IIUM Repository

Dr. Normaziah Abdul Aziz

Computer Science

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Profile Picture

Latest Additions

  1. Lajis, Adidah and Nasir, Haidawati and Abdul Aziz, Normaziah (2020) NCI evalution: assessment of higher order thinking skills via short free text answer. In: 2019 IEEE 6th International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA 2019), 27 - 29 Aug 2019, Kuala Lumpur, Malaysia.
  2. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2019) Improved Malware detection model with Apriori Association rule and particle swarm optimization. Security and Communication Networks, 2019. pp. 1-13. ISSN 1939-0114 E-ISSN 1939-0122
  3. Abdul Aziz, Normaziah and Mantoro, Teddy and Khairudin, M. Aiman and A. Murshid, A. Faiz (2019) Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018, 6 -8 September 2018, Asian Institute of Technology (AIT)Bangkok; Thailand.
  4. Amer, Ahmed and Abdul Aziz, Normaziah (2019) Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering, 8 (5). pp. 2408-2413. ISSN 2278-3091
  5. Abdul Aziz, Normaziah and M. Yusof, Muhammad Saifulldin and Ab. Malik, Muhammad Helmi and Hanizam, Ahmad Rasyad and Abd Rahman, Lukman Hakim (2019) Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018), 13th-15th Nov. 2018, Putrajaya.
  6. Lajis, Adidah and Mohd Nor@Abdullah, Anis Fadzilah and Awang Mat, Tiliza and Nasir, Haidawati and Ab Aziz, Normaziah (2019) Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA), 28th-30th November 2018, Songkla, Thailand.
  7. Lajis, Adidah and Mohamad Nasir, Haidawati and Abdul Aziz, Normaziah (2018) Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018, 8-10 February 2018, Universiti Malaysia Pahang (UMP) Pekan Campus LibraryPekan, Pahang; Malaysia.
  8. Lajis, Adidah and Baharudin, Shahidatul Arfah and Ab Kadir, Diyana and Mohd Ralim, Nadilah and Mohamad Nasir, Haidawati and Abdul Aziz, Normaziah (2018) A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering, 10 (2-5). pp. 109-113. ISSN 2180-1843 E-ISSN 2289-8131
  9. Abdul Rahman, Ayub and Abdul Aziz, Normaziah and Hamzah, Mohd. Syarqawy (2016) Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology, 4 (1). pp. 19-27. ISSN 2288-7202 E-ISSN 2288-7318
  10. A. Aziz, Normaziah and Hassan, Nur Asnida and Shamsuddin, Siti Nurul Zulaikha (2017) Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016), 28th-29th Oct. 2016, Mataram, Indonesia.
  11. Abdul Aziz, Normaziah and Adebayo, Surajudeen Adebayo (2015) The trend of mobile malwares and effective detection techniques. In: Critical Socio-Technical Issues Surrounding Mobile Computing. IGI-Global, pp. 219-233. ISBN 9781466694385
  12. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on, 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.
  13. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.
  14. Abdul Aziz, Normaziah and Mansor, Yushiana and Sarif Abdullah, Sharifah Nur Amirah and Mohd Shah, Siti Raihana and Aersid, Nurul Farhana (2014) Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17th-18th Nov 2014, Kuching, Sarawak.
  15. Shuib, Ahmad Hasanul Ishraf and Abdul Aziz, Normaziah and Mat Daud, Nuraihan and Hasan, Haslin (2014) CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov 2014, Kuching.
  16. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014), 8-10 December 2014, Melaka, Malaysia.
  17. Al Muataz, Zubaidah and Abdul Aziz, Normaziah (2015) A new efficient text detection method for image spam filtering. International Review on Computers and Software, 10 (1). pp. 1-8. ISSN 1828-6003
  18. Abdul Aziz, Normaziah and Mokti, Fakhrulrazi and M. Nozri, Mohd Nadhar (2016) Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015, 29th-30th October 2015, Jakarta, Indonesia.
  19. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2015) Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security, 10. pp. 152-163. ISSN 1554-1010
  20. Lajis, Adidah and Abdul Aziz, Normaziah (2014) Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T), 27-29 Aug. 2014, Kuala Lumpur.

Most Viewed Items

Item titleViews
1Multilingual online resources for minority languages of a campus community1439
2CRF based feature extraction applied for supervised automatic text summarization 1353
3Pronouncing dictionary for minority languages of Muslim community1300
4Part-of-speech in a node-link scoring techniques for assessing learners' understanding1287
5Investigating computer forensic tools and their searching technique1225
6Web and mobile based phrase dictionary1219
7Secure coding in cross site scripting1215
8Log visualization of intrusion and prevention reverse proxy server against web attacks 1185
9Modelling learners’ understanding through Node-link analysis and scoring 1174
10Computerized observation and motion in badminton tracking system1095
11A system and method of language translation 1034
12Competency assessment of short free text answers1022
13Behavioral analysis and visualization of Fast-Flux DNS 1005
14An algebraic approach for sentence based feature extraction applied for automatic text summarization978
15Risk identification for an information security management system implementation964
16Secure coding in software development948
17Network forensics: detection and mitigation of botnet malicious code via darknet882
18Study on sparseness effects over NMF applied for automatic text summarization852
19Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization824
20Normalizing library records display using FRBR model for al-Qur'an work-set816
21Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization789
22Mobile device forensics: extracting and analysing data from an android-based smartphone743
23NL scoring technique for the assessment of learners' understanding710
24CART - an Arabic teaching-learning tool for non-native Arabic speakers693
25Emotion graph models for bipedal walk cycle animation692
26Assessment of learner's understanding: an experimental result690
27A new efficient text detection method for image spam filtering 687
28An intelligence based model for the prevention of advanced cyber-attacks678
29Assessing learner’s understanding via node-link analysis: an information theory approach671
30Techniques for analysing android malware660