Miss Laiha Mat Kiah

Orcid: 0000-0002-1240-5406

Affiliations:
  • University of Malaya, Kuala Lumpur, Department of Computer System & Technology


According to our database1, Miss Laiha Mat Kiah authored at least 73 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A systematic literature review on advanced persistent threat behaviors and its detection strategy.
J. Cybersecur., January, 2024

Analysis of Terahertz (THz) Frequency Propagation and Link Design for Federated Learning in 6G Wireless Systems.
IEEE Access, 2024

2023
A review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations.
CoRR, 2023

Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection.
IEEE Access, 2023

Secure PIN-Entry Method Using One-Time PIN (OTP).
IEEE Access, 2023

2022
BYOD Policy Compliance: Risks and Strategies in Organizations.
J. Comput. Inf. Syst., 2022

Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces.
IEEE Access, 2022

Authenticated Encryption Schemes: A Systematic Review.
IEEE Access, 2022

Systematic Literature Review of Security Control Assessment Challenges.
Proceedings of the 12th IEEE International Conference on Control System, 2022

2021
Machine learning-based offline signature verification systems: A systematic review.
Signal Process. Image Commun., 2021

A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions.
PeerJ Comput. Sci., 2021

BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts.
J. Organ. Comput. Electron. Commer., 2021

Wireless backhaul network's capacity optimization using time series forecasting approach.
J. Ambient Intell. Humaniz. Comput., 2021

A systematic review of PIN-entry methods resistant to shoulder-surfing attacks.
Comput. Secur., 2021

A Frictionless and Secure User Authentication in Web-Based Premium Applications.
IEEE Access, 2021

Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs.
IEEE Access, 2021

Information System Audit for Mobile Device Security Assessment.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2020
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things.
Sensors, 2020

Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey.
J. Medical Imaging Health Informatics, 2020

A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb.
IEEE Commun. Lett., 2020

Compliance with bring your own device security policies in organizations: A systematic literature review.
Comput. Secur., 2020

DM-GKM: A key management scheme for dynamic group based applications.
Comput. Networks, 2020

An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2020

Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges.
IEEE Access, 2020

Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting.
IEEE Access, 2020

2019
Comprehensive review and analysis of anti-malware apps for smartphones.
Telecommun. Syst., 2019

QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things.
Symmetry, 2019

Review on Security of Internet of Things Authentication Mechanism.
IEEE Access, 2019

Modeling Traffic Congestion Based on Air Quality for Greener Environment: An Empirical Study.
IEEE Access, 2019

BYOD Security Policy Compliance Framework.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

2018
Host mobility key management in dynamic secure group communication.
Wirel. Networks, 2018

Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet.
IET Networks, 2018

A security framework for mHealth apps on Android platform.
Comput. Secur., 2018

2017
A review of smart home applications based on Internet of Things.
J. Netw. Comput. Appl., 2017

A distributed framework for health information exchange using smartphone technologies.
J. Biomed. Informatics, 2017

2016
Service delivery models of cloud computing: security issues and open challenges.
Secur. Commun. Networks, 2016

The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks.
Pervasive Mob. Comput., 2016

RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system.
Medical Biol. Eng. Comput., 2016

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Netw. Comput. Appl., 2016

2015
Soft-Computing Methodologies for Precipitation Estimation: A Case Study.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2015

A systematic review of approaches to assessing cybersecurity awareness.
Kybernetes, 2015

Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges.
J. Netw. Comput. Appl., 2015

A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy.
J. Medical Syst., 2015

Erratum to: An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1.
J. Medical Syst., 2015

Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing.
J. Medical Syst., 2015

Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network.
J. Intell. Fuzzy Syst., 2015

Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning.
J. Circuits Syst. Comput., 2015

Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS.
J. Biomed. Informatics, 2015

A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.
J. Grid Comput., 2015

Multi-criteria analysis for OS-EMR software selection problem: A comparative study.
Decis. Support Syst., 2015

Key management paradigm for mobile secure group communications: Issues, solutions, and challenges.
Comput. Commun., 2015

Appraisal of adaptive neuro-fuzzy computing technique for estimating anti-obesity properties of a medicinal plant.
Comput. Methods Programs Biomed., 2015

The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations.
Comput. Methods Programs Biomed., 2015

Potential of support vector regression for optimization of lens system.
Comput. Aided Des., 2015

2014
Incremental proxy re-encryption scheme for mobile cloud computing environment.
J. Supercomput., 2014

BSS: block-based sharing scheme for secure data storage services in mobile cloud environment.
J. Supercomput., 2014

Routing protocol design for secure WSN: Review and open research issues.
J. Netw. Comput. Appl., 2014

Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks.
J. Netw. Comput. Appl., 2014

MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network.
J. Medical Syst., 2014

Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture.
J. Medical Syst., 2014

A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier.
Neurocomputing, 2014

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks.
Eng. Appl. Artif. Intell., 2014

Open source EMR software: Profiling, insights and hands-on analysis.
Comput. Methods Programs Biomed., 2014

Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper.
Appl. Soft Comput., 2014

2013
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.
J. Supercomput., 2013

A more secure and scalable routing protocol for mobile ad hoc networks.
Secur. Commun. Networks, 2013

An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1.
J. Medical Syst., 2013

Towards secure mobile cloud computing: A survey.
Future Gener. Comput. Syst., 2013

An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique.
Eng. Appl. Artif. Intell., 2013

Anomaly Detection Using Cooperative Fuzzy Logic Controller.
Proceedings of the Intelligent Robotics Systems: Inspiring the NEXT, 2013

Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

2007
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments.
Proceedings of the Future Generation Communication and Networking, 2007

2005
Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments.
Proceedings of The 2005 International Conference on Security and Management, 2005


  Loading...