Page 3 - bookofabstract_vj5_final(1)
P. 3

Cyber-Attack Features for Detecting Cyber Threat Incidents from Online News ....................................... 14

                  Mohamad Syahir Abdullah & Anazida Zainal
               Overview of Blockchain Implementation on Islamic Finance: Saadiqin Experience................................... 15

                  Az Azrinudin Alidin, Abdo Ali Abdullah Ali-Wosabi & Zamri Yusoff
               A Conceptual Scheme for Ransomware Background Knowledge Construction ......................................... 16

                  Nurfadilah Ariffin, Anazida Zainal, Mohd Aizaini Maarof & Mohamad Nizam Kassim
               Acquiring and Analysing Digital Evidence – a Teaching and Learning Experience in Class ......................... 17

                  Normaziah A. Aziz, Ahmad Rasyad Hanizam, Muhammad Saifulldin M. Yusof, Lukman Hakim Abd
                  Rahman & Muhammad Helmi Bin Ab. Malik
               A Two-stage Malware Detection Architecture Inspired by Human Immune System ................................. 18

                  Mohammed A. F. Salah, Mohd Fadzli Marhusin & Rossilawati Sulaiman
               Cyberbullying Detection: An Overview ....................................................................................................... 19

                  Wan Noor Hamiza Wan Ali, Masnizah Mohd & Fariza Fauzi
               Key Factors to Implement BYOD in Schools ................................................................................................ 20

                  Yusri Hakim Yeop, Zulaiha Ali Othman, Siti Norul Huda Sheikh Abdullah, Umi Asma’ Mokhtar, Wan
                  Fariza Paizi@ Fauzi & Nazilah Ahmad
               Cyber Vulnerabilities on Smart Healthcare, Review and Solutions ............................................................ 21
                  Seyedmostafa Safavi, Ahmad Moaaz Meer, Ed Keneth Joel Melanie & Zarina Shukur

               Android Malware Detection Using Machine Learning on Image Patterns ................................................. 22

                  Fauzi Mohd Darus,Noor Azurati Ahmad @ Salleh & Aswami Fadillah Mohd Ariffin
               A Conceptual Framework of IT Security Governance and Internal Controls .............................................. 23
                  Nadianatra Musa

               Security and Privacy Challenges in Cloud Computing: A Road Ahead ........................................................ 24

                  Salasiah Abdullah & Khairul Azmi Abu Bakar
               The Risks of Artificial Intelligence in the Dawn of the Fourth Industrial Revolution in Malaysia ............... 25
                  Nazura bt Abdul Manap & Azrol bin Abdullah

               POLIoT : Internet Of Things Framework In Managing Network Threats At Metro Polytechnic Tasek
               Gelugor ........................................................................................................................................................ 26
                  Zulkarnain Md. Ali, Mohamad Azuan Bin Mohamed Arshad & Marini Abu Bakar

               Data Sanitization Process From Hard Disk Drive......................................................................................... 27
                  Nooreen Ashilla Binti Yusof, Siti Norul Huda Binti Sheikh Abdullah, Mohamad Firham Efendy Bin Md
                  Senan, Nor Zarina Binti Zainal Abidin, Monaliza Binti Sahri, Najmi Syahiran Bin Shaiful Azam and
                  Muhamad Zuhairi Bin Abdullah



                                                                                                            ii
   1   2   3   4   5   6   7   8