Browsing by Author "Ahmad A."
Now showing 1 - 13 of 13
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication A Review of Web Classifier Approach with Possible Research Direction to Detect Cyber Extremists(Institute of Electrical and Electronics Engineers Inc., 2019) ;Al-Sukhni H.A.H. ;Saudi M.M. ;Ahmad A. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)The internet is ever expanding and online information is booming, making identification and detection of different web information vitally important, particularly those of dark web or Cyber extremists. Webpages with extremist and terrorist content are believed to be main factors in the radicalization and recruitment of disaffected individuals who might be involved in terrorist activities at home or those who fight alongside terrorist groups abroad. In fact, the sheer volume of online data makes it practically impossible for authorities to carry out the individual examination for every webpage, post or conversational thread that might or might not be relevant to terrorism or contain terrorist sympathies. As terrorists exist within every nation and every religion, hence this paper presents a review and systematic analysis of existing webpages on Cyber Terrorists. This include of existing database of Cyber extremists words and existing techniques of web classifier for keywords. Based on this paper systematic analysis, it will be the input for the formation of a new Cyber extremists WorldNet. � 2019 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication The application of the concept of best interests of the child in participating in the matrimonial proceeding in the Shariah court(American Scientific Publishers, 2017) ;Yaakob A. ;Ahmad A. ;Musa A.S. ;Mushaddad Hasbullah ;Rajuddin A.S. ;Zakaria M.Z. ;Awal N.A.M. ;Samuri M.A.A. ;Islamic Finance and Wealth Management Institute (IFWMI) ;Faculty of Syariah and Law ;Universiti Sains Islam Malaysia (USIM)Universiti Kebangsaan Malaysia (UKM)This paper discusses the application of children’s best interests in participating in the matrimonial proceedings of the Malaysian Shariah Court. The existing legal framework governing the children’s participation is also examined by looking at the court procedure and Sulh processes. The Sulh process is the present mechanism, introduced by the Shariah Court to expedite the settlement of matrimonial disputes. In practice, the settlement is always subject to mutual consent of both parties involved in disputes, but rarely the importance of children’s interests and hopes is taken into consideration. Hence, various children’s best interests could have been jeopardized in the process of courts proceedings. Therefore, it is suggested that a Sulh Council for Children should be established and a standard judicial procedures for children’s participation in matrimonial disputes particularly in the case of Hadhanah be developed in order to protect the children’s best interests. - Some of the metrics are blocked by yourconsent settings
Publication Children’s participation in custody dispute involving interfaith parents(American Scientific Publishers, 2017) ;Zakaria M.Z. ;Yaakob A. ;Ahmad A. ;Musa A.S. ;Mushaddad Hasbullah ;Rajuddin A.S. ;Awal N.A.M. ;Samuri M.A.A. ;Faculty of Syariah and Law ;Islamic Finance and Wealth Management Institute (IFWMI) ;Universiti Sains Islam Malaysia (USIM)Universiti Kebangsaan Malaysia (UKM)The paper seeks to discuss children’s participation in custody dispute involving interfaith parents and to examine to what extent the voice of the children will be considered and followed by the judge. This is in line with Article 12 of the United Nation Convention on the Rights of Child (CRC) which gives privilege to the children the right to be heard in any matter affecting their lives and as a State party, Malaysia has the obligation to uphold this right. This paper further discusses the views of Muslim jurists on the custodial right under the Islamic law and the approach of the civil and Shariah court in considering the views of children in custody dispute. It was found that in most cases, each party tried to convince the court that he or she is more eligible than the other to obtain the custody. The battles compounded and ignited controversies when both disputing parties commenced the legal tussle over custody of the children in the civil court and Shariah court respectively. In these cases the judgments often turned out differently and consequently, no satisfactory outcomes were achieved for the disputing parties. - Some of the metrics are blocked by yourconsent settings
Publication Children’s participation in judicial procedure to prevail family justice(American Scientific Publishers, 2017) ;Ahmad A. ;Awal N.A.M. ;Samuri M.A.A. ;Rajuddin A.S. ;Yaakob A. ;Zakaria M.Z. ;Islamic Finance and Wealth Management Institute (IFWMI) ;Faculty of Syariah and Law ;Universiti Sains Islam Malaysia (USIM)Universiti Kebangsaan Malaysia (UKM)Children, like adults, are equally entitled to enjoy their fundamental rights especially in deciding matters related to their lives. However, in cases that involve family disputes especially pertaining to custody of children, such rights have often been denied or disregarded all together. Therefore, this paper seeks to discuss the relationship between the children’s rights to participate in legal proceedings and whether the best interests of the child are considered in such family proceedings. To this end, this paper highlights the application of these two principles with special reference to the pluralistic legal system that Malaysian has namely the Civil and Shariah law, as well as the International law. Upon presenting the arguments, this paper recommends some improvements on the judicial procedures in order for judges to meet the children and ensure that justice is served to the latter, particularly by providing them equal rights to be heard in custodial cases. - Some of the metrics are blocked by yourconsent settings
Publication Cloud co-residency denial of service threat detection inspired by artificial immune system(Association for Computing Machinery, 2018) ;Ahmad A. ;Shafiuddin W. ;Kama M.N. ;Idris N.B. ;Saudi M.M. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;Zainudin CyberSecurity Malaysia ;Universiti Teknologi Malaysia (UTM)International Islamic University Malaysia (IIUM)Cloud computing introduces concerns about data protection and intrusion detection mechanism. A review of the literature shows that there is still a lack of works on cloud IDS that focused on implementing real-time hybrid detections using Dendritic Cell algorithm (DCA) as a practical approach. In addition, there is also lack of specific threat detection built to detect intrusions targeting cloud computing environment where current implementations still using traditional open source or enterprise IDS to detect threats targeting cloud computing environment. Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud Co-Residency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. This research also proposed a method in detecting co-residency attacks. In this paper the co-residency attack detection model was proposed and tested until satisfactory results were obtained with the datasets. The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. The results show that the proposed model was able to detect most of the types of attacks that conducted during the experiment. From the experiment, the CCTD model has been shown to improve DCA previously used to solve similar problem. � 2018 Association for Computing Machinery. - Some of the metrics are blocked by yourconsent settings
Publication Cloud denial of service detection by dendritic cell mechanism(Institute of Electrical and Electronics Engineers Inc., 2018) ;Ahmad A. ;Kama M.N. ;Yusop O.M. ;Bakar N.A.A. ;Idris N.B. ;Universiti Sains Islam Malaysia (USIM) ;Universiti Teknologi Malaysia (UTM)International Islamic University Malaysia (IIUM)The term cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today cloud computing not only provides innovative improvements in resource utilization but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, cloud computing also introduces concerns about data protection and intrusion detection mechanism especially cloud computing are exposed to Denial of Service (DoS) attacks. This paper aims to provide DoS detection mechanism for cloud computing environment. As a result, we provide an experiment to examine the capability of the proposed system. The result shows that the proposed system was able to detect DoS attacks that conducted during the experiment with 94.4% detection rate. We conclude the paper with a discussion on the results, then we include together with a graphical summary of the experiment's result. � 2018 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Collaborative cloud IDS in detecting denial of service by dendritic cell mechanism(Warsaw University of Technology, 2019) ;Ahmad A. ;Kama M.N. ;Azmi A. ;Idris N.B. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;Universiti Teknologi Malaysia (UTM)International Islamic University Malaysia (IIUM)The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunity in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, Cloud computing also introduces concerns about data protection and intrusion detection mechanism. This paper aims to provide Denial of Service (DoS) detection for Cloud computing environment. As a result, we provide an experiment to examine the capability of the proposed system. The result shows that the proposed system was able to detect all types of attacks that conducted during the experiment. We conclude the paper with a discussion on the results, then we include together with a graphical summary of the experiment's result. � 2019 Int. J. Elec. & Elecn. Eng. & Telcomm. - Some of the metrics are blocked by yourconsent settings
Publication Crytojacking Classification based on Machine Learning Algorithm(Association for Computing Machinery, 2020) ;Mansor W.N.A.B.W. ;Ahmad A. ;Zainudin W.S. ;Saudi M.M.Kama M.N.The rise of cryptocurrency has resulted in a number of concerns. A new threat known as cryptojacking" has entered the picture where cryptojacking malware is the trend for future cyber criminals, who infect computers, install cryptocurrency miners, and use stolen information from victim databases to set up wallets for illicit funds transfers. Worst by 2020, researchers estimate there will be 30 billion of IoT devices in the world. Majority of the devices are highly vulnerable to simple attacks based on weak passwords and unpatched vulnerabilities and poorly monitored. Thus it is the best projection that IoT become a perfect target for cryptojacking malwares. There are lacks of study that provide in depth analysis on cryptojacking malware especially in the classification model. As IoT devices requires small processing capability, a lightweight model are required for the cryptojacking malware detection algorithm to maintain its accuracy without sacrificing the performance of other process. As a solution, we propose a new lightweight cryptojacking classifier model based on instruction simplification and machine learning technique that can detect the cryptojacking classification algorithm. This research aims to study the features of existing cryptojacking classification algorithm, to enhanced existing algorithm and to evaluate the enhanced algorithm for cryptojacking malware classification. The output of this research will be significant used in detecting cryptojacking malware attacks that benefits multiple industries including cyber security contractors, oil and gas, water, power and energy industries which align with the National Cyber Security Policy (NCSP) which address the risks to the Critical National Information Infrastructure (CNII). � 2020 ACM. - Some of the metrics are blocked by yourconsent settings
Publication Detection of social media exploitation via SMS and camera(International Association of Online Engineering, 2019) ;Azhar M.A. ;Saudi M.M. ;Ahmad A. ;Abu Bakar A. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Internet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately, social media exploitation and IAD can be monitored and controlled closely based on user's mobile phone surveillance features which are camera, SMS, audio, geolocation (GPS) and call log. Hence to overcome these challenges, this paper presents five (5) Application Programming Interfaces (APIs) and four (4) permissions for SMS and camera that are mostly and widely used with the social media applications. These 9 APIs and permissions matched with 2.7% of the APIs and permissions training dataset that are related with SMS and camera. This experiment was conducted by using hybrid analysis, which inclusive of static analysis and dynamic analysis, with 1926 training dataset from Brunswick. These 9 APIs and permissions, if being misused by the attacker, could lead to privacy concerns of a mobile device. The finding from this paper can be used as a guidance and reference for the formation of new mobile malware detection technique and modeling in future. - Some of the metrics are blocked by yourconsent settings
Publication Graduate employability post-COVID-19: the case of a Malaysian public university(Emerald Group Holdings Ltd., 2020) ;Kamaruddin M.I.H. ;Ahmad A. ;Husain M.A.Abd Hamid S.N.Purpose: This study presents an effort to identify and understand the impact of the coronavirus disease 2019 (COVID-19) pandemic on the graduate employability (GE) of Universiti Sains Islam Malaysia (USIM) final year students. It examines the readiness of USIM's final year students to the internship during the lockdown period, the readiness to join GE programs and also employment prospects in the future. Design/methodology/approach: A questionnaire survey was employed, and 1,445 USIM final year students participated in this study. Findings: The findings reveal that USIM final year students are ready to perform their internship even during the lockdown period. Besides, the students are also ready to join GE programs conducted by USIM, even while COVID-19 pandemic still currently occurs. Meanwhile, for the employment prospects in the future, results show that they believed that the employment prospects in the future after COVID-19 is low. In addition, academic background and internship areas exacerbate COVID-19's impact on the perceptions of USIM final year students on the employment prospects in the future. Originality/value: This study is believed to be a pioneering study in identifying the impact of COVID-19 on the GE. It also contributes by identifying students' readiness to perform their internship during lockdown period via work from home (WFH) approach as well as their perceptions on the employment prospects in the future. � 2020, Emerald Publishing Limited. - Some of the metrics are blocked by yourconsent settings
Publication International discourse on child participation in family justice(Canadian Center of Science and Education, 2016) ;Ahmad A. ;Awal N.A.M. ;Samuri M.A.A. ;Faculty of Syariah and Law ;Universiti Sains Islam Malaysia (USIM)Universiti Kebangsaan Malaysia (UKM)Family justice has undoubtedly molded in an interesting shape throughout the century. Recent development upholds the sovereignty of children’s right over the traditional paternalistic and maternal preference in deciding matrimonial disputes. Affording right to children to participate in matrimonial proceeding will surely be debatable and bring about further complex issues to the proceeding since children are viewed as vulnerable group who must be protected from any harm. Hence, this article intends to review the international discourse ranging from the children’s right and family justice as undertaken internationally and provides commentary on Malaysian current practice. Results indicated that statutory provisions in Malaysian laws value the wishes of a child only in custody cases but the practice is slightly erratic as distinctive judges have different practices. It is submitted that a comprehensive guideline on judicial procedure are then required to be developed in ensuring that Justice must not only be done but must be seen to be done to all parties including the children. - Some of the metrics are blocked by yourconsent settings
Publication Introducing an application of a charged coupled device (CCD) in an optical tomography system(Penerbit UTM Press, 2015) ;Jamaludin J. ;Rahim R.A. ;Rahim H.A. ;Rahiman H.F. ;Muji S.Z.M. ;Fadzil N.S.M. ;Ling L.P. ;Jumaah F. ;Ahmad A. ;Ayob N.M.N. ;Hong L.E. ;Universiti Teknologi Malaysia (UTM) ;Universiti Malaysia Perlis (UniMAP) ;Universiti Tun Hussein Onn Malaysia (UTHM)Universiti Sains Islam Malaysia (USIM)A tomographic system is a method used for capturing an image of an internal object section. Optical tomography is one method which widely used in medical and industrial fields. This paper reviews several applications of Charged Coupled Devices (CCD) and introduces an application of a CCD in an optical tomography system. Most of the previous research used this component for displacement measurement and as a video camera. This paper discusses its basic principle of operation, basic construction, its criteria, application, and its advantages compared to other optoelectronic sensors available in today�s market. The applications of this sensor in fields such as astronomy and medical has proved the ability and the good performance of CCD in capturing images. This sensor should widen its usage in optical tomography fields because it can give high performance in image reconstruction. � 2015 Penerbit UTM Press. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Mobile Application of Food Recommendation for Allergy Baby Using Rule-Based Technique(Institute of Electrical and Electronics Engineers Inc., 2019) ;Shari A.A. ;Pajar N.A. ;Sabri N. ;Mohd Noordin M.R. ;Ishak Zainudin F.M. ;Shari A.S. ;Ahmad A. ;Faculty of Science and Technology ;Universiti Teknologi MARA (UiTM)Universiti Sains Islam Malaysia (USIM)Food recommendation for allergy baby is a mobile application that gives benefit to parent and other caregivers who had allergic baby. Parent and other caregivers faced a problem when they tend to lack of knowledge when handling food for allergy baby. Normally, parent and other caregivers rely on the internet to search food that suits their baby condition. Another problem is parent and other caregivers lack of competence and confident in preparing meals. They afraid to try new food to be given to their baby that will harm their baby condition. The existing of the system, it will solve the problem faced by parent and caregivers. The system helps parent and caregivers by recommending the suitable food based on their baby allergic condition and obtain more ideas on healthy food to feed their allergy baby. Rule-based technique had been using to recommend and suggesting the suitable food using IF-THEN while IF is condition to be tested and THEN producing the output or results. Recommender system will help parent and caregiver reduce time for searching the suitable food for their allergic baby. In order to develop the system, Mobile Application Development Life Cycle (MADLC) model had been chosen to design and control system development process. In conclusion, the recommender system using rule-based technique is suitable method for helping parent and caregivers who had allergy baby. � 2019 IEEE.