{"id":10245,"date":"2019-08-21T03:54:07","date_gmt":"2019-08-21T03:54:07","guid":{"rendered":"http:\/\/ftmk.utem.edu.my\/web\/?page_id=10245"},"modified":"2023-10-03T17:56:09","modified_gmt":"2023-10-03T09:56:09","slug":"expertise-field-department-of-computer-system-communication","status":"publish","type":"page","link":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/about\/staff-directory\/expertise-field-department-of-computer-system-communication\/","title":{"rendered":"Expertise Field &#8211; Department of Computer System &#038; Communication"},"content":{"rendered":"\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No.<\/th><th class=\"column-2\">Name<\/th><th class=\"column-3\">Details Of Expertise<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">Ariff Bin Idris<\/td><td class=\"column-3\">Computer And Network System<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">Aslinda Binti Hassan<\/td><td class=\"column-3\">Network Performance Modelling And Analysis, Network Programming Interfaces, Wireless Communication, Vehicular Ad Hoc Network, Mobile Ad Hoc Network, Vehicular Communication, Network Protocols In Ad Hoc Network, Internet Of Things<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">Erman Bin Hamid<\/td><td class=\"column-3\">Network Management, Network Visualization<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">Haniza Bt. Nahar<\/td><td class=\"column-3\">Computer And Network System, Server Administration, Wireless Communication, Data Communication, Network Simulation<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">Irda Binti Roslan\u00a0\u00a0<\/td><td class=\"column-3\">Computer Systems And Communication, Wireless Networking, Network Performance Evaluation<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">Khadijah Bt. Wan Mohd Ghazali\u00a0\u00a0<\/td><td class=\"column-3\">Computer Network, Computer Network Security<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">Marliza Bt. Ramly\u00a0<\/td><td class=\"column-3\">Nano Sensor, Computer Networking And Communication<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">Mohammad Radzi Bin Motsidi\u00a0<\/td><td class=\"column-3\">Computer Networking<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">Mohd Fairuz Iskandar Bin Othman<\/td><td class=\"column-3\">Information Systems, It\/Is Security, Computer Networks, Computer Systems,\u00a0 It Management, It Governance, Quantitative Analysis, Qualitative Analysis, Gamification, Neurois<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">Mohd Faizal Bin Abdollah<\/td><td class=\"column-3\">Intrusion Detection System, Computer And Network Security, Forensic,\u00a0 Mobile And Wireless Security, Network Management, Networking.<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">Mohd Hakim Bin Abdul Hamid\u00a0<\/td><td class=\"column-3\">Computer And Network Security, Data Analytics Dan Business It<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\">Mohd Najwan Bin Md. Khambari\u00a0<\/td><td class=\"column-3\">Wireless Network, Quality Of Service (Qos), Quality Of Experience (Qoe), Video Streaming, Ns-3 Network Simulation<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">13<\/td><td class=\"column-2\">Mohd Zaki Bin Mas'Ud<\/td><td class=\"column-3\">Computer And Network Security, Computer Forensic, Malware, Intrusion Detection System, Network Administration And Management, Network Analysis And Design\u00a0<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">14<\/td><td class=\"column-2\">Mohd. Rizuan Bin Baharon<\/td><td class=\"column-3\">Cryptography, Cloud Computing Security, Mobile Sensing Security, Mobile User Privacy And Accountability<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">15<\/td><td class=\"column-2\">Muhammad Syahrul Azhar Bin Sani\u00a0<\/td><td class=\"column-3\">Computer Networking<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">16<\/td><td class=\"column-2\">Nazrulazhar Bin Bahaman<\/td><td class=\"column-3\">Computer And Network Security, Ipv6 Migration, Ipv6 Network, Intrusion Detection Systems<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">17<\/td><td class=\"column-2\">Nor Azman Bin Abu<\/td><td class=\"column-3\">Cryptography, Image Processing, Prime Number, True Random Ambience<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">18<\/td><td class=\"column-2\">Nor Azman Bin Mat Ariff<\/td><td class=\"column-3\">Pattern Recognition, Network Management.<\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">19<\/td><td class=\"column-2\">Norharyati Binti Harum<\/td><td class=\"column-3\">Signal\/Image Processing, Led Communication, Visible Light Communication, Wireless Communcation, Internet-Of-Things (Iot) Devices And Protocol, Wireless Sensors Networks, Cognitive Radio, Radio Frequency Technology, Antenna Propagation, Mobile Communication<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">20<\/td><td class=\"column-2\">Nur Fadzilah Binti Othman<\/td><td class=\"column-3\">Information Security Management, It Security, Structural Equation Modeling<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">21<\/td><td class=\"column-2\">Nurul Azma Binti Zakaria<\/td><td class=\"column-3\">Internet Of Things, Embedded System, System-Level Design, Hardware\/Software Co-Design, Ipv6 Migration, 6Lowpan, Low-Power Networking, Computer Systems\u00a0<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">22<\/td><td class=\"column-2\">Othman Bin Mohd<\/td><td class=\"column-3\">Computer Network And System, Remote Sensing And Gis, Image Processing, Strategic Information Planning, Network Analysis And Design, Programming<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">23<\/td><td class=\"column-2\">Rabiah Binti Ahmad<\/td><td class=\"column-3\">Information Security, Anti Cyberterrorism, Health Information Security And Management, Risk Analysis, Applied Cryptolography, Research Management<\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">24<\/td><td class=\"column-2\">Raihana Syahirah Binti Abdullah<\/td><td class=\"column-3\">Computer And Network Security, Malware, Botnet, Intrusion Detection System<\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">25<\/td><td class=\"column-2\">Robiah Binti Yusof<\/td><td class=\"column-3\">Correlation, Malware, Intrusion Detection System, Network Security, Network Design<\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">26<\/td><td class=\"column-2\">S.M.Warusia Mohamed Bin S.M.M Yassin<\/td><td class=\"column-3\">Cyber Security, Intrusion Detection, Data Mining, Malware<\/td>\n<\/tr>\n<tr class=\"row-28\">\n\t<td class=\"column-1\">27<\/td><td class=\"column-2\">Shahrin Bin Sahib @ Sahibuddin<\/td><td class=\"column-3\">Computer And Network Security, Software Security Testing, Digital Forensic, Parallel Processing<\/td>\n<\/tr>\n<tr class=\"row-29\">\n\t<td class=\"column-1\">28<\/td><td class=\"column-2\">Shekh Faisal Bin Abdul Latip<\/td><td class=\"column-3\">Symmetric-Key Cryptography, Cryptanalysis, Key Generation And Management, Pseudorandom Number Generators, Application Of Cryptographic Algorithms.<\/td>\n<\/tr>\n<tr class=\"row-30\">\n\t<td class=\"column-1\">29<\/td><td class=\"column-2\">Siti Rahayu Binti Selamat<\/td><td class=\"column-3\">Digital Forensic, Traceability, Cyber Security, Cyber Criminology<\/td>\n<\/tr>\n<tr class=\"row-31\">\n\t<td class=\"column-1\">30<\/td><td class=\"column-2\">Suhaimi Bin Basrah<\/td><td class=\"column-3\">Computer Networking, Information Theory, Image Processing<\/td>\n<\/tr>\n<tr class=\"row-32\">\n\t<td class=\"column-1\">31<\/td><td class=\"column-2\">Syahrulnaziah Bt. Anawar<\/td><td class=\"column-3\">Human-Centered Computing, Mobile Health, Usable Security, Mix-Methodology (Quantitative And Qualitative)<\/td>\n<\/tr>\n<tr class=\"row-33\">\n\t<td class=\"column-1\">32<\/td><td class=\"column-2\">Wahidah Binti Md Shah<\/td><td class=\"column-3\">P2P Network, Computer Networks, Network Performance Analysis, Wireless Network<\/td>\n<\/tr>\n<tr class=\"row-34\">\n\t<td class=\"column-1\">33<\/td><td class=\"column-2\">Zaheera Binti Zainal Abidin<\/td><td class=\"column-3\">Network Security, Iot, Image Processing, Biometrics<\/td>\n<\/tr>\n<tr class=\"row-35\">\n\t<td class=\"column-1\">34<\/td><td class=\"column-2\">Zakiah Binti Ayop<\/td><td class=\"column-3\">Pervasive Computing, Trust And Privacy, Iot Device And Application, Computer And System Network<\/td>\n<\/tr>\n<tr class=\"row-36\">\n\t<td class=\"column-1\">35<\/td><td class=\"column-2\">Zulkiflee Bin Muslim<\/td><td class=\"column-3\">Features Selection, Intrusion Detection System, Cyber Security, Malware, Ipv6 Network,\u00a0<\/td>\n<\/tr>\n<tr class=\"row-37\">\n\t<td class=\"column-1\">36<\/td><td class=\"column-2\">Zurina Binti Sa'Aya<\/td><td class=\"column-3\">Social Web, Information Retrieval, Recommender System, Web Mining, Web Technology<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":0,"parent":5783,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-10245","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/pages\/10245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/comments?post=10245"}],"version-history":[{"count":6,"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/pages\/10245\/revisions"}],"predecessor-version":[{"id":14203,"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/pages\/10245\/revisions\/14203"}],"up":[{"embeddable":true,"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/pages\/5783"}],"wp:attachment":[{"href":"https:\/\/ftmk.utem.edu.my\/web\/index.php\/wp-json\/wp\/v2\/media?parent=10245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}