Norziana Jamil | Universiti Tenaga Nasional (original) (raw)

Papers by Norziana Jamil

Research paper thumbnail of モノ(IOT)のインターネットのためのRSSI三辺測量法に基づく改良型屋内位置決めアルゴリズム【Powered by NICT】

IEEE Conference Proceedings, 2016

Research paper thumbnail of Authenticated Encryption Schemes: A Systematic Review

Research paper thumbnail of Threat Modeling Approaches for Securing Cloud Computin

Journal of Applied Sciences, Jun 15, 2015

Research paper thumbnail of On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM

Journal of information security and applications, Aug 1, 2023

Research paper thumbnail of Risk-ranking matrix for security patching of exploitable vulnerabilities

Nucleation and Atmospheric Aerosols, 2023

Research paper thumbnail of Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway

Journal of physics, Jun 1, 2022

Since the renowned Stuxnet attack on the Iranian refinery planet in 2010, there have been many at... more Since the renowned Stuxnet attack on the Iranian refinery planet in 2010, there have been many attempts to harden the security of these systems. One of the most significant challenges impacting these systems’ security is the outdated and insecure communication protocols that have been used for many years in various sectors. This work presents a practical solution to protect the SCADA’s critical communications’ confidentiality, authenticity, and integrity. This work put forward a hardware-based general-purpose cryptographic device based on FPGA technology. The device contains a handful of cryptographic algorithms that can be customized to harden the security of devices operating on the IEC 60870-5-101 communication protocol. The experimental results show that the proposed solution enhances the secrecy and integrity of the IEC 60870-5-101 messages and ensures the source’s authenticity.

Research paper thumbnail of Diffusion Analysis of Message Expansion in STITCH-256

Journal of information security, 2013

Research paper thumbnail of A Quick Review of Security Issues in Telemedicine

Telemedicine has been in demand due to the flexibility that it offers with the aid of advanced te... more Telemedicine has been in demand due to the flexibility that it offers with the aid of advanced technologies. Most of the developed countries implement telemedicine services to allow both patients and medical doctors to access medical data and medical services quickly and efficiently. However, as the data and services are made accessible online, the data security becomes the concern. Without proper security mechanism in place, the vulnerabilities of telemedicine systems can be exploited which will give negative impact to the patients and medical services as a whole such as wrong treatment being given and confidential data leakage. This paper analyze the security issues in telemedicine as an IOT system and identify related security countermeasures from related works to manage the security issues in telemedicine.

Research paper thumbnail of Diffusion and Statistical Analysis of STITCH-256

Journal of Applied Sciences, Feb 15, 2013

Research paper thumbnail of Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB

Research paper thumbnail of Implementation of lightweight cryptographic primitives

Journal of theoretical and applied information technology, Oct 15, 2017

Research paper thumbnail of Binary and Multi-Class Malware Threads Classification

Applied sciences, Dec 7, 2022

Research paper thumbnail of Image Steganalysis based on Pretrained Convolutional Neural Networks

Research paper thumbnail of Analysis of Global Spatial Statistics Features in Existing Contrast Image Quality Assessment Algorithm

Most of existing image quality assessment algorithms (IQAs) have been developed during the past d... more Most of existing image quality assessment algorithms (IQAs) have been developed during the past decade. However, most of them are designed for images distorted by compression, noise and blurring. There are very few IQAs designed specifically for CDI, e.g. Contrast distortion may be caused by poor lighting condition and poor-quality image acquisition device. No Reference-Image Quality Assessment (NR-IQA) for Contrast-Distorted Images (NR-IQA-CDI) is one of these few IQAs. The five features used in NR-IQA-CDI are the global spatial statistics of an image including the mean, standard deviation, entropy, kurtosis and skewness. Unfortunately, the performance of NR-IQA-CDI are not encouraging in two of the three test image databases, TID2013 and CSIQ, where the Pearson Linear Correlation Coefficients are only around 0.57 and 0.76, respectively. Therefore, this paper presents the reason which led to poor results in existing NR-IQA-CDI. This paper also can address the problem of existing NR-IQA-CDI which the weakness of the global features in assessing images with uneven contrast.

Research paper thumbnail of Determinants of cloud computing integration and its impact on sustainable performance in SMEs: An empirical investigation using the SEM-ANN approach

Research paper thumbnail of Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection

IEEE ACM Transactions on Networking, 2023

Research paper thumbnail of I-PRESENT<sup>TM</sup>: An Involutive Lightweight Block Cipher

Journal of information security, 2014

Research paper thumbnail of Detection and Prevention of ARP Cache Poisoning in Advanced Persistent Threats Using Multiphase Validation and Firewall

Signals and communication technology, 2022

Research paper thumbnail of Threat Assessment Model in Electrical Power Grid Environment

Journal of Physics: Conference Series

At the heart of every critical national infrastructure, there is a SCADA system. The wide range o... more At the heart of every critical national infrastructure, there is a SCADA system. The wide range of supported applications has made this life-saving management system the key element of every industrial control infrastructure in various sectors. The complexity and sophistication of SCADA systems have been increased dramatically over the last few years. Various cyberattacks have targeted these systems by exploiting zero-day vulnerabilities or targeting a nearby Internet-enabled appliance or computer system. To this end, many efforts have been proposed previously to model the threats on SCADA systems to eliminate potential danger and diminish the catastrophic consequences in the physical domain. The main contribution of this work is to present a multi-facets threat assessment model to aid security teams to systematically perform various cybersecurity analysis practices such as penetration testing, vulnerability assessment and risk analysis.

Research paper thumbnail of A Holistic Approach for Establishing Resilient Dams for Malaysia

Lecture notes in civil engineering, Oct 13, 2022

Research paper thumbnail of モノ(IOT)のインターネットのためのRSSI三辺測量法に基づく改良型屋内位置決めアルゴリズム【Powered by NICT】

IEEE Conference Proceedings, 2016

Research paper thumbnail of Authenticated Encryption Schemes: A Systematic Review

Research paper thumbnail of Threat Modeling Approaches for Securing Cloud Computin

Journal of Applied Sciences, Jun 15, 2015

Research paper thumbnail of On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM

Journal of information security and applications, Aug 1, 2023

Research paper thumbnail of Risk-ranking matrix for security patching of exploitable vulnerabilities

Nucleation and Atmospheric Aerosols, 2023

Research paper thumbnail of Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway

Journal of physics, Jun 1, 2022

Since the renowned Stuxnet attack on the Iranian refinery planet in 2010, there have been many at... more Since the renowned Stuxnet attack on the Iranian refinery planet in 2010, there have been many attempts to harden the security of these systems. One of the most significant challenges impacting these systems’ security is the outdated and insecure communication protocols that have been used for many years in various sectors. This work presents a practical solution to protect the SCADA’s critical communications’ confidentiality, authenticity, and integrity. This work put forward a hardware-based general-purpose cryptographic device based on FPGA technology. The device contains a handful of cryptographic algorithms that can be customized to harden the security of devices operating on the IEC 60870-5-101 communication protocol. The experimental results show that the proposed solution enhances the secrecy and integrity of the IEC 60870-5-101 messages and ensures the source’s authenticity.

Research paper thumbnail of Diffusion Analysis of Message Expansion in STITCH-256

Journal of information security, 2013

Research paper thumbnail of A Quick Review of Security Issues in Telemedicine

Telemedicine has been in demand due to the flexibility that it offers with the aid of advanced te... more Telemedicine has been in demand due to the flexibility that it offers with the aid of advanced technologies. Most of the developed countries implement telemedicine services to allow both patients and medical doctors to access medical data and medical services quickly and efficiently. However, as the data and services are made accessible online, the data security becomes the concern. Without proper security mechanism in place, the vulnerabilities of telemedicine systems can be exploited which will give negative impact to the patients and medical services as a whole such as wrong treatment being given and confidential data leakage. This paper analyze the security issues in telemedicine as an IOT system and identify related security countermeasures from related works to manage the security issues in telemedicine.

Research paper thumbnail of Diffusion and Statistical Analysis of STITCH-256

Journal of Applied Sciences, Feb 15, 2013

Research paper thumbnail of Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB

Research paper thumbnail of Implementation of lightweight cryptographic primitives

Journal of theoretical and applied information technology, Oct 15, 2017

Research paper thumbnail of Binary and Multi-Class Malware Threads Classification

Applied sciences, Dec 7, 2022

Research paper thumbnail of Image Steganalysis based on Pretrained Convolutional Neural Networks

Research paper thumbnail of Analysis of Global Spatial Statistics Features in Existing Contrast Image Quality Assessment Algorithm

Most of existing image quality assessment algorithms (IQAs) have been developed during the past d... more Most of existing image quality assessment algorithms (IQAs) have been developed during the past decade. However, most of them are designed for images distorted by compression, noise and blurring. There are very few IQAs designed specifically for CDI, e.g. Contrast distortion may be caused by poor lighting condition and poor-quality image acquisition device. No Reference-Image Quality Assessment (NR-IQA) for Contrast-Distorted Images (NR-IQA-CDI) is one of these few IQAs. The five features used in NR-IQA-CDI are the global spatial statistics of an image including the mean, standard deviation, entropy, kurtosis and skewness. Unfortunately, the performance of NR-IQA-CDI are not encouraging in two of the three test image databases, TID2013 and CSIQ, where the Pearson Linear Correlation Coefficients are only around 0.57 and 0.76, respectively. Therefore, this paper presents the reason which led to poor results in existing NR-IQA-CDI. This paper also can address the problem of existing NR-IQA-CDI which the weakness of the global features in assessing images with uneven contrast.

Research paper thumbnail of Determinants of cloud computing integration and its impact on sustainable performance in SMEs: An empirical investigation using the SEM-ANN approach

Research paper thumbnail of Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection

IEEE ACM Transactions on Networking, 2023

Research paper thumbnail of I-PRESENT<sup>TM</sup>: An Involutive Lightweight Block Cipher

Journal of information security, 2014

Research paper thumbnail of Detection and Prevention of ARP Cache Poisoning in Advanced Persistent Threats Using Multiphase Validation and Firewall

Signals and communication technology, 2022

Research paper thumbnail of Threat Assessment Model in Electrical Power Grid Environment

Journal of Physics: Conference Series

At the heart of every critical national infrastructure, there is a SCADA system. The wide range o... more At the heart of every critical national infrastructure, there is a SCADA system. The wide range of supported applications has made this life-saving management system the key element of every industrial control infrastructure in various sectors. The complexity and sophistication of SCADA systems have been increased dramatically over the last few years. Various cyberattacks have targeted these systems by exploiting zero-day vulnerabilities or targeting a nearby Internet-enabled appliance or computer system. To this end, many efforts have been proposed previously to model the threats on SCADA systems to eliminate potential danger and diminish the catastrophic consequences in the physical domain. The main contribution of this work is to present a multi-facets threat assessment model to aid security teams to systematically perform various cybersecurity analysis practices such as penetration testing, vulnerability assessment and risk analysis.

Research paper thumbnail of A Holistic Approach for Establishing Resilient Dams for Malaysia

Lecture notes in civil engineering, Oct 13, 2022