ACADEMIC STAFF
+  Fakulti Kejuruteraan Kimia & Sumber Asli (108)
+  Fakulti Kejuruteraan Awam & Sumber Alam (55)
+  Fakulti Kejuruteraan Elektrik & Elektronik (85)
+  Fakulti Sistem Komputer & Kejuruteraan Perisian (81)
+  Fakulti Kejuruteraan Mekanikal (96)
+  Fakulti Sains & Teknologi Industri (98)
+  Fakulti Kejuruteraan Pembuatan (56)
+  Fakulti Teknologi Kejuruteraan (60)
+  Fakulti Pengurusan Industri (53)
+  Pusat Bahasa Moden & Sains Kemanusiaan (101)
 

Search by Name Expertise

Home> FSK1000-FAKULTI SISTEM KOMPUTER & KEJURUTERAAN PERISIAN

TS. DR. MOHAMAD FADLI BIN ZOLKIPLI

Contact No. : 095492467
Gender : MALE
Nationality : MALAYSIA
Current Positon : DS52-A-PENSYARAH UNIVERSITI
E-Mail : fadli@ump.edu.my
 
ACADEMIC QUALIFICATION
. 2012 : IJAZAH KEDOKTORAN (DOCTORAL DEGREE), UNIVERSITI SAINS MALAYSIA
. 2004 : IJAZAH SARJANA (MASTERS DEGREE), UNIVERSITI UTARA MALAYSIA
. 2001 : IJAZAH SARJANA MUDA (BACHELOR DEGREE), UNIVERSITI UTARA MALAYSIA
 
EXPERTISE
EXPERT AREA MAJOR YEARS OF EXPERTISE LEVEL
INFORMATION, COMPUTER AND COMMUNICATION TECHNOLOGY MALWARE
4
SANGAT TINGGI
INFORMATION, COMPUTER AND COMMUNICATION TECHNOLOGY SECURITY POLICIES & IMPLEMENTATION
5
SANGAT TINGGI
INFORMATION, COMPUTER AND COMMUNICATION TECHNOLOGY CLOUD COMPUTING
3
SANGAT TINGGI
 
EMPLOYMENT HISTORY
No Record.

   
RESEARCH
NO. TITLE ROLE START DATE END DATE STATUS
1. Security Analytic Framework For Security Information And Event Management (SIEM) Member 20-SEP-2017 19-SEP-2019 Sedang Berjalan
2. Solving Universiti Malaysia Pahang Examination Invigilators scheduling problem using step-counting Hill climbing Member 30-JUN-2017 29-JUN-2019 Sedang Berjalan
3. Deep Learning Neural Network Features Classifier for Malware Detection in Mobile Devices Member 01-JUN-2017 01-JUN-2019 Sedang Berjalan
4. DEVELOPMENT OF SELF-ADAPTIVE FUZZY CLASSIFICATION SYSTEMS FOR THE CONDITION MONITORING OF ELECTRICAL HOTSPOT Member 15-MAY-2017 14-MAY-2019 Sedang Berjalan
5. Next Generation Security Operation Center (NGSOC) Framework Leader 13-APR-2017 13-APR-2018 Tamat
6. Mobile Analysis Malware using Cloud Computing Leader 01-MAR-2017 01-MAR-2020 Sedang Berjalan
7. New Method for Rootkit Detection Leader 01-MAR-2017 01-MAR-2020 Sedang Berjalan
8. Firewall Rules Policies Optimization using AI Techniques Member 01-OCT-2016 01-MAR-2018 Tamat
9. Proactive Digital Forensic Model for Identifying Sources of Cybercrimes in High Critical Networks Member 01-AUG-2016 31-JUL-2018 Sedang Berjalan
10. Malware Detection in Mobile Devices using Code Clone Detection Approach Member 20-JUL-2016 19-JUL-2018 Sedang Berjalan
11. Malware Identification on Mobile Device using Behavior Monitoring Leader 25-MAY-2016 24-MAY-2018 Sedang Berjalan
12. A NEW PSYCHO VISUAL MASKING MODEL FOR ROBUST IMAGE WATERMARKING Member 25-MAY-2016 24-MAY-2018 Selesai (Tutup Projek)
13. Intrusion Detection System Framework Based on Machine Learning for Cloud Computing Leader 01-MAY-2016 30-APR-2019 Sedang Berjalan
14. Computational Offloading Approach for Battery Efficiency of Mobile Devices using Cloud Resources Member 25-DEC-2014 24-DEC-2016 Tamat
15. Enhanced Data Security Model for Could Computing Leader 25-OCT-2014 24-OCT-2017 Tamat
16. Study of Graphical Authentication System Based on Persuasive Rotation, Resizing and Cued Click Point (GUAS) Leader 25-SEP-2014 24-SEP-2016 Tamat
17. A Model for Preventing DDOS Attacks in Cloud Computing Leader 25-JUL-2014 24-JUL-2017 Tamat
18. Enhancing Security in Cloud Computing Systems Member 01-DEC-2013 31-MAY-2016 Tamat
19. Controlled Environment Model for Host-Based Dynamic Malware Analysis Leader 25-JUN-2013 24-JUN-2015 Tamat
20. Web-Based Highland Agricultural Diasease Diagnostic System Member 01-MAY-2009 30-APR-2010 Selesai (Tutup Projek)
21. Development Of Visitor Information Management System Member 03-SEP-2007 09-FEB-2008 Selesai
22. Analysis and Measuring of Log Server Across The Distributed System Member 04-JAN-2007 30-MAR-2008 Selesai
   
PUBLICATION
TYPE PUBLICATION TARIKH PENERBITAN TYPE OF CONTRIBUTION
REFEREED PUBLICATION
JOURNAL A review of challenges and security risks of cloud computing. 01/03/2017 30%
JOURNAL Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey. 01/09/2017 20%
JOURNAL From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions 27/03/2017 20%
JOURNAL Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing. 08/11/2017 30%
JOURNAL Methods for Preventing Distributed Denial of Service Attacks in Cloud Computing 01/06/2017 20%
CONFERENCE PAPER A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing 01/09/2016 40%
CONFERENCE PAPER Block-based Tchebichef image watermarking scheme using psychovisual threshold. 27/10/2016 10%
CONFERENCE PAPER Present Status and Challenges in Cloud Monitoring Framework: A Survey. 19/08/2016 30%
JOURNAL Data Security Issues In Cloud Computing: Review 01/02/2016 40%
JOURNAL Traceback Model for Identifying Sources of Distributed Attacks in Real Time 27/07/2016 30%
CONFERENCE PAPER Battery Efficiency of Mobile Devices through Computational Offloading: A Review 15/12/2015 20%
CONFERENCE PAPER Design a Technique for Minimizing Unnecessary Handoff in Mobile Wireless Networks 21/08/2015 30%
CONFERENCE PAPER Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks 21/08/2015 30%
CONFERENCE PAPER Response Option for Attacks Detected by Intrusion Detection System 21/08/2015 20%
JOURNAL Mobile Cloud Computing & Mobile’s Battery Efficiency Approaches : A Review 10/09/2015 20%
JOURNAL Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing 20/04/2015 20%
JOURNAL Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks 01/02/2015 30%
JOURNAL Taxonomy of Computational Offloading in Mobile Devices 01/05/2015 20%
CONFERENCE PAPER A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing 30/09/2014 20%
CONFERENCE PAPER A Study in Data Security in Cloud Computing 04/09/2014 30%
CONFERENCE PAPER Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey 16/12/2014 20%
CONFERENCE PAPER Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing 30/11/2014 30%
CONFERENCE PAPER Trusting Cloud Computing for Personal Files 24/10/2014 30%
JOURNAL Study of Security Layers Under Attack on Different Layers of Cloud Computing 01/05/2014 10%
CONFERENCE PAPER Use of Cryptography in Cloud Computing 29/11/2013 40%
   

For best view, please use Mozilla Firefox, Internet Explorer 7.0 or above with resolution 1024 x 768 pixel.

Copyright 2011 Universiti Malaysia Pahang