Aman Jantan, Associate Professor Dr.

  • tiada 


  • Associate Professor

    Email : This email address is being protected from spambots. You need JavaScript enabled to view it.

    Tel : +604 653 4642
    Fax : +604 653 3335
    Room : 729

    School of Computer Sciences, Universiti Sains Malaysia, 11800 USM, Pulau Pinang

    Research Cluster

    Enabling Technologies And Infrastructures



  • Research Interest

    Software Engineering, ICT Securities

    Specialization

    Artificial Intelligence, Computer & Network Security, E-Commerce/Web Intelligence, Compilers Design & Development Techniques


Qualifications

BCompSc. (Hons) Universiti Sains Malaysia

MSc. Universiti Sains Malaysia

PhD. Universiti Sains Malaysia 

 

Interests

Software Engineering

Encompasses research and development of application in many subfields such as software project management, software requirements engineering, design and architectures, software testing, software metrics as well as quality assurance, and software maintenance/evolution. The focuses are mainly on the methodologies of software engineering such as object-oriented software engineering, component-based software engineering, web system engineering, security system engineering (or/as well as secure system development), the critical and legacy systems, extreme programming and reverse engineering.The application of web engineering concept as well as secure system leads to the research on e-Commerce and e-Business, which focused mainly on the security as well as the framework such as the enterprise system, supply chain management, and customer-relationship systems. For software testing, the research focuses on the methodologies as well as techniques such as black-box testing, white-box testing, and so forth.

ICT Securities 

Research on the computer and network security fields such as intrusion detection system with artificial intelligence capabilities, firewall systems, malwares (such virus and anti-virus, rootkit, and worms), cryptography systems, secure system development, and web system securities. The current focuses of research are on the electronic forensic system techniques and application development, network penetration testing and countermeasures, cyber warfare in general, and RFID securities. 

 

Projects

[Fill your grants or other projects]

Forensic Tool for Cyber Investigation (EMFORCI)

A Forensic-Based Detection System To Deal with Digital Evidences From Network

Malware Behavioral Analysis For Better Identification and Classification

Malware Analysis and Prediction System (MAPS)

A Cyber Defense System By Using Honeybee Concepts And Strategies

Content-based Analysis Framework for Better E-Mail Forensic and Cybercrime Investigation

 

Publications

2020

Arshad, H., Jantan, A., Hoon, G.K., Abiodun, I.O. Formal knowledge model for online social network forensics (2020) Computers and Security, 89, art. no. 101675, . DOI: 10.1016/j.cose.2019.101675

2019 

Omolara, A.E., Jantan, A. Modified honey encryption scheme for encoding natural language message (2019) International Journal of Electrical and Computer Engineering, 9 (3), pp. 1871-1878. DOI: 10.11591/ijece.v9i3.pp1871-1878

Arshad, H., Jantan, A., Hoon, G.K., Butt, A.S. A multilayered semantic framework for integrated forensic acquisition on social media (2019) Digital Investigation, 29, pp. 147-158. DOI: 10.1016/j.diin.2019.04.002

Omolara, A.E., Jantan, A., Abiodun, O.I., Arshad, H., Mohamed, N.A. Fingereye: Improvising security and optimizing ATM transaction time based on iris-scan authentication
(2019) International Journal of Electrical and Computer Engineering, 9 (3), pp. 1879-1886. DOI: 10.11591/ijece.v9i3.pp1879-1886

Arshad, H., Jantan, A., Omolara, E. Evidence collection and forensics on social networks: Research challenges and directions (2019) Digital Investigation, 28, pp. 126-138. DOI: 10.1016/j.diin.2019.02.001

Omolara, A.E., Jantan, A., Abiodun, O.I. A comprehensive review of honey encryption scheme (2019) Indonesian Journal of Electrical Engineering and Computer Science, 13 (2), pp. 649-656. DOI: 10.11591/ijeecs.v13.i2.pp649-656

Ghanem, W.A.H.M., Jantan, A. An enhanced Bat algorithm with mutation operator for numerical optimization problems (2019) Neural Computing and Applications, 31, pp. 617-651. DOI: 10.1007/s00521-017-3021-9

Ghanem, W.A.H.M., Jantan, A. A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm (2019) Neural Computing and Applications, . DOI: 10.1007/s00521-019-04655-2

Ghanem, W.A.H.M., Jantan, A. Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization
(2019) Neural Processing Letters, . DOI: 10.1007/s11063-019-10120-x

2018

Ghanem, W.A.H.M., Jantan, A. A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons (2018) Cognitive Computation, 10 (6), pp. 1096-1134. DOI: 10.1007/s12559-018-9588-3

Abiodun, O.I., Jantan, A., Omolara, A.E., Dada, K.V., Mohamed, N.A., Arshad, H. State-of-the-art in artificial neural network applications: A survey (2018) Heliyon, 4 (11), art. no. e00938, . DOI: 10.1016/j.heliyon.2018.e00938

Ghanem, W.A.H.M., Jantan, A. Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems (2018) Neural Computing and Applications, 30 (1), pp. 163-181. DOI: 10.1007/s00521-016-2665-1

Abiodun, O.I., Jantan, A., Singh, M.M., Anbar, M., Zaaba, Z.F., Oludare Abiodun, O.E. Forensic dna profiling for identifying an individual crime (2018) International Journal of Civil Engineering and Technology, 9 (7), pp. 755-765. 

Ghanem, W.A.H.M., Jantan, A. New approach to improve anomaly detection using a neural network optimized by hybrid ABC and PSO algorithms (2018) Pakistan Journal of Statistics, 34 (1), pp. 1-14. 

Mohamed, N.A.E., Jantan, A., Omolara, A.E. Mitigation of cyber terrorism at ATMs, and using DNA, fingerprint, mobile banking app to withdraw cash (Connected with IoT) (2018) International Journal of Engineering Research and Technology, 11 (6), pp. 845-852. 

Arshad, H., Jantan, A.B., Abiodun, O.I. Digital forensics: Review of issues in scientific validation of digital evidence (2018) Journal of Information Processing Systems, 14 (2), pp. 346-376. DOI: 10.3745/JIPS.03.0095

AbdElatif Mohamed, N., Jantan, A., Abiodun, O.I. An improved behaviour specification to stop advanced persistent threat on governments and organizations network (2018) Lecture Notes in Engineering and Computer Science, 2233, pp. 219-224. 

Mohamed, N.A., Jantan, A., Abiodun, O.I. Protect governments, and organizations infrastructure against cyber terrorism (mitigation and stop of server message block (SMB) remote code execution attack) (2018) International Journal of Engineering Research and Technology, 11 (2), pp. 261-272. 

Omolara, A.E., Jantan, A., Abiodun, O.I., Poston, H.E. A novel approach for the adaptation of honey encryption to support natural language message (2018) Lecture Notes in Engineering and Computer Science, 2233, pp. 134-139. 

Omolara, A.E., Jantan, A., Abiodun, O.I., Arshad, H. An enhanced practical difficulty of one-time pad algorithm resolving the key management and distribution problem (2018) Lecture Notes in Engineering and Computer Science, 2233, pp. 409-415. 

Abiodun, O.I., Jantan, A., Omolara, A.E., Singh, M.M.M., Abubakar, Z.L., Umar, A.M. Big data: An approach for detecting terrorist activities with people's profiling (2018) Lecture Notes in Engineering and Computer Science, 2233, pp. 196-201. 

2017

Jantan, A., Ghanem, W.A.H.M., Ghaleb, S.A.A. Using modified bat algorithm to train neural networks for spam detection (2017) Journal of Theoretical and Applied Information Technology, 95 (24), pp. 6788-6799. 

Ghanem, W.A.H.M., Jantan, A. A novel hybrid artificial bee colony with monarch butterfly optimization for global optimization problems (2017) COMPSE 2016 - 1st EAI International Conference on Computer Science and Engineering, . 

Ghanem, W.A.H.M., Jantan, A. Hybridizing bat algorithm with modified pitch-adjustment operator for numerical optimization problemsHybridizing bat algorithm with modified pitch-adjustment operator for numerical optimization problems (2017) COMPSE 2016 - 1st EAI International Conference on Computer Science and Engineering, . 

2016

Ahmed, A.A., Jantan, A., Wan, T.-C. Filtration model for the detection of malicious traffic in large-scale networks (2016) Computer Communications, 82, pp. 59-70. DOI: 10.1016/j.comcom.2015.10.012

Ghanem, W.A.H.M., Jantan, A. Novel multi-objective artificial bee colony optimization for wrapper based feature selection in intruction detectoin (2016) International Journal of Advances in Soft Computing and its Applications, 8 (1), pp. 70-81. 

2014

Ghanem, W.A.H.M., Jantan, A. Swarm intelligence and neural network for data classification (2014) Proceedings - 4th IEEE International Conference on Control System, Computing and Engineering, ICCSCE 2014, art. no. 7072714, pp. 196-201. DOI: 10.1109/ICCSCE.2014.7072714

Ghanem, W.A.H.M., Jantan, A. Using hybrid artificial bee colony algorithm and particle swarm optimization for training feed-forward neural networks (2014) Journal of Theoretical and Applied Information Technology, 67 (3), pp. 664-674. 

Jantan, A., Ahmed, A.A. Honeybee protection system for detecting and preventing network attacks (2014) Journal of Theoretical and Applied Information Technology, 64 (1), pp. 38-47. 

Elejla, O.E., Jantan, A.B., Ahmed, A.A. Three layers approach for network scanning detection (2014) Journal of Theoretical and Applied Information Technology, 70 (2), pp. 251-264. 

2013

Ahmed, A.A., Jantan, A., Wan, T.-C. Real-time detection of intrusive traffic in QoS network domains (2013) IEEE Security and Privacy, 11 (6), art. no. 6515471, pp. 45-53. DOI: 10.1109/MSP.2013.52

Ahmed, A.A., Jantan, A., Rasmi, M. Service violation monitoring model for detecting and tracing bandwidth abuse (2013) Journal of Network and Systems Management, 21 (2), pp. 218-237. DOI: 10.1007/s10922-012-9236-2

Saari, E., Jantan, A. E-Cyborg: The cybercrime evidence finder (2013) 2013 8th International Conference on Information Technology in Asia - Smart Devices Trend: Technologising Future Lifestyle, Proceedings of CITA 2013, art. no. 6637579, . DOI: 10.1109/CITA.2013.6637579

2012

Jantan, A., Rasmi, M., Ibrahim, M.I., Rahman, A.H.A. A similarity model to estimate attack strategy based on intentions analysis for network forensics (2012) Communications in Computer and Information Science, 335 CCIS, pp. 336-346. DOI: 10.1007/978-3-642-34135-9_34

Kareem, E.I.A., Alsalihy, W.A.H.A., Jantan, A. Multi-connect architecture (MCA) associative memory: A modified hopfield neural network (2012) Intelligent Automation and Soft Computing, 18 (3), pp. 279-296. DOI: 10.1080/10798587.2008.10643243

2011

Kareem, E.I.A., Jantan, A. An intelligent traffic light monitor system using an adaptive associative memory (2011) International Journal of Information Processing and Management, 2 (2), pp. 23-39. DOI: 10.4156/ijipm.vol2.issue2.4

Zolkipli, M.F., Jantan, A. An approach for identifying malware operation and target using run time analysis and resource monitoring (2011) International Journal of Digital Content Technology and its Applications, 5 (8), pp. 169-178. DOI: 10.4156/jdcta.vol5.issue8.19

Rasmi, M., Jantan, A. AIA: Attack intention analysis algorithm based on D-S theory with causal technique for network forensics - A case study (2011) International Journal of Digital Content Technology and its Applications, 5 (9), pp. 230-237. DOI: 10.4156/jdcta.vol5.issue9.25

Ahmed, A.A., Jantan, A., Wan, T.-C. SLA-based complementary approach for network intrusion detection (2011) Computer Communications, 34 (14), pp. 1738-1749. DOI: 10.1016/j.comcom.2011.03.013

Zolkipli, M.F., Jantan, A. A framework for defining malware behavior using run time analysis and resource monitoring (2011) Communications in Computer and Information Science, 179 CCIS (PART 1), pp. 199-209. DOI: 10.1007/978-3-642-22170-5_18

Saari, E., Jantan, A. F-IDS: A technique for simplifying evidence collection in network forensics (2011) Communications in Computer and Information Science, 181 CCIS (PART 3), pp. 693-701. DOI: 10.1007/978-3-642-22203-0_58

Ali, G.A., Jantan, A. A new approach based on honeybee to improve intrusion detection system using neural network and bees algorithm (2011) Communications in Computer and Information Science, 181 CCIS (PART 3), pp. 777-792. DOI: 10.1007/978-3-642-22203-0_65

Ibrahim, Mohd.I., Jantan, A. A secure storage model to preserve evidence in network forensics (2011) Communications in Computer and Information Science, 180 CCIS (PART 2), pp. 391-402. DOI: 10.1007/978-3-642-22191-0_34

Yusoff, Mohd.N., Jantan, A. A framework for optimizing malware classification by using genetic algorithm (2011) Communications in Computer and Information Science, 180 CCIS (PART 2), pp. 58-72. DOI: 10.1007/978-3-642-22191-0_5

Rasmi, M., Jantan, A. Attack intention analysis model for network forensics (2011) Communications in Computer and Information Science, 180 CCIS (PART 2), pp. 403-411. DOI: 10.1007/978-3-642-22191-0_35

Zolkipli, M.F., Jantan, A. An approach for malware behavior identification and classification (2011) ICCRD2011 - 2011 3rd International Conference on Computer Research and Development, 1, art. no. 5764001, pp. 191-194. DOI: 10.1109/ICCRD.2011.5764001

2010

Zolkipli, M.F., Jantan, A. Malware behavior analysis: Learning and understanding current malware threats (2010) Proceedings - 2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010, art. no. 5635801, pp. 218-221. DOI: 10.1109/NETAPPS.2010.46

Zolkipli, M.F., Jantan, A. A framework for malware detection using combination technique and signature generation (2010) 2nd International Conference on Computer Research and Development, ICCRD 2010, art. no. 5489509, pp. 196-199. DOI: 10.1109/ICCRD.2010.25

Ahmed, A.A., Jantan, A., Ali, G.A. A potent model for unwanted traffic detection in QoS network domain (2010) International Journal of Digital Content Technology and its Applications, 4 (2), pp. 122-130. DOI: 10.4156/jdcta.vol4.issue2.14

2009

Ali, G.A., Jantan, A., Ali, A. Honeybee-based model to detect intrusion (2009) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5576 LNCS, pp. 598-607. DOI: 10.1007/978-3-642-02617-1_61

Zare-Mirakabad, M.-R., Jantan, A., Bressan, S. Clustering-based frequency l-diversity anonymization (2009) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5576 LNCS, pp. 159-168. DOI: 10.1007/978-3-642-02617-1_17

Zare-Mirakabad, M.-R., Jantan, A., Bressan, S. Privacy risk diagnosis: Mining l-diversity (2009) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5667 LNCS, pp. 216-230. DOI: 10.1007/978-3-642-04205-8_19

Mirakabad, M.R.Z., Jantan, A., Bressan, S. K-anonymity diagnosis centre (2009) International Journal of Security and its Applications, 3 (1), pp. 47-64. 

2008

Mirakabad, M.R.Z., Jantan, A. Diversity versus anonymity for privacy preservation (2008) Proceedings - International Symposium on Information Technology 2008, ITSim, 4, art. no. 4632044, . DOI: 10.1109/ITSIM.2008.4632044

Jazzar, M., Jantan, A. Towards real-time intrusion detection using fuzzy cognitive maps modeling and simulation (2008) Proceedings - International Symposium on Information Technology 2008, ITSim, 2, art. no. 4631676, . DOI: 10.1109/ITSIM.2008.4631676

Alhazbi, S., Jantan, A. Safe runtime reconfiguration in component-based software systems (2008) Proceedings of the 2008 International Conference on Software Engineering Research and Practice, SERP 2008, pp. 122-126.

Mirakabad, M.R.Z., Jantan, A., Bressan, S. Towards a privacy diagnosis centre: Measuring k-anonymity (2008) Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008, art. no. 4654069, pp. 102-107. DOI: 10.1109/CSA.2008.44

Jazzar, M., Jantan, A. An approach for anomaly intrusion detection based on causal knowledge-driven diagnosis and direction (2008) Studies in Computational Intelligence, 149, pp. 39-48. DOI: 10.1007/978-3-540-70560-4_4

Jazzar, M., Jantan, A.B. Using fuzzy cognitive maps to reduce false alerts in SOM-based intrusion detection sensors (2008) Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008, art. no. 4530625, pp. 1054-1060. DOI: 10.1109/AMS.2008.32

2006

Alhazbi, S., Jantan, A. Multi-level mediator-based technique for classes hot swapping in Java applications (2006) Proceedings - 2006 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2006, 2, art. no. 1684871, pp. 2889-2892. DOI: 10.1109/ICTTA.2006.1684871

Supervision

[Fill your graduates supervisions]

Teaching

[Fill your teaching subjects]

Recognition & Leadership

[Fill your recognitions, e.g. examiners, editorial boards etc.]

Consultancy

[Fill your consultation works]