NAME | TITLE | eMAIL @utem.edu.my | TEL. NO. +606270– | BLOCK | LEVEL | ROOM_NO. | EXPERTISE |
PROFESSOR | |||||||
Shahrin bin Sahib @ Sahibuddin | Prof. Datuk Ts. Dr | shahrinsahib | 2949 | B2 | 2 | B/2-25 | Computer and Network Security, Software Security Testing, Digital Forensic, Parallel Processing |
Rabiah binti Ahmad | Prof. Ts. Dr. | rabiah | 2822 | B2 | 2 | B/1-17 | Information Security, Anti Cyberterrorism, Health Information Security And Management, Risk Analysis, Applied Cryptography, Research Management |
ASSOCIATE PROFESSOR | |||||||
Mohd Faizal bin Abdollah | Assoc. Prof. Ts. Dr. | faizalabdollah | 2510 | B2 | 3 | B/2-25 | Intrusion Detection System, Computer And Network Security, Forensic, Mobile And Wireless Security, Network Management, Networking |
Nor Azman bin Abu | Assoc. Prof. Dr. | nura | 2514 | B2 | 3 | B/2-14 | Cryptography, Image Processing, Prime Number, True Random Ambiance |
Othman Mohd | Assoc. Prof. Gs. Dr. | mothman | 1078 | B2 | 3 | B/2-13 | Computer Network and System, Remote Sensing and GIS, Image Processing, Strategic Information Planning, Network Analysis and Design, Programming |
Robiah Yusof | Assoc. Prof. Ts. Dr. | robiah | 2505 | B2 | 3 | B/2-22 | Correlation, Malware, Intrusion Detection System, Network Security, Network Design |
Siti Rahayu Selamat | Assoc. Prof. Ts. Dr. | sitirahayu | B2 | 3 | B/2-23 | Digital Forensics, Traceability, Cyber Security, Cyber Criminology | |
SENIOR LECTURER | |||||||
Ariff bin Idris | Ts. | miariff | 2517 | B2 | 2 | B/1-23 | Computer and Network System |
Aslinda bt. Hassan | Ts. Dr. | aslindahassan | 2508 | B2 | 1 | B/G-25 | Network Performance Modelling and Analysis, Network Programming Interfaces, Wireless Communication, Vehicular Ad Hoc Network, Mobile Ad Hoc Network, Vehicular Communication, Network Protocols in Ad Hoc Network, Internet of Things |
Erman Hamid | Ts. | erman | 2516 | B2 | 1 | B/G-14 | Network Management, Network Visualization |
Haniza Nahar | Ts. | haniza | 2498 | B2 | 2 | B/1-25 | Computer and Network System, Server Administration, Wireless Communication, Data Communication, Network Simulation |
Mohammad Radzi Motsidi | Ts. | radzi | 2501 | B2 | 3 | B/2-18 | Computer Networking |
Mohd Zaki Mas’ud | Ts. Dr. | zaki.masud | 2518 | B2 | 3 | B/2-20 | Computer and Network Security, Computer Forensics, Malware, Intrusion Detection System, Network Administration and Management, Network Analysis and Design |
Mohd. Fairuz Iskandar Othman | Ts. Dr. | mohdfairuz | 4523 | B1 | 1 | B/G- | Information Systems, It/is Security, Computer Networks, Computer Systems, It Management, It Governance, Quantitative Analysis, Qualitative Analysis, Gamification, Neurois |
Mohd Najwan Md Khambari | Ts. Dr. | najwan | 2523 | B2 | 1 | B/G-19 | Wireless Network, Quality of Service (QoS), Quality of Experience (QoE), Video Streaming, NS-3 Network Simulation |
Mohd. Rizuan Baharon | Ts. Dr. | mohd.rizuan | 2513 | B2 | 1 | B/G-18 | Cryptography, Cloud Computing Security, Mobile Sensing Security, Mobile User Privacy and Accountability |
Nazrulazhar Bahaman | Ts. Dr. | nazrulazhar | 2504 | B2 | 1 | B/G-24 | Computer and Network Security, IPv6 Migration, IPv6 Network, Intrusion Detection Systems |
Nor Azman Mat Ariff | Ts. | nazman | 2521 | B1 | 1 | B/G- | Pattern Recognition, Network Management |
Norharyati Harum | Ts. Dr. | norharyati | 2525 | B2 | 1 | B/G-16 | Signal/Image Processing, Led Communication, Visible Light Communication, Wireless Communication, Internet-of-things (IoT) Devices and Protocol, Wireless Sensors Networks, Cognitive Radio, Radio Frequency Technology, Antenna Propagation, Mobile Communication |
Nur Fadzilah Othman | Dr. | fadzilah.othman | 2561 | B2 | 2 | B/2-26 | Information Security Management, It Security, Structural Equation Modeling |
Nurul Azma Zakaria | Ts. Dr. | azma | 2506 | B2 | 2 | B/1-18 | Internet of Things, Embedded System, System-level Design, Hardware/Software Co-design, Ipv6 Migration, 6lowpan, Low-power Networking, Computer Systems |
Raihana Syahirah Abdullah | Ts. Dr. | raihana.syahirah | 2526 | B2 | 2 | B/2-27 | Computer and Network Security, Malware, Botnet, Intrusion Detection System |
S.M.Warusia Mohamed S.M.M Yassin | Ts. Dr. | s.m.warusia | 2528 | B2 | 3 | B/2-24 | Cyber Security, Intrusion Detection, Data Mining, Malware |
Shekh Faisal Abdul Latip | Dr. | shekhfaisal | 2497 | B2 | 2 | B/1-24 | Symmetric-key Cryptography, Cryptanalysis, Key Generation and Management, Pseudorandom Number Generators, Application of Cryptographic Algorithms |
Syarulnaziah Anawar | Dr. | syarulnaziah | 2493 | B2 | 1 | B/G-27 | Human-centered Computing, Mobile Health, Usable Security, Mix-methodology (Quantitative and Qualitative) |
Wahidah Md. Shah | Ts. Dr. | wahidah | 2495 | B1 | 1 | B/G-15 | P2P Networks, Computer Networks, Network Performance Analysis, Wireless Network |
Zaheera Zainal Abidin | Dr. | zaheera | 2522 | B2 | 2 | B/1-28 | IoT, Network Security, Physical Security, Computer Networking, Image Processing |
Zakiah Ayop | Ts. | zakiah | 2492 | B2 | 1 | B/G-17 | Pervasive Computing, Trust and Privacy, IoT Device and Application, Computer and System Network |
Zulkiflee Muslim | Ts. Dr. | zulkiflee | 2496 | B2 | 3 | B/2-16 | Features Selection, Intrusion Detection System, Cyber Security, Malware, IPv6 Network, |
Zurina Saaya | Ts. Dr. | zurina | 2557 | B2 | 1 | B/G-26 | Social Web, Information Retrieval, Recommender System, Web Mining, Web Technology |
LECTURER | |||||||
Irda Roslan | Ts. | irda | 2520 | B2 | 2 | B/1-19 | Computer Systems and Communication, Wireless Networking, Network Performance Evaluation |
Khadijah Wan Mohd. Ghazali | Mrs. | khadijah | 2511 | B2 | 2 | B/1-21 | Computer Network, Computer Network Security |
Marliza Ramly | Ts. | marliza | 2555 | B2 | 3 | B/2-17 | Nano Sensor, Computer Networking and Communication |
Mohd Hakim Abdul Hamid | Ts. | mohdhakim | 2527 | B2 | 1 | B/G- | Computer and Network Security, Data Analytics Dan Business It |
Muhamad Syahrul Azhar Sani | Ts. | syahrul | 2494 | B2 | 3 | B/2-26 | Computer Networking |
Suhaimi Basrah | Ts. | suhaimibasrah | 2499 | B2 | 3 | B/2-15 | Computer Networking, Information Theory, Image Processing |
