and Analysis of Human Brain Signals in Relation to Emotion using BIMEC, a Biometrical Machine and Software
2009 - 2011 Design and Implementation of An Algorithm for Collaborative Multi Robots in Autonomous Reconnaissance.
24 يوليو 2019 Murabbi Award (Sciences & Technology). IIUM - University level.
19 أبريل 2018 ICPC Foundation for Asia Distinguished Leadership Award. ICPC Foundation, Baylor University, Texas, USA - International level.
Article
2020 Evaluation of the Effectiveness of Movement Control Order to Limit the Spread of COVID-19. Preprints
2019 Improved Malware detection model with Apriori Association rule and particle swarm optimization. Security and Communication Networks , 2019 pp.1-13
2019 Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering , 8 (5) pp.2408-2413
2018 A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering , 10 (2-5) pp.109-113
2016 Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology , 4 (1) pp.19-27
2015 Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security , 10 pp.152-163
2015 A new efficient text detection method for image spam filtering . International Review on Computers and Software , 10 (1) pp.1-8
2014 An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters , 20 (1) pp.139-143
2013 CRF based feature extraction applied for supervised automatic text summarization . Procedia Technology , 11 pp.426-436
2013 A Corpus-Based Readability Formula for Estimate of Arabic Texts Reading Difficulty. World Applied Sciences Journal , 21 pp.168-173
2011 Part-of-speech in a node-link scoring techniques for assessing learners' understanding. Procedia Social and Behavioral Sciences , 27 pp.131-139
2011 Multilingual online resources for minority languages of a campus community. Procedia Social and Behavioral Sciences , 27 pp.291-298

Conference or Workshop Item

2020 NCI evalution: assessment of higher order thinking skills via short free text answer. In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019)
2019 Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018
2019 Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA)
2019 Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018)
2018 Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018
2018 Cyber security maturity model and Maqasid al-Shari'ah. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2018 Early prediction of acute kidney injury using machine learning algorithms. In: Asia Pacific Advanced Network Meeting (APAN 46)
2018 Security in Internet of Things (IoT) - Does It Matter?. In: International Symposium on IoT and SDN/NFV
2017 Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016)
2016 Emotion Graph Models For Bipedal Walk Cycle Animation. In: 2nd International Joint Convergence Conference, IJCC 2016
2016 Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015
2015 Simple recurrent network in real time astrocyte. In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA)
2015 Real time astrocyte in spiking neural network. In: 2015 SAI Intelligent Systems Conference (IntelliSys 2015)
2015 A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2). In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance
2014 CART-An Arabic teaching-learning tool for non-native Arabic speakers. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014)
2014 Web-Based Arabic Text Readability Index. In: 8th International Technology, Education and Development Conference (INTED 2014)
2014 Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2014 An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on
2014 Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T)
2014 Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014)
2014 CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2014 Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2013 Corpus-based readability formula for Arabic texts: a prototype. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Log visualization of intrusion and prevention reverse proxy server against web attacks . In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
2012 Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012)
2012 Risk identification for an information security management system implementation. In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies
2012 Detecting computer generated images for image spam filtering. In: 2012 International Conference on Advanced Computer Science Applications and Technologies
2012 NL scoring and Bloom competency test: an experimental result. In: The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12 )
2011 The dynamics and visualization of fast-flux DNS. In: APWG Counter eCrime Operations Summit V (CeCOS V)
2011 Secure coding in software development. In: 2011 5th Malaysian Conference in Software Engineering (MySEC)
2011 A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance. In: 4th International Conference on Mechatronics (ICOM'11)
2010 Modelling learners’ understanding through Node-link analysis and scoring . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010
2010 KDE approach to emotion recognition using brain waves. In: Proceedings of the ISCA 25th International Conference on Computers and Their Applications, CATA 2010
2010 Analyzing students' emotion while solving mathematical questions using EEG signals. In: 23nd International Conference, "Computer Applications in Industry and Engineering"
2010 KDE approach to emotion recognition using brain wave. In: 25th International Conference of Computers and their Applications (CATA)
2010 Modelling learners' understanding through node-link analysis and scoring. In: 3rd International Conference on Information and Communication Technology for the Muslim World (ICT4M 2010)
2010 NL scoring technique for the assessment of learners' understanding. In: Second International Conference on Computer Research and Development (ICCRD 2010)
2010 Understanding emotion: Cognitive science perspective . In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010)
2010 Analyzing students' emotion while solving Mathematical questions using EEG signals DUMMY. In: Procedings of the ISCA International Conference on Computer Applications in Industry and Engineering (CAINE)
2010 Understanding emotion: cognitive science perspective. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010)
2009 Assessment of learner's understanding: an experimental result. In: 2009 International Conference on Computer Technology and Development
2008 Assessing learner’s understanding via node-link analysis: an information theory approach. In: International Symposium on Information Technology 2008 (ITSim), Vol.1
2008 An English-Malay translation memory system. In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008)

Book

Book Section

2015 The trend of mobile malwares and effective detection techniques . In: Critical Socio-Technical Issues Surrounding Mobile Computing IGI-Global . ISBN 9781466694385 , pp.219-233
2012 Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing Atlantis Press . ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) , pp.65-78
2011 Emotion recognition using EEG signals. In: Understanding brain developmental disorder based on EEG in soft computing approach IIUM Press . ISBN 9789674181116 , pp.37-57
2011 Understanding students’ emotion while solving mathematical questions using EEG signals. In: Understanding brain developmental disorder based on EEG in soft computing approach IIUM Press . ISBN 9789674181116 , pp.94-110
2011 An online badminton motion tracking system. In: The Web: Its Utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.149-158
2011 Web application - What makes it secure or insecure? . In: The Web : Its Utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.263-271
2011 Web and mobile based phrase dictionary. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.1-9
2011 Computerized observation and motion in badminton tracking system. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.11-20
2011 Investigating computer forensic tools and their searching technique. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.69-85
2011 Secure coding in cross site scripting. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.143-156
2011 Pronouncing dictionary for minority languages of Muslim community. In: An anthology of applied computer technologies IIUM Press . ISBN 9789674181062 , pp.157-166