• 24 Citations
  • 3 h-Index
20132019
If you made any changes in Pure these will be visible here soon.

Personal profile

Personal profile

Doctor of Philosophy

Fingerprint Dive into the research topics where Fiza Abdul Rahim is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 10 Similar Profiles
Electronic medical equipment Engineering & Materials Science
Data privacy Engineering & Materials Science
Privacy Medicine & Life Sciences
Security of data Engineering & Materials Science
Hospital Information Systems Medicine & Life Sciences
Social Media Medicine & Life Sciences
Delivery of Health Care Medicine & Life Sciences
Crowdsourcing Medicine & Life Sciences

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2013 2019

  • 24 Citations
  • 3 h-Index
  • 13 Conference contribution
  • 9 Article
  • 1 Chapter

A Comparative Study of Data Anonymization Techniques

Murthy, S., Abu Bakar, A., Abdul Rahim, F. & Ramli, R., 01 May 2019, Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019. Institute of Electrical and Electronics Engineers Inc., p. 306-309 4 p. 8819477. (Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anonymization
Comparative study
Resources
Data base
Privacy

An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems

Qassim, Q., Ahmad, A. R., Ismail, R., Abu Bakar, A., Abdul Rahim, F., Mokhtar, M. Z., Ramli, R., Mohd Yusof, B. & Mahdi, M. N., 01 May 2019, Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019. Institute of Electrical and Electronics Engineers Inc., p. 267-272 6 p. 8819478. (Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Control systems
Intrusion detection
Internet
Network protocols
Deception

A survey on anomalies detection techniques and measurement methods

Muruti, G., Abdul Rahim, F. & Bin Ibrahim, Z. A., 31 Jan 2019, 2018 IEEE Conference on Application, Information and Network Security, AINS 2018. Institute of Electrical and Electronics Engineers Inc., p. 81-86 6 p. 8631436. (2018 IEEE Conference on Application, Information and Network Security, AINS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems

A Survey on Deception Techniques for Securing Web Application

Mohd Efendi, M. A. E., Ibrahim, Z. A., Ahmad Zawawi, M. N., Abdul Rahim, F., Muhamad Pahri, NA. & Ismail, A., 01 May 2019, Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019. Institute of Electrical and Electronics Engineers Inc., p. 328-331 4 p. 8819492. (Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Web application
Deception
World Wide Web
Anomaly

Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications

Al-Ghaili, A. M., Abdul Rahim, F., Azman, F. & Kasim, H., 01 May 2019, Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019. Institute of Electrical and Electronics Engineers Inc., p. 282-287 6 p. 8818979. (Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Barcode
Internet of things
Availability
Factors
Smart city