Miss Laiha Mat Kiah
Orcid: 0000-0002-1240-5406Affiliations:
- University of Malaya, Kuala Lumpur, Department of Computer System & Technology
According to our database1,
Miss Laiha Mat Kiah
authored at least 77 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Clust. Comput., August, 2024
A systematic literature review on advanced persistent threat behaviors and its detection strategy.
J. Cybersecur., January, 2024
Implementing federated learning over VPN-based wireless backhaul networks for healthcare systems.
PeerJ Comput. Sci., 2024
PeerJ Comput. Sci., 2024
J. Comput. Inf. Syst., 2024
Analysis of Terahertz (THz) Frequency Propagation and Link Design for Federated Learning in 6G Wireless Systems.
IEEE Access, 2024
2023
A review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations.
CoRR, 2023
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection.
IEEE Access, 2023
2022
J. Comput. Inf. Syst., 2022
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces.
IEEE Access, 2022
Proceedings of the 12th IEEE International Conference on Control System, 2022
2021
Signal Process. Image Commun., 2021
A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions.
PeerJ Comput. Sci., 2021
J. Organ. Comput. Electron. Commer., 2021
Wireless backhaul network's capacity optimization using time series forecasting approach.
J. Ambient Intell. Humaniz. Comput., 2021
Comput. Secur., 2021
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the 3rd International Cyber Resilience Conference, 2021
2020
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things.
Sensors, 2020
Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey.
J. Medical Imaging Health Informatics, 2020
IEEE Commun. Lett., 2020
Compliance with bring your own device security policies in organizations: A systematic literature review.
Comput. Secur., 2020
Comput. Networks, 2020
An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2020
IEEE Access, 2020
Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting.
IEEE Access, 2020
2019
Telecommun. Syst., 2019
QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things.
Symmetry, 2019
Modeling Traffic Congestion Based on Air Quality for Greener Environment: An Empirical Study.
IEEE Access, 2019
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019
2018
Wirel. Networks, 2018
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet.
IET Networks, 2018
2017
J. Netw. Comput. Appl., 2017
A distributed framework for health information exchange using smartphone technologies.
J. Biomed. Informatics, 2017
2016
Secur. Commun. Networks, 2016
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks.
Pervasive Mob. Comput., 2016
RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system.
Medical Biol. Eng. Comput., 2016
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Netw. Comput. Appl., 2016
2015
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2015
Kybernetes, 2015
Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges.
J. Netw. Comput. Appl., 2015
A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy.
J. Medical Syst., 2015
Erratum to: An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1.
J. Medical Syst., 2015
Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing.
J. Medical Syst., 2015
J. Intell. Fuzzy Syst., 2015
Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning.
J. Circuits Syst. Comput., 2015
Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS.
J. Biomed. Informatics, 2015
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.
J. Grid Comput., 2015
Decis. Support Syst., 2015
Key management paradigm for mobile secure group communications: Issues, solutions, and challenges.
Comput. Commun., 2015
Appraisal of adaptive neuro-fuzzy computing technique for estimating anti-obesity properties of a medicinal plant.
Comput. Methods Programs Biomed., 2015
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations.
Comput. Methods Programs Biomed., 2015
Comput. Aided Des., 2015
2014
J. Supercomput., 2014
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment.
J. Supercomput., 2014
J. Netw. Comput. Appl., 2014
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks.
J. Netw. Comput. Appl., 2014
MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network.
J. Medical Syst., 2014
Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture.
J. Medical Syst., 2014
A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier.
Neurocomputing, 2014
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks.
Eng. Appl. Artif. Intell., 2014
Comput. Methods Programs Biomed., 2014
Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper.
Appl. Soft Comput., 2014
2013
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.
J. Supercomput., 2013
Secur. Commun. Networks, 2013
An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1.
J. Medical Syst., 2013
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique.
Eng. Appl. Artif. Intell., 2013
Proceedings of the Intelligent Robotics Systems: Inspiring the NEXT, 2013
Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
2007
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments.
Proceedings of the Future Generation Communication and Networking, 2007
2005
Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments.
Proceedings of The 2005 International Conference on Security and Management, 2005