My experience on my daily works... helping others ease each other

List of IP and Publications

IP
2013
  1. Nurul Haszeli Ahmad, Fazli Mat Nor, Nagendran Parumalai, System and Method to Secure Distribution and Execution Software Libraries, MyIPO (submitted), 2013
2012
  1. Nurul Haszeli Ahmad, Fazli Mat Nor, Nagendran Parumalai, Automatic Transformation of Non-Relational Database Into Relational Database, MyIPO, PI 2012005266, 2012
2011
  1. Arniyati Ahmad, Mohd Faizal Mubarak, Nurul Haszeli Ahmad, Secure External Storage System and Method Thereof, US patent, WO2012050421 A1, PCT/MY2011/000121, 2011
2010
  1. KPI Management System (14 Copyrights and Trade Secret)
  2. Project Q (6 Trade Secret)

2009
  1. Project Prihatin (6 Copyrights and Trademarks)

Publications
2013
  1. Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan, “Vulnerabilities and Exploitation in Computer System - Past, Present and Future”, SiSKOM 2013 (ISBN 978-967-12088-0-9), Universiti Teknologi Mara, Shah Alam, Selangor, Malaysia, 3rd - 4th Sep 2013
2011
  1. Noor Nashriq Ramly, Nurul Haszeli Ahmad, Mohd Haris Aziz, “Comparative Analysis on Data Visualization for Operations Dashboard”, International Journal of Information and Education Technology. IJIET 2012 Vol.2(4): 287-290 ISSN 2010-3689. Published by IEEE
2011
  1. Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan, “Understanding Vulnerabilities by Refining Taxonomy”, IEEE, 7th International Conference on Information Assurance and Security (IAS 2011), ISBN 978-1-4577-2154-0, page 25 – 29, Melaka, 5th – 8th December 2011 
  2. Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan, “Classifications and Measurement on C Overflow Vulnerabilities Attack”, International Journal of New Computer Architectures and their Applications (IJNCAA), Vol. 3, No 1, 2011 
  3. Noor Nashriq Ramly, Ahmad Zuhairi Ismail, Mohd Haris Aziz, Nurul Haszeli Ahmad, “Operations Dashboard: Comparative Study”, SPIE Digital Library, Proceeding SPIE 8285, International Conference on Graphic and Image Processing (ICGIP 2011), Volume 82853, DOI:10.1117/12.914400, October 01, 2011, Cairo, Egypt 
  4. Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan, “Taxonomy of C Overflow Vulnerabilities Attack”, Journal of Software Engineering and Computer Systems, Communications in Computer and Information Science Series, Vol 180, Springer Berlin Heidelberg, Proceedings of Second International Conference ICSECS 2011, pp 376-390, ISBN 978-3-642-22190-3, Kuantan, Pahang, Malaysia, June 27-29, 2011
2010
  1. Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan, “Preventing Exploitation on Software Vulnerabilities – Why Static Analysis Failed?”, Proceeding of World Engineering Conference (WEC 2010), Kuching, Sarawak, 2010
  2. The Taxonomy, Exploitation Techniques, and Preventive Measurement on Classical Exploitation of Software Vulnerabilities (abstract submitted to WEC 2010)
  3. Implementation of Trustworthiness in Hardening the Protection of Highly Confidential Information (abstract submitted to WEC 2010)

2009
  1. Fazli Mat Noor, Nurul Haszeli Ahmad, Mohd Haris Aziz, Arniyati Ahmad, “Simplified Cairngorm – Towards A Better Approach of Cairngorm”, Proceeding of MIMOS Symposium, 2009
  2. Nurul Haszeli Ahmad, Fazli Mat Nor, Mohd Haris Aziz, Arniyati Ahmad, “Towards Choosing A Suitable Flex Framework - A Comparative Study”, Proceeding of MIMOS Symposium, 2009
2008 
  1. Arniyati Ahmad, Nurul Haszeli Ahmad, Fazli Mat Nor, Mohd Haris Aziz, “Securing Project Management Dashboard Application”, Malaysia Educational Security Convention and Seminars (MyEduSec 2008), 17 – 18 August 2008, Grand Continental, Terengganu

About Me

Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography

Blog Archive

Blogger templates