Browsing by Author "Azuan Ahmad"
Now showing 1 - 20 of 22
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Adaptation From Prosumerism Idea In Conceptualising The Benefidonors Concept(Academia Industry Networks, 2021-12-04) ;Hanim Misbah ;Fuadah Johari ;Fauzias Mat Nor ;Syahidawati Hj. Shahwan ;Zurina Shafii ;Azuan Ahmad ;Hasnah Hj Haron ;Amir ShaharudinMuhammad Mohamad YusoffThis is a conceptual article that includes an examination of a literature review on waqf from 2011 to 2021. According to the findings, "Use More" can occur among beneficiaries for various types of waqf and different types of beneficiaries. Donors' characteristics, as well as internal and external aspects of incentive, all contribute to the phrase "donate more." "Share more" refers to information exchange between three parties: the waqf manager/mutawalli, donors, and recipients. Waqf Prosumers encourage donors, in which the same person plays all three roles of Beneficiaries, Donors, and Volunteers in order to disseminate information. The Benefidonor Concept is dependent on the interactions between the three parties. The three parties share common interests in cultivating the quality of growth and change, as evidenced by their same points of view on 'Use more, donate more, and share more.' Furthermore, we discovered that in order for the donor to repeat, accountability and reporting are critical. - Some of the metrics are blocked by yourconsent settings
Publication Blockchain Governance: The Development and Application of a Framework for Waqf Institutions(David Publishing, 2023) ;Khairil Faizal Khairi ;Nur Hidayah LailiAzuan AhmadThe effectiveness of waqf administration is impeded by poor management of assets, opacity, and unstandardized reporting. Blockchain is expected to solve these issues due to its ability to record and trace every transaction, allowing administrators to discharge their accountability to waqf stakeholders. While there have been numerous proposals for waqf blockchain, there is no explicit framework for the governance of blockchain in waqf institutions. We propose a governance of blockchain framework for waqf institutions based on IT governance dimensions and blockchain governance dimensions from the literature. The framework comprises three dimensions (formation and context, actors, and means of governance/decision making) that subsume eight sub-dimensions across three layers and three stages. We then apply the framework on a blockchain-based waqf organization to examine its usefulness. The framework is among the first to be designed for waqf institutions. - Some of the metrics are blocked by yourconsent settings
Publication CallDetect: Detection of Call Log Exploitation Inspired by Apoptosis(Indonesian Society for Knowledge and Human Development, 2020) ;Madihah Mohd Saudi ;Amirul Adli Che Ismail ;Azuan AhmadMuhammad ‘Afif HusainiamerCurrently, we saw the increment trend of mobile application(app) exploitation that leads to loss of confidential information and money. Many malware camouflages itself as a genuine mobile app or exploits vulnerabilities inside mobile apps. Hence, this paper presents a mobile app called CallDetect that detects Android Application Interface (API) exploitation for call logs inspired by apoptosis. Apoptosis is known as cell-programmed death, and it is part of the human immunology system. Once it suspects any danger that might cause any harm to the human body, it will kill the suspected danger and itself. In the case of CallDetect, it will scan and uninstall the potentially malicious mobile application on a mobile phone. CallDetect consists of 13 new classifications of API call log, which are used as the database for CallDetect. These classifications were built by using static analysis and open source tools in a controlled lab environment. There were 5560 training datasets from Drebin and 550 anonymous testing dataset from Google Playstore. Our finding showed that 39 mobile apps, or 7%, were identified with possible call log exploitation. This paper can be used as a reference for call log API exploitation and can be further enhanced by integrating it with permission and system call exploitation. - Some of the metrics are blocked by yourconsent settings
Publication Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism(International Journal of Communication Networks and Information Security (IJCNIS), 2017) ;Azuan Ahmad ;Norbik Bashah IdrisMohd Nazri KamaCloud Computing Security is a new era of computer technology and opens a new research area and creates a lot of opportunity of exploration. One of the new implementation in Cloud is Intrusion Detection System (IDS).There are problems with existing IDS approach in Cloud environment. Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requirements. In addition, maintenance of traditional IDS in Cloud Computing system requires expertise and consumes more time where not each Cloud user has. A decentralized traditional IDS approach where being deployed in current Cloud Computing infrastructure will make the IDS management become complicated. Each user's IDS will not be the same in term of type and configurations and each user may have outdated signatures. Inter VM's communication also become a big concern when we implementing Cloud Computing system where communication between Clouds are not monitored and controlled by the traditional IDS. A specific IDS model for Cloud computing is required to solve these problems. In this paper, we develop a prototype of Cloud IDS inspired by Dendritic Cell mechanism. Experiment result proved that Cloud IDS was able to detect any attempt to attack the Cloud environment. The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment. - Some of the metrics are blocked by yourconsent settings
Publication Conceptualisation and Validating Benefidonors Model in Waqf(USIM Press, 2022) ;Fauzias Mat Nor ;Fuadah Johari ;Hasnah Binti Hj Haron ;Zurina Shafii ;Syahidawati Shahwan ;Hanim Hj Misbah ;Azuan Ahmad ;Amir Shaharuddin ;Nur Atika AtanMuhammad Mohamad YusoffWaqf movement in Malaysia has a long history since the colonization era with plenty of innovations being practiced by waqf managers. The literatures have highlighted on the performance of waqf as a social finance instrument with transformational impacts to the economic wellbeing of the beneficiaries. There is a considerable gap between the cyclic impact on the transformation of waqf beneficiaries into donors that needs to be highlighted. The main aim of the study is to conceptualize and validate the beneficiaries-donors model which evolved from the perspective of mutual assistance (ta’awun) prosumers, consumerchant, and volunteer. The study adopts a three-phase qualitative approach. The proposed model on Benefidonors is the result of the first stage, which involved content analysis of literature data. Data was also obtained via Focus Group Discussions (FGD) in the second step of creating and confirming the model. Three different groups of participants, namely donors, beneficiaries, and mutawalli, participated in three different sessions of FGD using MS Teams. The third stage is model validation where the participants have validated the model through a few series of FGD. The participants were given a conceptual model to see whether the new term introduced, "Benefidonors," could be accepted or require further refinement. The new term coined, Benefidonors concept, suggests for a transformational cyclic impact of the major players in the waqf activism. The major output of this paper is the validated term “Benefidonors” which is a hybrid word, derived from the word, “Beneficiaries” and “Donors”. The “Benefidonors” promotes towards “share more”, “use more” and “donate more” for waqf ecosystem using the concept of mutual assistance (ta’awun) prosumers, consumerchant and volunteer. The finding of this research shows that the new term "Benefidonors," even though it is still emerging and requiring efforts for exposure and branding, is inherently practiced, being aware of and known in the community, but it needs a systematic design and strategic arrangement for further expansion. - Some of the metrics are blocked by yourconsent settings
Publication Conceptualization Benefidonors Model in Waqf(Universiti Sains Islam Malaysia (USIM), 2021-07) ;Fauzias Mat Nor ;Fuadah Johari ;Hasnah Haron ;Zurina Shafii ;Syahidawati Shahwan ;Hanim Misbah ;Azuan AhmadAmir Shaharuddin - Some of the metrics are blocked by yourconsent settings
Publication Covid-19 Screening Technique Framework For University Students’ Admission(Geoinformatics International, 2021) ;Waidah Ismail ;Rosline Hassan ;Rabihah Md Sum ;Anvar Narzullaev ;Azuan Ahmad ;Hani Ajrina Zulkeflee ;Razan Hayati ZulkefleeRimuljo HendradiCoronavirus disease 2019 (COVID-19) is a global pandemic. Clinical studies have shown that there was an association between COVID-19 and cardiovascular disease. The virus can directly induce myocardial injury, arrhythmia, acute coronary syndrome, and venous thromboembolism. In Malaysia, students will come back to University soon. The screening techniques framework is required to reduce the pandemic Covid-19 transmission among the students. In this manuscript, we present a new screening technique framework which is consists of temperature and heart rate measurements, movement tracking and risk assessment. Students will be given a questionnaire to stratify their risk into high, medium, and low risk. The temperature will be measured by using an infrared thermometer. The heart rate will be monitored only in those in high and lowrisk categories by using a smart bracelet. The students’ movement will be tracked by using a Wi-Fi based location technique. To avoid any privacy concerns, the location data will be extracted only if the student shared the location with the confirmed COVID-19 case. Lastly, the risk assessment is required in reporting if the infection occurs among students. - Some of the metrics are blocked by yourconsent settings
Publication The Development And Application Of The Zakat Collection Blockchain System(Virtus Interpress, 2023) ;Khairil Faizal Khairi ;Nur Hidayah Laili ;Hisham Sabri ;Azuan Ahmad ;Van Hieu PhamManh Dung TranZakat in Islam has historically been a vital institution in fulfilling religious needs and social welfare. Its effectiveness in medieval and modern Islam is evident. However, this institution is seemingly not without inefficiencies. Ineffectiveness distribution process and lack of transparency in the zakat management are commonly cited as key impediments (bin Khatiman et al., 2021). Blockchain is expected to solve these issues due to its ability to record and trace every transaction, allowing administrators to discharge their accountability to zakat stakeholders. Thus, this study intended to develop a zakat collection blockchain system with the aim to provide economical and integrated continuous real-time zakat transactions, transparency and traceability by developing smart contracts in zakat management. The study employed four stages of process based on waterfall model starting from the interview session and analyse of the standard operating procedure (SOP) on zakat collection in the Zakat Collection Centre or Pusat Pungutan Zakat-Majlis Agama Islam Wilayah Persekutuan (PPZ-MAIWP). Then, design requirement specification (DRS) is employed after being reviewed and approved by PPZ-MAIWP. The results show that the development of blockchain in the zakat collection system could be eradicating extreme poverty and boost shared prosperity among the community in the country. The study contributes through a transparent and reliable environment for exchanging data and carrying out transactions through a decentralized digital ledger technology to record anything of value and as a result able to ensure transparency, reliability, trust ability and traceability of the zakat transactions. - Some of the metrics are blocked by yourconsent settings
Publication E-Wallet Models: An Appraisal of Shariah Related Issues(Faculty of Sharia & Law UIN Syarif Hidayatullah Jakarta, 2023) ;Asmadi Mohamed Naim ;Azrul Azlan Iskandar Mirza ;Abdul Rahman A. Shukor ;Mohd Zakhiri Md. Nor ;Nurul Aini MuhamedAzuan Ahmadpecifically related to the relationship of the involved parties in the contract (operators, customers, and third parties). As e-wallet is also a critical enabler to increase financial inclusion among the different levels of society members (richer and poor), thus there is an increasing need to analyze the existing e-wallet models and their practices. The final aims are to preserve all parties’ rights and support the policymakers to structure e-wallet parameters that comply with Islamic law. This paper adopts qualitative research approaches, specifically content analysis and interviews. The data collection includes, among others, document reviews, interviews, and observations. The paper evaluates four e-wallet models in Malaysia and analyzes arising Sharia issues from those models. In the models, several Sharia issues can be found, which are related to the contracts used, the status of funds held by e-wallet providers, deposits in banks, and revenue generation. Findings from this paper serve as a basis for scholars and policymakers to provide guidelines for Sharia-compliant e-wallets. - Some of the metrics are blocked by yourconsent settings
Publication Employment Trends of COVID-19 Graduates: The Case of a Malaysian Public University(Human Resource Management Academic Research Society, 2023) ;Muhammad Iqmal Hisham Kamaruddin ;Azuan Ahmad ;Mohd Asri HusainSaffa Nasuha Abd HamidThis study presents an effort to understand the impact of COVID-19 on the Universiti Sains Islam Malaysia (USIM)’s employment trends especially for those who are being graduated in 2019 and 2020. Questionnaire survey was employed, and 505 USIM graduates in both 2019 and 2020 participated in this study. Means comparison and one-way ANOVA analysis were used to identify a significant difference between graduates’ attribute groups on employment trends during COVID-19. The findings reveal that the majority of USIM graduates have different employment as compared to their field of study and have changed their employment at least once during COVID-19. Several attributes including gender, employment sector, employment area, salary range and involvement with the graduate employability (GE) program significantly influence employment trends during COVID-19. Further, among the main reasons for employment changes among graduates during COVID-19 are including to look for a better job, a suitable job and a more satisfactory salary. This study is believed to be a pioneering study in identifying the impact of COVID-19 on employment trends especially on dissimilarities between current employment within the field of study and employment change frequency among graduates. It also contributes by identifying the main reasons for such employment changes during COVID-19. - Some of the metrics are blocked by yourconsent settings
Publication Examining the Validity of Constructs that Measure the Willingness to Share Waqf Information: An Exploratory Factor Analysis(Fakulti Ekonomi dan Muamalat, Universiti Sains Islam Malaysia, 2023) ;Noraini binti Yusuff ;Fuadah binti Johari ;Nor Syahidah binti Ishak ;Hanim binti Misbah ;Siti Latipah binti Harun ;Nurul Adilah binti Hasbullah ;Siti Hajar Salwa binti Ahmad MusadikAzuan AhmadWaqf is crucial in providing society with cost-free or affordable services. However, ensuring the sustainability of waqf contributions remains a key challenge. Hence, it is essential to establish a sustainable waqf ecosystem based on information sharing among stakeholders to maximise its societal benefits. This study adopts a quantitative research approach, utilising the information-sharing theory. The analysis employs the SPSS software to conduct Exploratory Factor Analysis (EFA) and assess the construct validity of variables measuring the willingness to share information. The study investigates the impact of trust, reciprocity, and commitment as independent factors on the willingness of waqf stakeholders in Malaysia to share information. A preliminary study was conducted between January and March 2023, involving 78 purposively sampled respondents who were Waqif, Mawquf Alaih, or knew about endowing waqf through the online waqf platform. This preliminary study evaluated the viability and reliability of the instruments used to represent the variables and relationships. The study intends to demonstrate the validity of factors influencing stakeholders' willingness to share information, thereby enhancing Malaysia's waqf co- 919creation ecosystem. The findings will serve as input for developing an information-sharing framework and informing policy implications to improve the environment for waqf co-creation. - Some of the metrics are blocked by yourconsent settings
Publication Fuel Control System on CNG Fueled Vehicles using Machine Learning: A Case Study on the Downhill(Universitas Muhammadiyah Magelang, 2023) ;Suroto Munahar ;Muji Setiyo ;Ray Adhan Brieghtera ;Madihah Mohd Saudi ;Azuan AhmadDori YuvendaCompressed Natural Gas (CNG) is an affordable fuel with a higher octane number. However, older CNG kits without electronic controls have the potential to supply more fuel when driving downhill due to the vacuum in the intake manifold. Therefore, this article presents a development of a CNG control system that accommodates road inclination angles to improve fuel efficiency. Machine learning is involved in this work to process engine speed, throttle valve position, and road slope angle. The control system is designed to ensure reduced fuel consumption when the vehicle is operating downhill. The results showed that the control system increases fuel consumption by 25.7% when driving downhill which an inclination of 5ᵒ. The AFR increased from 17.5 to 22 and the CNG flow rate decreased from 17.7 liters/min to 13.8 liters/min which is promising for applying to CNG vehicles. - Some of the metrics are blocked by yourconsent settings
Publication Ios Mobile Malware Analysis: A State-of-the-art(Springer-Verlag France, 2023) ;Madihah Mohd Saudi ;Muhammad Afif Husainiamer ;Azuan AhmadMohd Yamani Idna IdrisIn earlier years, most malware attacks were against Android smartphones. Unfortunately, for the past few years, the trend has shifted towards attacks against the Apple iOS smartphone. Consequently, an in-depth analysis of the malware and iOS architecture is important to identify the best mitigation solution against malware exploitation. Hence, this paper presents a state of-the-art deep analysis of malware against iOS smartphones. This includes comprehensive studies of malware architecture involving payload, propagation, operating algorithm, infection, and activation with underlying integration with a phylogenetic concept. Phylogenetic, borrowed from the biology field, can identify any evolution of the origin of the malware involved. To support this deep analysis of malware, a preliminary study was conducted using 12 malware samples, by focusing on social media and online banking. This took place in a controlled laboratory using hybrid analysis. The result showed that there is a way to identify the evolution of malware and as a result, a model has been developed. Based on the evaluation, 4% of mobile applications matched the patterns developed in this model. This proves that the model developed in this paper can detect any possible security exploitation related to social media and online banking for iOS mobile applications. This work can be used as guidance for other researchers working on similar interests in the future. - Some of the metrics are blocked by yourconsent settings
Publication Kontrak Pintar Dalam Transaksi Kutipan Zakat Melalui Pembangunan Sistem Demo Backend Platform Blockchain Di MAIWP-PPZ(Akademi Zakat, Pusat Pungutan Zakat (PPZ-MAIWP), 2022) ;Khairil Faizal Khairi ;Azuan Ahmad ;Nur Hidayah Laili ;Hisham SabriRosli ShaariBlockchain ialah rekod transaksi digital berdasarkan strukturnya pangkalan data bagi setiap data individu atau transaksi dihubungkan melalui blok di bawah rangkaian yang dibentuk. Potensi penggunaan sistem blockchain dalam sektor kewangan sosial Islam, sebagai contohnya, zakat belum diterokai sepenuhnya dan ianya boleh dijadikan agenda di peringkat nasional dan antarabangsa. Hasilnya, penulisan ini adalah bertujuan untuk merancang dan mengembangkan kontrak pintar pada teknologi hyperlejar zakat yang diedarkan dengan menggunakan platform Blockchain untuk menghasilkan kecekapan dan produktiviti yang lebih tinggi serta menjimatkan kos yang berkaitan. Bagi memenuhi tujuan ini, kaedah pembangunan sistem yang dinamakan “Waterfall Model” telah diadaptasikan di dalam pembinaan sistem “demo backend” blockchain pungutan telah melalui 4 peringkat iaitu proses temu bual dan analisa carta alir berkaitan Manual Prosedur Operasi (SOP) kutipan zakat di PPZ-MAIWP. Dari peringkat ini, Spesifikasi Keperluan Reka Bentuk “Design Requirement Specification” (DRS) dihasilkan. DRS mesti dikaji dan dipersetujui oleh semua pihak yang berkepentingan pembangunan teknologi ini. Hasilnya, kajian ini telah berjaya menghasilkan satu sistem “demo backend” Blockchain zakat yang mampu mengesan transaksi di dalam aktiviti zakat yang di mana ianya diyakini mampu meningkatkan keyakinan yang lebih tinggi di kalangan pembayar zakat dan akhirnya mampu meningkatkan jumlah kutipan zakat di PPZ-MAIWP. PPZ-MAIWP akan mendapat keuntungan dari sistem “demo backend” platform Blockchain yang dibangunkan kerana ianya menawarkan transaksi yang cepat, fleksibel dan sangat berskala besar. - Some of the metrics are blocked by yourconsent settings
Publication Mobile Malware Classification Based On Phylogenetics(Blue Eyes Intelligence Engineering and Sciences Publication, 2019) ;Madihah Mohd Saudi ;Sazali Sukardi ;Amirul Syauqi Mohamad Syafiq ;Azuan AhmadMuhammad ‘Afif HusainiamerSecurity researchers and practitioners face many challenges in mitigating mobile malware attacks against smartphones. Ranges of techniques have been developed by different developers to ensure that smartphones remain free from such attacks. However, we still lack efficient techniques to mitigate mobile malware attacks, especially for the iOS platform. Hence, this paper presents mobile malware classifications based on phylogenetics that can be used for mobile malware detection with regard to the iOS platform. Phylogenetics have been used as the basis concept associated with forming a mobile malware classification based on similar malware behavior, vulnerability exploitation and mobile phone surveillance features that originate from the same family of specific malware practices. A mobile malware classification based on the phylogenetic concept and on mathematical formulations has been developed for this purpose, and proof of the concept has been sought to support this new classification. This research was conducted in a controlled lab environment using open source tools and by applying dynamic analysis. Consequently, this paper can be used as reference for other researchers with the same interest in future. - Some of the metrics are blocked by yourconsent settings
Publication Modelling Fuel Cut Off Controller on Cng Engines Using Fuzzy Logic: A Prototype(INSIGHT - Indonesian Society for Knowledge and Human Development, 2022) ;Suroto Munahar ;Muji Setiyo ;Madihah Mohd Saudi ;Azuan AhmadDori YuvendaCompressed Natural Gas (CNG) is an alternative solution to the limited availability of fossil energy. CNG use's advantages include high octane value, applicable to vehicles requiring large power, cost-effectiveness, and lower emissions. However, applying the old CNG kit leaves emission problems and fuel wastage during deceleration. Although numerous studies have been carried out with numerous variables to improve engine performance and emissions, reports regarding deceleration interventions are still limited. Therefore, this study proposes enhanced modeling to optimize the fuel cut-off controller by applying fuzzy logic by controlling the throttle valve position based on the input sensor of the engine. Engine dynamics, fuel characteristics, and intake systems are considered strictly in the development of the control system to obtain more precise results that refer to the complete combustion process. The designed model has advantages over previous studies, which focused on achieving CNG AFR stoichiometry to improve fuel economy by using the fuel cut-off method during deceleration. The results showed that fuel savings could be increased during deceleration by cutting off fuel flow to the engine. This can be seen from the increase in AFR ± 57% and decrease ± 38% - 67% in CNG flow rate during deceleration which is promising to be widely applied. In the future, the proposed model could be used as part of the vehicle component in optimizing the fuel consumption that will support green technology sustainability. - Some of the metrics are blocked by yourconsent settings
Publication Potential Shariah Non-compliance Practices In E-bidding: Observation From E-bidding Platforms In Malaysia(USIM Press, 2022) ;Muhamad Azhari Wahid ;Khairil Faizal Khairi ;Hamdi Hakeim Mudasir ;Muhammad Farid Hadhari Mahamed Rusdi ;Azuan Ahmad ;Mohd Zakhiri Md NorAzrul Azlan Iskandar MirzaE-bidding has gained popularity in the modern world due to the technology advancement. Despite its popularity, contracting parties are exposed to Shariah non-compliance practices, which may lead to financial losses and disputes. Islamic jurisprudence provides guidelines assisting bidders and auctioneers in avoiding these practices. This study examines e-bidding platforms in Malaysia and highlights potential Shariah non-compliance issues based on Islamic jurisprudence guidelines. This study employs a qualitative data analysis method. Data are collected from the e-bidding platforms and their published documents. The findings revealed several practices that might lead to Shariah non-compliance issues in e-bidding platforms, including unverified bidders, elements of uncertainty, riba, gambling, and unavailability of khiyar (option). This study suggests several improvements to enhance procedures of e-bidding platforms to avoid financial losses and disputes among contracting parties in e-bidding. Hence, the improvement like verification of bidders, fulfilment of requirement for trading ribawi item, avoidance of element of uncertainty and gambling activities, and offering khiyar to successful bidder are suggested. - Some of the metrics are blocked by yourconsent settings
Publication Potential Shariah Non-Compliance Practices in E-Bidding: Observation from E-Bidding Platforms in Malaysia(Universiti Sains Islam Malaysia, 2021-08-23) ;Muhamad Azhari Wahid ;Azrul Azlan Iskandar Mirza ;Khairil Faizal Khairi ;Hamdi Hakeim Mudasir ;Azuan Ahmad ;Mohd Zakhiri Md NorMuhammad Farid Hadhari Mahamed RusdiE-bidding has gained popularity in modern world due to the advancement of technology. Despite its popularity, contracting parties are exposed to Shari’ah non-compliance practices which might lead to financial loss and dispute among contracting parties. Islamic jurisprudence provides guideline that may assist bidders and auctioneers to avoid these practices. This study aims to examine e bidding platforms in Malaysia and highlight potential Shari’ah non-compliance issues based on guideline offered by Islamic jurisprudence. This study employs qualitative data analysis method. Data are collected from the e-bidding platforms and its published documents which then are analyzed using content analysis. The findings revealed several potential Shari’ah non compliance practices in e-bidding platforms, among others are, unverified bidders, uncertainty, riba, gambling and unavailability of khiyar (option). Numbers of improvement are suggested to enhance procedures of e-bidding platform so that it will not lead to financial losses and dispute among contracting parties. Keywords: bidding; online bidding; electronic bidding; auction; online auction; electronic auction; Shari’ah non-compliance - Some of the metrics are blocked by yourconsent settings
Publication Security Analysis Between Static And Dynamic S-boxes In Block Ciphers(Global Academic Excellence, 2019) ;Nur Hafiza Zakaria ;Azuan Ahmad ;Azni Haslizan Ab HalimFarida Hazwani Mohd RidzuanThe development of block ciphers has resulted in a number of cryptographic algorithms such as AES, aria, blowfish256, desl, and 3d-aes. AES is one of the best cryptographic algorithms that can be used to protect electronic data. However, the principal weakness in AES is the linearity in the s-box. The objective of this research is to investigate and evaluate the existing work related to the dynamic s-box. Other than that, the aim of this research is to design a dynamic s-box using affine transformation in order to increase the security of the encryption. The method to design is using java with the NetBeans software. The proposed block cipher will be tested using NIST statistical test suite to test the randomness of the algorithm. Besides, the strength of the s-box will be analyzed using the s-box evaluation tool (set). The cryptographic strength depends strongly on the choice of s-box. Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders, or interested parties as one of the secure algorithms to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research. - Some of the metrics are blocked by yourconsent settings
Publication Security Risk Assessment Framework For Cloud Computing Environments(John Wiley & Sons, Ltd., 2014) ;Sameer Hasan Albakri ;Bharanidharan Shanmugam ;Ganthan Narayana Samy ;Norbik Bashah IdrisAzuan AhmadCloud computing has become today's most common technology buzzword. Despite the promises of cloud computing to decrease computing implementation costs and deliver computing as a service, which allows clients to pay only for what they need and use, cloud computing also raises many security concerns. Most popular risk assessment standards, such as ISO27005, NIST SP800-30, and AS/NZS 4360, assume that an organization's assets are fully managed by the organization itself and that all security management processes are imposed by the organization. These assumptions, however, do not apply to cloud computing environments. Hence, this paper proposes a security risk assessment framework that can enable cloud service providers to assess security risks in the cloud computing environment and allow cloud clients to contribute in risk assessment. The proposed framework provides a more realistic and accurate risk assessment outcome by considering the cloud clients' evaluation of security risk factors and avoiding the complexity that can result from the involvement of clients in whole risk assessment process.