IIUM Repository

Assoc. Pro Normaziah Abdul Aziz

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Profile Picture

Latest Additions

  1. Abdul Aziz, Normaziah and M. Yusof, Muhammad Saifulldin and Ab. Malik, Muhammad Helmi and Hanizam, Ahmad Rasyad and Abd Rahman, Lukman Hakim (2019) Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018), 13th-15th Nov. 2018, Putrajaya.
  2. Lajis, Adidah and Mohd Nor@Abdullah, Anis Fadzilah and Awang Mat, Tiliza and Nasir, Haidawati and Ab Aziz, Normaziah (2019) Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA), 28th-30th November 2018, Songkla, Thailand.
  3. Lajis, Adidah and Mohamad Nasir, Haidawati and Abdul Aziz, Normaziah (2018) Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018, 8-10 February 2018, Universiti Malaysia Pahang (UMP) Pekan Campus LibraryPekan, Pahang; Malaysia.
  4. Lajis, Adidah and Baharudin, Shahidatul Arfah and Ab Kadir, Diyana and Mohd Ralim, Nadilah and Mohamad Nasir, Haidawati and Abdul Aziz, Normaziah (2018) A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering, 10 (2-5). pp. 109-113. ISSN 2180-1843
  5. Abdul Rahman, Ayub and Abdul Aziz, Normaziah and Hamzah, Mohd. Syarqawy (2016) Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology, 4 (1). pp. 19-27. ISSN 2288-7202
  6. A. Aziz, Normaziah and Hassan, Nur Asnida and Shamsuddin, Siti Nurul Zulaikha (2017) Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016), 28th-29th Oct. 2016, Mataram, Indonesia.
  7. Abdul Aziz, Normaziah and Adebayo, Surajudeen Adebayo (2015) The trend of mobile malwares and effective detection techniques. In: Critical Socio-Technical Issues Surrounding Mobile Computing. IGI-Global, pp. 219-233. ISBN 9781466694385
  8. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on, 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.
  9. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.
  10. Abdul Aziz, Normaziah and Mansor, Yushiana and Sarif Abdullah, Sharifah Nur Amirah and Mohd Shah, Siti Raihana and Aersid, Nurul Farhana (2014) Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17th-18th Nov 2014, Kuching, Sarawak.
  11. Shuib, Ahmad Hasanul Ishraf and Abdul Aziz, Normaziah and Mat Daud, Nuraihan and Hasan, Haslin (2014) CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov 2014, Kuching.
  12. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014), 8-10 December 2014, Melaka, Malaysia.
  13. Al Muataz, Zubaidah and Abdul Aziz, Normaziah (2015) A new efficient text detection method for image spam filtering. International Review on Computers and Software, 10 (1). pp. 1-8. ISSN 1828-6003
  14. Abdul Aziz, Normaziah and Mokti, Fakhrulrazi and M. Nozri, Mohd Nadhar (2016) Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015, 29th-30th October 2015, Jakarta, Indonesia.
  15. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2015) Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security, 10. pp. 152-163. ISSN 1554-1010
  16. Lajis, Adidah and Abdul Aziz, Normaziah (2014) Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T), 27-29 Aug. 2014, Kuala Lumpur.
  17. Batcha, Nowshath Kadhar and Abdul Aziz, Normaziah (2014) An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters, 20 (1). pp. 139-143. ISSN 1936-6612
  18. Batcha, Nowshath Kadhar and Murugesan, Raja Kumar and A. Aziz, Normaziah (2012) Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012), 27th - 31th May 2012, Imperial Queen’s Park Hotel, Bangkok, Thailand.
  19. Ab. Rahman, Suhaimi and Abdul Aziz, Normaziah and Solemon, Badariah (2008) An English-Malay translation memory system. In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008), 8-11 July 2008, Sidney, Australia.
  20. Lajis, Adidah and Abdul Aziz, Normaziah (2008) Assessing learner’s understanding via node-link analysis: an information theory approach. In: International Symposium on Information Technology 2008 (ITSim), Vol.1, 26-29 Aug. 2008, Kuala Lumpur.

Most Viewed Items

Item titleViews
1Multilingual online resources for minority languages of a campus community1287
2CRF based feature extraction applied for supervised automatic text summarization 1216
3Pronouncing dictionary for minority languages of Muslim community1155
4Part-of-speech in a node-link scoring techniques for assessing learners' understanding1128
5Secure coding in cross site scripting1075
6Web and mobile based phrase dictionary1068
7Investigating computer forensic tools and their searching technique1067
8Log visualization of intrusion and prevention reverse proxy server against web attacks 1057
9Modelling learners’ understanding through Node-link analysis and scoring 1026
10Computerized observation and motion in badminton tracking system947
11A system and method of language translation 913
12Competency assessment of short free text answers881
13Behavioral analysis and visualization of Fast-Flux DNS 874
14An algebraic approach for sentence based feature extraction applied for automatic text summarization850
15Risk identification for an information security management system implementation833
16Secure coding in software development805
17Network forensics: detection and mitigation of botnet malicious code via darknet739
18Study on sparseness effects over NMF applied for automatic text summarization703
19Normalizing library records display using FRBR model for al-Qur'an work-set673
20Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization653
21Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization641
22Mobile device forensics: extracting and analysing data from an android-based smartphone593
23NL scoring technique for the assessment of learners' understanding590
24Assessment of learner's understanding: an experimental result560
25An intelligence based model for the prevention of advanced cyber-attacks548
26Modelling learners' understanding through node-link analysis and scoring541
27Emotion graph models for bipedal walk cycle animation540
28Assessing learner’s understanding via node-link analysis: an information theory approach534
29Techniques for analysing android malware532
30A new efficient text detection method for image spam filtering 532