IIUM Repository

Dr. Normaziah Abdul Aziz

Computer Science

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Profile Picture

Latest Additions

  1. Amer, Ahmed and Abdul Aziz, Normaziah (2019) Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering, 8 (5). pp. 2408-2413. ISSN 2278-3091
  2. Abdul Aziz, Normaziah and M. Yusof, Muhammad Saifulldin and Ab. Malik, Muhammad Helmi and Hanizam, Ahmad Rasyad and Abd Rahman, Lukman Hakim (2019) Acquiring and analysing digital evidence: a teaching and learning experience in class. In: 2018 Cyber Resilience Conference (CRC 2018), 13th-15th Nov. 2018, Putrajaya.
  3. Lajis, Adidah and Mohd Nor@Abdullah, Anis Fadzilah and Awang Mat, Tiliza and Nasir, Haidawati and Ab Aziz, Normaziah (2019) Data selection in the assessment of higher order thinking skills: focus on cognitive competency. In: 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA), 28th-30th November 2018, Songkla, Thailand.
  4. Lajis, Adidah and Mohamad Nasir, Haidawati and Abdul Aziz, Normaziah (2018) Proposed assessment framework based on bloom taxonomy cognitive competency: Introduction to programming. In: 7th International Conference on Software and Computer Applications, ICSCA 2018, 8-10 February 2018, Universiti Malaysia Pahang (UMP) Pekan Campus LibraryPekan, Pahang; Malaysia.
  5. Lajis, Adidah and Baharudin, Shahidatul Arfah and Ab Kadir, Diyana and Mohd Ralim, Nadilah and Mohamad Nasir, Haidawati and Abdul Aziz, Normaziah (2018) A review of techniques in automatic programming assessment for practical skill test. Journal of Telecommunication, Electronic and Computer Engineering, 10 (2-5). pp. 109-113. ISSN 2180-1843 E-ISSN 2289-8131
  6. Abdul Rahman, Ayub and Abdul Aziz, Normaziah and Hamzah, Mohd. Syarqawy (2016) Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology, 4 (1). pp. 19-27. ISSN 2288-7202 E-ISSN 2288-7318
  7. A. Aziz, Normaziah and Hassan, Nur Asnida and Shamsuddin, Siti Nurul Zulaikha (2017) Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016), 28th-29th Oct. 2016, Mataram, Indonesia.
  8. Abdul Aziz, Normaziah and Adebayo, Surajudeen Adebayo (2015) The trend of mobile malwares and effective detection techniques. In: Critical Socio-Technical Issues Surrounding Mobile Computing. IGI-Global, pp. 219-233. ISBN 9781466694385
  9. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on, 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.
  10. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Techniques for analysing android malware. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.
  11. Abdul Aziz, Normaziah and Mansor, Yushiana and Sarif Abdullah, Sharifah Nur Amirah and Mohd Shah, Siti Raihana and Aersid, Nurul Farhana (2014) Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17th-18th Nov 2014, Kuching, Sarawak.
  12. Shuib, Ahmad Hasanul Ishraf and Abdul Aziz, Normaziah and Mat Daud, Nuraihan and Hasan, Haslin (2014) CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov 2014, Kuching.
  13. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014), 8-10 December 2014, Melaka, Malaysia.
  14. Al Muataz, Zubaidah and Abdul Aziz, Normaziah (2015) A new efficient text detection method for image spam filtering. International Review on Computers and Software, 10 (1). pp. 1-8. ISSN 1828-6003
  15. Abdul Aziz, Normaziah and Mokti, Fakhrulrazi and M. Nozri, Mohd Nadhar (2016) Mobile device forensics: extracting and analysing data from an android-based smartphone. In: 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015, 29th-30th October 2015, Jakarta, Indonesia.
  16. Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2015) Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security, 10. pp. 152-163. ISSN 1554-1010
  17. Lajis, Adidah and Abdul Aziz, Normaziah (2014) Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T), 27-29 Aug. 2014, Kuala Lumpur.
  18. Batcha, Nowshath Kadhar and Abdul Aziz, Normaziah (2014) An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters, 20 (1). pp. 139-143. ISSN 1936-6612 E-ISSN 1936-7317
  19. Batcha, Nowshath Kadhar and Murugesan, Raja Kumar and A. Aziz, Normaziah (2012) Study on sparseness effects over NMF applied for automatic text summarization. In: The 2nd IEEE International Conference on Cyber Technology In Automation, Control, and Intelligent Systems (IEEE-CYBER 2012), 27th - 31th May 2012, Imperial Queen’s Park Hotel, Bangkok, Thailand.
  20. Ab. Rahman, Suhaimi and Abdul Aziz, Normaziah and Solemon, Badariah (2008) An English-Malay translation memory system. In: 8th IEEE International Conference on Computer and Information Technology Workshops (CIT Workshop 2008), 8-11 July 2008, Sidney, Australia.

Most Viewed Items

Item titleViews
1Multilingual online resources for minority languages of a campus community1349
2CRF based feature extraction applied for supervised automatic text summarization 1274
3Pronouncing dictionary for minority languages of Muslim community1217
4Part-of-speech in a node-link scoring techniques for assessing learners' understanding1188
5Web and mobile based phrase dictionary1137
6Investigating computer forensic tools and their searching technique1131
7Secure coding in cross site scripting1126
8Log visualization of intrusion and prevention reverse proxy server against web attacks 1106
9Modelling learners’ understanding through Node-link analysis and scoring 1076
10Computerized observation and motion in badminton tracking system1009
11A system and method of language translation 953
12Competency assessment of short free text answers943
13Behavioral analysis and visualization of Fast-Flux DNS 930
14An algebraic approach for sentence based feature extraction applied for automatic text summarization906
15Risk identification for an information security management system implementation883
16Secure coding in software development859
17Network forensics: detection and mitigation of botnet malicious code via darknet790
18Study on sparseness effects over NMF applied for automatic text summarization764
19Normalizing library records display using FRBR model for al-Qur'an work-set741
20Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization720
21Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization701
22Mobile device forensics: extracting and analysing data from an android-based smartphone655
23NL scoring technique for the assessment of learners' understanding640
24Assessment of learner's understanding: an experimental result612
25An intelligence based model for the prevention of advanced cyber-attacks607
26CART - an Arabic teaching-learning tool for non-native Arabic speakers604
27Emotion graph models for bipedal walk cycle animation604
28Assessing learner’s understanding via node-link analysis: an information theory approach595
29A new efficient text detection method for image spam filtering 591
30Techniques for analysing android malware589