Page 3 - bookofabstract_vj5_final(1)
P. 3
Cyber-Attack Features for Detecting Cyber Threat Incidents from Online News ....................................... 14
Mohamad Syahir Abdullah & Anazida Zainal
Overview of Blockchain Implementation on Islamic Finance: Saadiqin Experience................................... 15
Az Azrinudin Alidin, Abdo Ali Abdullah Ali-Wosabi & Zamri Yusoff
A Conceptual Scheme for Ransomware Background Knowledge Construction ......................................... 16
Nurfadilah Ariffin, Anazida Zainal, Mohd Aizaini Maarof & Mohamad Nizam Kassim
Acquiring and Analysing Digital Evidence – a Teaching and Learning Experience in Class ......................... 17
Normaziah A. Aziz, Ahmad Rasyad Hanizam, Muhammad Saifulldin M. Yusof, Lukman Hakim Abd
Rahman & Muhammad Helmi Bin Ab. Malik
A Two-stage Malware Detection Architecture Inspired by Human Immune System ................................. 18
Mohammed A. F. Salah, Mohd Fadzli Marhusin & Rossilawati Sulaiman
Cyberbullying Detection: An Overview ....................................................................................................... 19
Wan Noor Hamiza Wan Ali, Masnizah Mohd & Fariza Fauzi
Key Factors to Implement BYOD in Schools ................................................................................................ 20
Yusri Hakim Yeop, Zulaiha Ali Othman, Siti Norul Huda Sheikh Abdullah, Umi Asma’ Mokhtar, Wan
Fariza Paizi@ Fauzi & Nazilah Ahmad
Cyber Vulnerabilities on Smart Healthcare, Review and Solutions ............................................................ 21
Seyedmostafa Safavi, Ahmad Moaaz Meer, Ed Keneth Joel Melanie & Zarina Shukur
Android Malware Detection Using Machine Learning on Image Patterns ................................................. 22
Fauzi Mohd Darus,Noor Azurati Ahmad @ Salleh & Aswami Fadillah Mohd Ariffin
A Conceptual Framework of IT Security Governance and Internal Controls .............................................. 23
Nadianatra Musa
Security and Privacy Challenges in Cloud Computing: A Road Ahead ........................................................ 24
Salasiah Abdullah & Khairul Azmi Abu Bakar
The Risks of Artificial Intelligence in the Dawn of the Fourth Industrial Revolution in Malaysia ............... 25
Nazura bt Abdul Manap & Azrol bin Abdullah
POLIoT : Internet Of Things Framework In Managing Network Threats At Metro Polytechnic Tasek
Gelugor ........................................................................................................................................................ 26
Zulkarnain Md. Ali, Mohamad Azuan Bin Mohamed Arshad & Marini Abu Bakar
Data Sanitization Process From Hard Disk Drive......................................................................................... 27
Nooreen Ashilla Binti Yusof, Siti Norul Huda Binti Sheikh Abdullah, Mohamad Firham Efendy Bin Md
Senan, Nor Zarina Binti Zainal Abidin, Monaliza Binti Sahri, Najmi Syahiran Bin Shaiful Azam and
Muhamad Zuhairi Bin Abdullah
ii