Ramlan Mahmod
Information Technology University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ramlan Mahmod.
information assurance and security | 2011
Ali Dehghantanha; Nur Izura Udzir; Ramlan Mahmod
Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobile devices functionality is at enhanced. So the security of mobile devices needs to be improved. This paper discusses various components and functions of mobile devices such as SMS, wireless and applications and describes possible vulnerabilities threatening them precisely. Malware threats are explained and their effects on mobile devices are studied. Finally, to protect all the vulnerabilities and prevent application and malware threats, data-centric security model is provided as a solution to ensure confidentiality, integrity and availability of data stored on mobile devices.
international conference on information technology: new generations | 2015
Waleed Halboob; Ramlan Mahmod; Muhammad Abulaish; Haider Abbas; Kashif Saleem
In this paper, we have proposed the design of an efficient computer forensics investigation framework. The proposed framework improves the investigation efficiency using Data Warehouse (DW) concept, which provides a selective evidence identification, collection and analysis. So, only relevant data is investigated instead of investigating the entire user data. The proposed framework consists of a Data Warehouse Engine (DWE) to selectively identify, collect and analyze digital evidences from multiple digital resources. A Digital Evidence Preservation (DEP) mechanism is also introduced for preservation of the collected digital evidences whose authenticity is ensured using cryptographic techniques. An access control mechanism is implemented to allow only authorized investigator to access the preserved digital evidences. The DEP mechanism provides court of law with a Secure Forensic Audit Trial (SFAT) that helps in tracking happened activities on the collected evidences for ensuring the authenticity and reliability of the presented digital evidence.
Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) | 2012
Mohd Anuar Mat Isa; Jamalul Lail Ab Manan; Ramlan Mahmod; Habibah Hashim; Mar Yah Said; Nur Izura Udzir; Ali Dehghan Tanha
Globalization had changed the world landscape into borderless world without limits to sea, land and air space. The development of IT products and services need evaluation and certification. This paper discusses some security and trust issues in Common Criteria in evaluation and certification of IT products and services. Our intention is to help manufacturer in choosing a finest authorizing member of CC certification for IT products and services in varying situations amongst countries participating in the CC certification, be it friendly, neutral or war. The consequence is to help reduce cost to trade these IT products and related services in global market. The ultimate impact is to enable us do more business and market our products in other countries if we have wider acceptability of the CC certification.
2012 International Conference on Information Retrieval & Knowledge Management | 2012
M. N. Zawawi; Ramlan Mahmod; Nur Izura Udzir; Fatimah Ahmad; J. M. Desa
Our paper discusses how active warden operates and why it is important for steganographers to understand the impending threat in which they possess. It was a common belief that the main adversary for steganography is coming from steganalysis detection. However, we have found in some situation, the destruction of hidden information is more easily achievable compared to the task of detecting it. Active Wardens are attackers of steganography which aims to demolish possible hidden information within a carrier media. If the enemys objective is to disrupt the communication of hidden information, then the active approach is definitely a better choice compared to passive time consuming steganalysis.
bio-inspired computing: theories and applications | 2011
Suriyani Ariffin; Ramlan Mahmod; Azmi Jaafar; Muhammad Rezal Kamel Ariffin
This paper proposed immune-inspired approaches in designing a new function for cryptographic algorithm named as 3D-AES. The immune systems approaches were selected on the basis of complex features that are desirable for substitution and permutation process to ensure adequate security and confidentiality of the systems in the world of information technology. This paper will identify the correspondences and highlight essential computation elements that can be applied in cryptographic algorithm that satisfies with Shannons confusion and diffusion properties. The 3D-AES uses components in Advanced Encryption Standard(AES) algorithm and new core components based on immune systems approaches. Cryptographic strength in the context of this paper is related to the ability of the algorithm to produce a random output. The empirical findings are presented and identified that the randomness of the output in the 3D-AES algorithm are comparable with AES algorithm.
ieee international conference on computer science and information technology | 2009
Siti Hanom Marjuni; Ramlan Mahmod; Abd Ghani; Abdullah Mohd Zain; Aida Mustapha
This paper aims to identify lexical of criminal elements for chatting corpus, which involved suspect and victim conversation utterances. Lexical criminal identification requires three processes. The first is tokenization to automatically assign each lexical with a corresponding serial number in every suspect and victim utterance. The second is tagging the lexical with parts of speech to identify verbs and nouns in the utterances. The third is to identify and analyze the interrogative criminal construct to get the criminal evidence. The chatting corpus consists of 3,067 suspect and victim utterances with 16,278 words, collected from 9 criminal chatting cases. The results indicate that both verb and noun are the most important part of speech elements that represent the criminal constructs in chat utterances.
international conference on information and communication technologies | 2008
Ziyad Tariq Abdul-Mehdi; Ramlan Mahmod
Mobile database permeates into todays computing and communication area; we envision application infrastructures that will increasingly rely on mobile technology. Transactions security of database will need to integrate peer-to- peer mobile environment: people and computers. In this paper we develop a security model for transaction management framework for peer-to-peer environments. A key requirement in such an environment is to support and secure frequent disconnection of mobile database. We present algorithms that implement this framework in an asynchronous and synchronous system.
Journal of Cardiothoracic Surgery | 2014
Aqeel Al-Surmi; Rahmita Wirza; Ramlan Mahmod; Fatimah Khalid; Mohd Zamrin Dimon
BackgroundThe identification and segmentation of inhomogeneous image regions is one of the most challenging issues nowadays. The surface vessels of the human heart are important for the surgeons to locate the region where to perform the surgery and to avoid surgical injuries. In addition, such identification, segmentation, and visualisation helps novice surgeons in the training phase of cardiac surgery.MethodsThis article introduces a new mechanism for identifying the position of vessels leading to the performance of surgery by enhancement of the input image. In addition, develop a 3D vessel reconstruction out of a single-view of a real human heart colour image obtained during open-heart surgery.ResultsReduces the time required for locating the vessel region of interest (ROI). The vessel ROI must appear clearly for the surgeons. Furthermore, reduces the time required for training cardiac surgery of the novice surgeons. The 94.42% accuracy rate of the proposed vessel segmentation method using RGB colour space compares to other colour spaces.ConclusionsThe advantage of this mechanism is to help the surgeons to perform surgery in less time, avoid surgical errors, and to reduce surgical effort. Moreover, the proposed technique can reconstruct the 3D vessel model from a single image to facilitate learning of the heart anatomy as well as training of cardiac surgery for the novice surgeons. Furthermore, extensive experiments have been conducted which reveal the superior performance of the proposed mechanism compared to the state of the art methods.
international conference on advanced computer science applications and technologies | 2012
Hasan H. Khaleel; Rahmita O. K. Rahmat; D. M. Zamrin; Ramlan Mahmod; Norwati Mustapha
This paper begins with a review of the coronary artery trees extraction techniques within different eras. Next, a review of 3D reconstruction of coronary artery trees approaches is presented in details. A well presentation of the center of gravity approaches is included within the 3D reconstruction review techniques. Finally, the paper discusses the surface reconstruction techniques throughout their development stages. Each stage of the review paper is concluded by a summary. This paper is concluded by a comprehensive summary which discussed the lack of a robust approach in each stage of it. The improvement of a new approach in each stage depends on the lack in that stage and the results which are expected from the work.
international conference on advanced computer science applications and technologies | 2012
Maryam Shahpasand; Ramlan Mahmod; Nur Izura Udzir; Ali Deghantanha
Online social networks provide user relationships and increase information and resource sharing between a large amount of users. Communications by social networks overtake the emails, and it poses enormous security challenges in this platform. Numerous privacy leakages arise while unauthorized users can access information at anywhere and anytime. This paper presents Usage Decision Online Social Network (UDOSN) model to protect private data from illegal access before and during the usage in online social networks. The authentication function controls the access requests before the usage, and right requests are done by the authorization function during the usage. Presented scenarios show the process of both functions. Moreover, Usage Decision Online Social Network model is reusable and environment-independent, and it is defined for social network with formal descriptions.