IIUM Repository

Dr. Normaziah Abdul Aziz

Computer Science

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Profile Picture

Latest Additions

  1. Abdul-Rahman Abed, Bassam and Ayyoub, Belal and Ismail, Amelia Ritahani and Abdul Aziz, Normaziah and A. Hamdan, Mazen (2020) Two suggested probabilistic and kinetic models for astrocytic network in spiking neural networks. International Journal of Advanced Trends in Computer Science and Engineering, 9 (5). pp. 7951-7957. ISSN 2278-3091
  2. Amiruzzaman, Md and Al Wadud, M. Abdullah and Mohd Nor, Rizal and Abdul Aziz, Normaziah (2020) Evaluation of the Effectiveness of Movement Control Order to Limit the Spread of COVID-19. Annals of Emerging Technologies in Computing (AETiC), 4 (4). pp. 1-9. ISSN 2516-0281 E-ISSN 2516-029X
  3. Abdul Aziz, Normaziah and Mansor, Hafizah and Mohd Nor, Rizal and Wahiddin, Mohamed Ridza (2017) Guideline for privacy and security in Cloud First Security Environment. [Copyright] (Unpublished)
  4. Abdul Aziz, Normaziah and Saidin, Aznan Zuhid and Wahiddin, Mohamed Ridza and Ibrahim, Jamaludin and Ahmad Dahlan, Abdul Rahman and Ahmad H.Osman, Rahmah and M. Ridza, Nadwiyah (2020) Cyber security capability maturity model based on Maqasid A Shari’ah (MS-C2M2). Research Report. UNSPECIFIED. (Unpublished)
  5. Lajis, Adidah and Nasir, Haidawati and Abdul Aziz, Normaziah (2020) NCI evalution: assessment of higher order thinking skills via short free text answer. In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019), 27 - 29 Aug 2019, Kuala Lumpur, Malaysia.
  6. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2019) Improved Malware detection model with Apriori Association rule and particle swarm optimization. Security and Communication Networks, 2019. pp. 1-13. ISSN 1939-0114 E-ISSN 1939-0122
  7. Abdul Aziz, Normaziah and Mantoro, Teddy and Khairudin, M. Aiman and A. Murshid, A. Faiz (2019) Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018, 6 - 8 Sept 2018, Asian Institute of Technology (AIT)Bangkok, Thailand.
  8. Amer, Ahmed and Abdul Aziz, Normaziah (2019) Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering, 8 (5). pp. 2408-2413. ISSN 2278-3091
  9. Abdul Aziz, Normaziah and M. Yusof, Muhammad Saifulldin and Ab. Malik, Muhammad Helmi and Hanizam, Ahmad Rasyad and Abd Rahman, Lukman Hakim (2019) Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018), 13th-15th Nov. 2018, Putrajaya.
  10. Lajis, Adidah and Mohd Nor@Abdullah, Anis Fadzilah and Awang Mat, Tiliza and Nasir, Haidawati and Ab Aziz, Normaziah (2019) Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA), 28th-30th November 2018, Songkla, Thailand.
  11. Lajis, Adidah and Mohamad Nasir, Haidawati and Abdul Aziz, Normaziah (2018) Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018, 8-10 February 2018, Universiti Malaysia Pahang (UMP) Pekan Campus LibraryPekan, Pahang; Malaysia.
  12. Lajis, Adidah and Baharudin, Shahidatul Arfah and Ab Kadir, Diyana and Mohd Ralim, Nadilah and Mohamad Nasir, Haidawati and Abdul Aziz, Normaziah (2018) A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering, 10 (2-5). pp. 109-113. ISSN 2180-1843 E-ISSN 2289-8131
  13. Abdul Rahman, Ayub and Abdul Aziz, Normaziah and Hamzah, Mohd. Syarqawy (2016) Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology, 4 (1). pp. 19-27. ISSN 2288-7202 E-ISSN 2288-7318
  14. A. Aziz, Normaziah and Hassan, Nur Asnida and Shamsuddin, Siti Nurul Zulaikha (2017) Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016), 28th-29th Oct. 2016, Mataram, Indonesia.
  15. Abdul Aziz, Normaziah and Adebayo, Surajudeen Adebayo (2015) The trend of mobile malwares and effective detection techniques. In: Critical Socio-Technical Issues Surrounding Mobile Computing. IGI-Global, pp. 219-233. ISBN 9781466694385
  16. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on, 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.
  17. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.
  18. Abdul Aziz, Normaziah and Mansor, Yushiana and Sarif Abdullah, Sharifah Nur Amirah and Mohd Shah, Siti Raihana and Aersid, Nurul Farhana (2014) Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17th-18th Nov 2014, Kuching, Sarawak.
  19. Shuib, Ahmad Hasanul Ishraf and Abdul Aziz, Normaziah and Mat Daud, Nuraihan and Hasan, Haslin (2014) CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov 2014, Kuching.
  20. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014), 8-10 December 2014, Melaka, Malaysia.

Most Viewed Items

Item titleViews
1Multilingual online resources for minority languages of a campus community1728
2Pronouncing dictionary for minority languages of Muslim community1648
3CRF based feature extraction applied for supervised automatic text summarization 1613
4Part-of-speech in a node-link scoring techniques for assessing learners' understanding1594
5Investigating computer forensic tools and their searching technique1588
6Secure coding in cross site scripting1546
7Web and mobile based phrase dictionary1472
8Modelling learners’ understanding through Node-link analysis and scoring 1467
9Log visualization of intrusion and prevention reverse proxy server against web attacks 1448
10Computerized observation and motion in badminton tracking system1381
11A system and method of language translation 1314
12Competency assessment of short free text answers1314
13An algebraic approach for sentence based feature extraction applied for automatic text summarization1284
14Behavioral analysis and visualization of Fast-Flux DNS 1280
15Risk identification for an information security management system implementation1252
16Secure coding in software development1210
17Network forensics: detection and mitigation of botnet malicious code via darknet1161
18Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization1146
19Study on sparseness effects over NMF applied for automatic text summarization1141
20Normalizing library records display using FRBR model for al-Qur'an work-set1115
21Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization1103
22Mobile device forensics: extracting and analysing data from an android-based smartphone1051
23CART - an Arabic teaching-learning tool for non-native Arabic speakers1007
24An intelligence based model for the prevention of advanced cyber-attacks984
25NL scoring technique for the assessment of learners' understanding981
26Emotion graph models for bipedal walk cycle animation976
27A new efficient text detection method for image spam filtering 971
28Assessment of learner's understanding: an experimental result965
29The trend of mobile malwares and effective detection techniques 954
30Techniques for analysing android malware946