Kamarularifin Abd Jalil (Assoc. Prof. Dr.)

  Phone 03-55211115
  Email This email address is being protected from spambots. You need JavaScript enabled to view it.
  Web site -
  Location TB-41
  Academic Position Associate Professor
  Qualification
  • PhD - Electronic and Electrical Engineering (University of Strathclyde, UK), 2008.
  • MSc (Information Technology for Manufacture) Coventry Univ UK, 1997
  • SmSn (Kep) (Sains Komp) ITM-UKM, 1996
  • Diploma Sains Komputer, ITM, 1994
  Education
  • Ph.D. (Electronic and Electrical Engineering) 2008, Strathclyde University, U.K
  • M.Sc (Information Technology) 1997, Coventry University, U.K
  • B.Sc. (Honours) (Computer Science) 1995, Universiti Kebangsaan Malaysia, Malaysia
  • Diploma (Computer Science) 1993, Universiti Teknologi MARA, Malaysia
  Professional Experience
  • Since 1997 - Lecturer at Universiti Teknologi MARA, Malaysia
  • Since 2009 - Scientific & Technical Committee & Editorial Review Board on Natural & Applied Sciences, World Academy of Science, Engineering & Technology
  • Since 2011 - MQA panel auditor
  • 2011 - 2012 - Penggubal Soalan Peperiksaan Matrikulasi, Kementerian Pelajaran Malaysia
  • 2012 - Reviewer for Book Chapter, Kulliyah of Information and Communication Technology, International Islamic University Malaysia
  • 2012 - Reviewer for Malaysian Journal of Computer Science, Universiti Malaya
  • 2012 - Reviewer for Journal Research Notes in Information Science
  • 2014 - Internal Examiner for PhD Thesis
  • 2015 - Reviewer for Jurnal Teknologi, Universiti Teknologi Malaysia
  • 2015 - Interview Panel for Yang Dipertuan Agong Scholarship
  • 2015 - Interviewer for Hadiah Latihan Persekutuan dan Cuti Belajar Bergaji Penuh, Jabatan Perkhidmatan Awam Malaysia
  • 2015 - Internal Examiner for PhD Thesis
  • 2016 - Internal Examiner for PhD Thesis
  • 2016 - External Examiner for Masters by Research Thesis (Universiti Teknikal Malaysia Melaka - UTeM)
  • 2016 - 2018 - External Examiner for KL Metropolitan University (KLMUC)
  • 2017 - Interview Panel for Yang Dipertuan Agong Scholarship
  • 2017 - External Examiner for PhD Thesis (Al-Madinah International University)
  • 2017 - External Examiner for Masters by Research Thesis (Universiti Pertahanan Nasional Malaysia - UPNM)
  • 2017 - Internal Examiner for PhD Thesis
  • 2017 - 2019 - External Examiner for Bachelor of Computer Science (Computer Networking), Universiti Teknikal Malaysia melaka (UTeM).
  • 2017 - MQA APEL (C) Panel
  Administrative Experience
  • Center Head for Computer Technology & Networking Studies, Faculty of Computer & Mathematical Sciences, UiTM, 1st Aug 2013 - 31st July 2017
  • Head of Center for Graduate Studies, Faculty of Computer and Mathematical Sciences, UiTM August 2011 - July 2013
  • Head of Programme (By Research), Doctor of Philosophy and Master of Sciences, Faculty of Computer and Mathematical Sciences, UiTM, June 2010 - July 2011.
  • Coordinator BSc (Hons) Data Communications & Networking at Universiti Teknologi MARA, Malaysia, 1st Nov 2000 – 31st Oct 2002
  • Coordinator Computer Unit, Faculty of Computer & Mathematical Sciences, Universiti Teknologi MARA, Malaysia, 1st Apr 1999 – 31st March 2001
  Area of Interest
  • Mobile Communications
  • Mobile Networks & Protocols
  • Wireless Networks
  • Digital Forensics
  • Information Security
  Awards
  • Gold Medal - Invention, Innovation & Design Expo (iidex) 2013
  • Gold Medal - Innovation Platform 2012
  • UiTM Excellence Award 2012
  • UiTM Excellence Award 2009
  • UiTM Excellence Award 2001
  Courses Taught
  • ITT730 - Business Data Networks & Telecommunications
  • ITT779 - Computer Performance Modelling
  • ITT575 - Wireless & Mobile Computing
  • ITT400 - Data Communication & Networking
  • CSP600 - Project Prososal
  • CSP650 - Final Year Project
  Research Experience
  • Preserving User Privacy With Anonymous Authentication In Cloud Computing, LESTARI (RM20,000), Universiti Teknologi MARA, 2016.
  • A New Anonymous Authentication Mechanism for Data Provenance In Cloud Environment, Fundamental Research Grant Scheme (RM69,748), Ministry of Higher Education Malaysia, 2016.
  • Mobility-aware Based Vertical Handover Decision Algorithm, Fundamental Research Grant Scheme (RM57, 528), Ministry of Higher Education Malaysia, 2016.
  • Web Application Vulnerabilities Detection Model, Research Acculturation Grant Scheme (RM78,000), Ministry of Higher Education Malaysia, 2013 -2015.
  • Dynamic Load Balancing Algorithm for Heterogeneous Computing System (CPU/GPU), Research Intensive Faculty Grant (RM32,000), UiTM, 2012 - 2014.
  • The Development of a New Mechanism for Embedding the Arabic Characters into QR Code, Research Intensive Faculty Grant (RM32,000), UiTM, 2012 -2014.
  • RFID EPC Global Network Data Transformation Layer, Research Intensive Faculty Grant (RM32,000), UiTM, 2012 -2014.
  • Enhancing AODV Routing Protocol for an Efficient Black Hole Attack Detection, Excellence Fund (RM6,000), UiTM, Completed 2013.
  • Securing a Client-Side Communication Using Attestation and Pseudonymisation Techniques, Excellence Fund (RM9,000), UiTM, Completed 2013.
  • An Architectural Framework of Juxtapose (JXTA) Technology in Ubiquitous Learning Environment, Fundamental Research Grant Scheme (RM72,700), Ministry of Higher Education Malaysia, Completed 2013
  Supervisions

PhD

  • Nik Azmi Nik Omar - Vulnerability Assessment Model for MyKad
  • Mohammad Affendi Abdul Malek - Digital Forensic Investigation Framework for Fraudulent Accounting Data
  • Mohd Izuan Mohd Saad - A New Security Framework for Cloud Computing
  • Zul Azri - A New Mechanism to Tackel DDOS Attack in Cloud

 

MSc (by research)

  • Fazli Mat Nor - Trust and Provacy Enhancement for Web Protocol Using Attestation and Pseudonymisation Technique
  • Zaid Ahmad - Enhancing MOSAODV Routing Protocol Against Black Hole Attack
  • Qatrunnada Abdul Rahman - Multiple Trusted Device Authentication Scheme for Ubiquitous Computing Application
  Publications Books and Monographs
  • Analisis dan Rekabentuk Sistem Maklumat, McGraw Hill (M) Sdn Bhd, Kuala Lumpur, 2001 (co-author).
  • IT Kini, McGraw Hill (M) Sdn Bhd, Kuala Lumpur 2003 (co-author).
  • Design and Performance Evaluation of Mobile Sub-networks Mobility Support Using the Internet Protocol for the Personal Distributed Environment, University of Strathclyde 2008.
Articles
  • “Network Support Services for PDE”, Mobile Virtual Center of Excellence Deliverable D-IoN4.1, 2005
  • “Handling the Convergence of Mobile Sub-networks in a PDE”, 3rd International Symposium on Wireless Communication Systems (ISWCS 2006), Universidad Politecnica De Valencia (Spain), 2006
  • “Looking into the 4G Features”, Computer Communication Network, Forensic (CCNF-08) Seminar, Management & Science University, Malaysia, 2008
  • “Supporting Network Mobility in a Personal Distributed Environment”, 2nd International Conference on Science and Technology (ICSTIE 2008), Universiti Teknologi MARA, Penang Malaysia, 2008.
  • “Signalling Cost Analysis of PDE-NEMO” , International Conference on Communication Technology 2009, Penang, Malaysia
  • “U-Learning Concept & Approach Comparison” , International Conference on Computing & Informatics Kuala Lumpur Malaysia, June 2009.
  • "Preventing Identity Theft With Trust and Mutual Authentication", Conference on Information Security (The 4th World Engineering Conference 2010), 2010, Sarawak, Malaysia.
  • "A Composed Energy Aware Metric for WSNs", International Conference on Computer Design and Applications (ICCDA 2010), Qinhuangdong, China, June 2010.
  • "Comparison of Machine Learning Algorithms Performance in Detecting Network Intrusion", International Conference on Networking and Information Technology (ICNIT 2010), Manila, Philipines, June 2010.
  • "Securing a Client-side Communication Using Attestation and Pseudonymisation", The Second International Conference on Software Engineering and Computer Systems (ICSECS 2011), Pahang, Malaysia, June 2011.
  • "An Enhanced Route Discovery Mechanism for AODV", The Second International Conference on Software Engineering and Computer Systems (ICSECS 2011), Pahang, Malaysia, June 2011.
  • "Securing Routing Table Update in AODV Routing Protocol", IEEE Conference on Open Systems 2011 (ICOS2011), Langkawi, Malaysia, 25-28 Sept 2011.
  • "Black Hole Effect Mitigation Method in AODV Routing Protocol", The International Conference on Information Assurance and Security (IAS) 2011, Malacca, Malaysia, December 2011.
  • "Multiple Trusted Devices Authentication Protocol For Ubiquitous Computing Applications", The International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec12), Kuala Lumpur, Malaysia, Jun 2012.
  • "An Enhanced Remote Authentication Scheme to Mitigate Man-In-The-Browser Attacks", The International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec12), Kuala Lumpur, Malaysia, Jun 2012.
  • "The Embedding of Arabic Characters in QR Code", IEEE Conference on Open Systems 2012 (ICOS2012), Kuala Lumpur, Malaysia, October 2012.
  • "Performance Evaluation on Modified AODV Protocols", IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE 2012), Malacca, Malaysia, December 2012.
  • "Acieving Trust and Accountability in Cloud Using Data Provenance", SiSKOM 2013, Shah Alam, Malaysia, September 2013.
  • "Reed-Solomon versus Turbo Code in Providing a Fast Space Saving Algorithm for Arabic Characters in QR Code", SiSKOM 2013, Shah Alam, Malaysia, September 2013.
  • "Enhanced AODV Protocols for Black Hole Mitigation", SiSKOM 2013, Shah Alam, Malaysia, September 2013.
  • "Mitigating SSL Stripping Attack With Trusted and Secure Protocol", SiSKOM 2013, Shah Alam , Malaysia, September 2013.
  • "Using Trusted Platform Module to Mitigate SSL Stripping", IEEE Conference on Open Systems 2013 (ICOS2013), Kuching, Sarawak Malaysia, December 2013.
  • "Data Provenance Trusted Model in Cloud Computing", 3rd International Conference on Research and Innovation in Information Systems 2013, Kuala Lumpur, Malaysia, December 2013.
  • "Achieving Trust in Cloud Computing Using Secure Data Provenance", IEEE Conference on Open Systems (ICOS) 2014.
  • "Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack", Computer Applications and Industrial Electronics Conference (ISCAIE) 2014.

Journals

  • “Performance Evaluation of Mobile Sub-networks Convergence Approaches in a Personal Distributed Environment”, to be appeared in Information Technology Journal, Vol 8(5): pp 657-667, 2009.
  • "Looking Into the 4G Features", MASAUM Journal of Basic and Applied Sciences (MJBAS), Vol 1(2): pp 249-253, Sept 2009.
  • "Mind Mapping With Cooperative Learning In Supplementing Computer Programming Learning: Theoretical Framework", MASAUM Journal of Basic and Applied Sciences (MJBAS), Vol 1(3): pp 497-504, Oct 2009.
  • "The Definition and Characteristics of Ubiquitous Learning: A Discussion", International Journal of Education and Development Using Information and Communication Technology, Vol 6(1), Feb 2010.
  • "Mitigation of Black Hole Attacks for AODV Routing Protocol", International Journal of New Computer Architectures and their Application, Vol 1(2), pp 336-343, 2011.
  • "An Enhanced Renote Authentication Scheme Using Secure Key Exchange Protocol with Platform Integrity Attestation", International Journal of New Computer Architectures and their Applications, Vol 1(2), pp 384-395, 2011.
  • "Authenticating Devices in Ubiquitous Computing Environment", International Journal of Cyber-Security and Digital Forensics, Vol 1(2), pp 75-81, 2012.
  • "Mitigating Man-in-the-Browser Attacks with Hardware-based Authentication scheme", International Journal of Cyber-Security and Digital Forensics, Vol 1(3), pp 221-227, 2012.
  • "Space Saving Algorithm for Arabic Characters in QR Code", Journal of Next Generation Technology, Vol 4(7), pp 70-77, 2013.
  • "Preserving User Privacy With Anonymous Authentication in Cloud Computing", ARPN Journal of Engineering and Applied Sciences, 2015.
  • "A New Technique for Protecting Server Against MAC Spoofing via Software Attestation", Advanced Science Letters, Vol 21 (10) pp 3019 -3023, 2015.
  • "Secured Authentication Using Anonymity and Password-based Derivation Function", Lecture Notes in Computer Science, Springer, 2016.
  • "SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm", Journal of Computers, Vol 12 (2) pp 183- 189, 2017.
  • "Anonymous Authentication Against Man-in-the-Middle Attack", Journal of Telecommunication Electronic and Computer Engineering, Vol  9(2-4), pp 143-147, 2017.