Norziana Jamil | Universiti Tenaga Nasional (original) (raw)
Papers by Norziana Jamil
IEEE Conference Proceedings, 2016
Journal of Applied Sciences, Jun 15, 2015
Journal of information security and applications, Aug 1, 2023
Nucleation and Atmospheric Aerosols, 2023
Journal of physics, Jun 1, 2022
Since the renowned Stuxnet attack on the Iranian refinery planet in 2010, there have been many at... more Since the renowned Stuxnet attack on the Iranian refinery planet in 2010, there have been many attempts to harden the security of these systems. One of the most significant challenges impacting these systems’ security is the outdated and insecure communication protocols that have been used for many years in various sectors. This work presents a practical solution to protect the SCADA’s critical communications’ confidentiality, authenticity, and integrity. This work put forward a hardware-based general-purpose cryptographic device based on FPGA technology. The device contains a handful of cryptographic algorithms that can be customized to harden the security of devices operating on the IEC 60870-5-101 communication protocol. The experimental results show that the proposed solution enhances the secrecy and integrity of the IEC 60870-5-101 messages and ensures the source’s authenticity.
Journal of information security, 2013
Telemedicine has been in demand due to the flexibility that it offers with the aid of advanced te... more Telemedicine has been in demand due to the flexibility that it offers with the aid of advanced technologies. Most of the developed countries implement telemedicine services to allow both patients and medical doctors to access medical data and medical services quickly and efficiently. However, as the data and services are made accessible online, the data security becomes the concern. Without proper security mechanism in place, the vulnerabilities of telemedicine systems can be exploited which will give negative impact to the patients and medical services as a whole such as wrong treatment being given and confidential data leakage. This paper analyze the security issues in telemedicine as an IOT system and identify related security countermeasures from related works to manage the security issues in telemedicine.
Journal of Applied Sciences, Feb 15, 2013
Journal of theoretical and applied information technology, Oct 15, 2017
Applied sciences, Dec 7, 2022
Most of existing image quality assessment algorithms (IQAs) have been developed during the past d... more Most of existing image quality assessment algorithms (IQAs) have been developed during the past decade. However, most of them are designed for images distorted by compression, noise and blurring. There are very few IQAs designed specifically for CDI, e.g. Contrast distortion may be caused by poor lighting condition and poor-quality image acquisition device. No Reference-Image Quality Assessment (NR-IQA) for Contrast-Distorted Images (NR-IQA-CDI) is one of these few IQAs. The five features used in NR-IQA-CDI are the global spatial statistics of an image including the mean, standard deviation, entropy, kurtosis and skewness. Unfortunately, the performance of NR-IQA-CDI are not encouraging in two of the three test image databases, TID2013 and CSIQ, where the Pearson Linear Correlation Coefficients are only around 0.57 and 0.76, respectively. Therefore, this paper presents the reason which led to poor results in existing NR-IQA-CDI. This paper also can address the problem of existing NR-IQA-CDI which the weakness of the global features in assessing images with uneven contrast.
IEEE ACM Transactions on Networking, 2023
Journal of information security, 2014
Signals and communication technology, 2022
Journal of Physics: Conference Series
At the heart of every critical national infrastructure, there is a SCADA system. The wide range o... more At the heart of every critical national infrastructure, there is a SCADA system. The wide range of supported applications has made this life-saving management system the key element of every industrial control infrastructure in various sectors. The complexity and sophistication of SCADA systems have been increased dramatically over the last few years. Various cyberattacks have targeted these systems by exploiting zero-day vulnerabilities or targeting a nearby Internet-enabled appliance or computer system. To this end, many efforts have been proposed previously to model the threats on SCADA systems to eliminate potential danger and diminish the catastrophic consequences in the physical domain. The main contribution of this work is to present a multi-facets threat assessment model to aid security teams to systematically perform various cybersecurity analysis practices such as penetration testing, vulnerability assessment and risk analysis.
Lecture notes in civil engineering, Oct 13, 2022
IEEE Conference Proceedings, 2016
Journal of Applied Sciences, Jun 15, 2015
Journal of information security and applications, Aug 1, 2023
Nucleation and Atmospheric Aerosols, 2023
Journal of physics, Jun 1, 2022
Since the renowned Stuxnet attack on the Iranian refinery planet in 2010, there have been many at... more Since the renowned Stuxnet attack on the Iranian refinery planet in 2010, there have been many attempts to harden the security of these systems. One of the most significant challenges impacting these systems’ security is the outdated and insecure communication protocols that have been used for many years in various sectors. This work presents a practical solution to protect the SCADA’s critical communications’ confidentiality, authenticity, and integrity. This work put forward a hardware-based general-purpose cryptographic device based on FPGA technology. The device contains a handful of cryptographic algorithms that can be customized to harden the security of devices operating on the IEC 60870-5-101 communication protocol. The experimental results show that the proposed solution enhances the secrecy and integrity of the IEC 60870-5-101 messages and ensures the source’s authenticity.
Journal of information security, 2013
Telemedicine has been in demand due to the flexibility that it offers with the aid of advanced te... more Telemedicine has been in demand due to the flexibility that it offers with the aid of advanced technologies. Most of the developed countries implement telemedicine services to allow both patients and medical doctors to access medical data and medical services quickly and efficiently. However, as the data and services are made accessible online, the data security becomes the concern. Without proper security mechanism in place, the vulnerabilities of telemedicine systems can be exploited which will give negative impact to the patients and medical services as a whole such as wrong treatment being given and confidential data leakage. This paper analyze the security issues in telemedicine as an IOT system and identify related security countermeasures from related works to manage the security issues in telemedicine.
Journal of Applied Sciences, Feb 15, 2013
Journal of theoretical and applied information technology, Oct 15, 2017
Applied sciences, Dec 7, 2022
Most of existing image quality assessment algorithms (IQAs) have been developed during the past d... more Most of existing image quality assessment algorithms (IQAs) have been developed during the past decade. However, most of them are designed for images distorted by compression, noise and blurring. There are very few IQAs designed specifically for CDI, e.g. Contrast distortion may be caused by poor lighting condition and poor-quality image acquisition device. No Reference-Image Quality Assessment (NR-IQA) for Contrast-Distorted Images (NR-IQA-CDI) is one of these few IQAs. The five features used in NR-IQA-CDI are the global spatial statistics of an image including the mean, standard deviation, entropy, kurtosis and skewness. Unfortunately, the performance of NR-IQA-CDI are not encouraging in two of the three test image databases, TID2013 and CSIQ, where the Pearson Linear Correlation Coefficients are only around 0.57 and 0.76, respectively. Therefore, this paper presents the reason which led to poor results in existing NR-IQA-CDI. This paper also can address the problem of existing NR-IQA-CDI which the weakness of the global features in assessing images with uneven contrast.
IEEE ACM Transactions on Networking, 2023
Journal of information security, 2014
Signals and communication technology, 2022
Journal of Physics: Conference Series
At the heart of every critical national infrastructure, there is a SCADA system. The wide range o... more At the heart of every critical national infrastructure, there is a SCADA system. The wide range of supported applications has made this life-saving management system the key element of every industrial control infrastructure in various sectors. The complexity and sophistication of SCADA systems have been increased dramatically over the last few years. Various cyberattacks have targeted these systems by exploiting zero-day vulnerabilities or targeting a nearby Internet-enabled appliance or computer system. To this end, many efforts have been proposed previously to model the threats on SCADA systems to eliminate potential danger and diminish the catastrophic consequences in the physical domain. The main contribution of this work is to present a multi-facets threat assessment model to aid security teams to systematically perform various cybersecurity analysis practices such as penetration testing, vulnerability assessment and risk analysis.
Lecture notes in civil engineering, Oct 13, 2022