Bahari Belaton, Professor Dato' Dr.
-
ProfessorEmail :
This email address is being protected from spambots. You need JavaScript enabled to view it. Tel : +604 653 4382/3647
Fax : +604 653 3335
Room : 618/704B
School of Computer Sciences, Universiti Sains Malaysia, 11800 USM. Pulau PinangResearch Cluster
Enabling Technologies And Infrastructures
-
Research InterestScientific Data Visualization, Network Security (IDS), Tractography
Specialization
Scientific Data Visualisation, Computer Graphics & Network Security
Qualifications
BAppSc. (Comp.Studies)South Australian Inst. of Technology, Australia (1989)
B.Sc.(Hons) Flinders University, Australia (1991)
PhD. Leeds University, U.K.(1995)
Interests
Network Security
Primary focus is on improving existing IDS/IPS solutions by enriching and enhancing alerts they produced with verifiable and quantifiable data quality metrics. Initial work in this area was the establishment of a model called Intrusion Alert Quality Framework (IAQF). It main purpose is to assist network and security engineers in making effective and efficient decisions about the security status of ICT assets under their control. With IAQF we have enriched the alerts generated by IDS/IPS with data quality metrics (alive-correctness, os-correctness, service-correctness, etc) and quantify them in term of score. These quality metrics are verified using contextual information (host’s profiles – os, patch level, application version, etc) from the network environment being monitored in an iterative fashion following a typical cycle of TDQM process. The verified and enriched alerts are finally encoded in the standard format (Intrusion Detection Message Exchange Format or IDMEF) widely used by IDS/IPS communities.
Data and Information Visualization
Main research interest is in the area of scientific data visualization. Initially our focus was in looking at ways of controlling mapping artifacts arising from various ad-hoc and ill-defined assumptions in existing data visualization tools. One possible solution is to treat data modeling function (interpolation and approximation) in the mapping techniques as a separate process, independent of the mapping process itself. Toward this end, an alternative model named as Model Centered Approach (MCA) has been proposed. Further research on MCA has extended it usage into internet-based visualization system. In this case, the compact representation of the modeling function has made it more useful for internet-based visualization – the model that will generate the data is send to the peer hosts, rather than the data themselves which are often huge in size.
Recent work concentrates on the development of algorithm to optimize 3D surface(s) reconstruction from a series contour’s slices. In this work we optimizes the reconstruction time while preserving the output at an acceptable level i.e. no clear surface artifacts likes holes. Good balances between reconstruction time and surface quality for a series of dataset have been reported by a Master thesis completed recently. We are now looking for a more thorough study on the slice reduction method, at the same time research on the reconstruction of surfaces from sparse contour slices is high in our research agenda.
Current work in this area is focusing on the extraction of feature lines known as crest-lines from 3D medical dataset. The aim is to use the extracted feature lines in detecting important landmarks on a craniofacial dataset. Automating this landmarks identification and placement is crucial to reduce the tedious and error-prone manual inspection. Feature lines based on crest points (also known as extremal points) are invariant to common transformation, and thus they are good for features registration and matching between objects.
Projects
[Fill your grants or projects]
Feature Lines Extraction and Enhancement For 3D Volumetric Data
Robust 3D Face Recognition From Single 2D images Individu
A Multi-Scale Approach for Estimating Gradient from Volumetric Data
Publications
2019
Elejla, O.E., Anbar, M., Belaton, B., Hamouda, S. Labeled flow-based dataset of ICMPv6-based DDoS attacks (2019) Neural Computing and Applications, 31 (8), pp. 3629-3646 DOI: 10.1007/s00521-017-3319-7
Joshua Thomas, J., Belaton, B., Khader, A.T., Justtina Visual Analytics Solution for Scheduling Processing Phases (2019) Advances in Intelligent Systems and Computing, 866, pp. 395-408 DOI: 10.1007/978-3-030-00979-3_42
Tan, J.S., Liao, I.Y., Venkat, I., Belaton, B., Jayaprakash, P.T. Computer-aided superimposition via reconstructing and matching 3D faces to 3D skulls for forensic craniofacial identifications (2019) Visual Computer, , pp. - DOI: 10.1007/s00371-019-01767-7
Elejla, O.E., Belaton, B., Anbar, M., Alabsi, B., Al-Ani, A.K. Comparison of classification algorithms on ICMPv6-based DDoS attacks detection (2019) Lecture Notes in Electrical Engineering, 481, pp. 347-357 DOI: 10.1007/978-981-13-2622-6_34
2018
Elejla, O.E., Anbar, M., Belaton, B., Alijla, B.O. Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection (2018) Arabian Journal for Science and Engineering, 43 (12), pp. 7757-7775 DOI: 10.1007/s13369-018-3149-7
Elejla, O.E., Belaton, B., Anbar, M., Alnajjar, A. Intrusion Detection Systems of ICMPv6-based DDoS attacks (2018) Neural Computing and Applications, 30 (1), pp. 45-56 DOI: 10.1007/s00521-016-2812-8
Zheng, P., Belaton, B., Liao, I.Y., Rajion, Z.A. A functional pipeline framework for landmark identification on 3D surface extracted from volumetric data (2017) PLoS ONE, 12 (11), pp. - DOI: 10.1371/journal.pone.0187558
2017
Elejla, O.E., Belaton, B., Anbar, M., Smadi, I.M. A New Set of Features for Detecting Router Advertisement Flooding Attacks (2017) Proceedings - 2017 Palestinian International Conference on Information and Communication Technology, PICICT 2017, , pp. 1-5 DOI: 10.1109/PICICT.2017.19
Elejla, O.E., Anbar, M., Belaton, B. ICMPv6-Based DoS and DDoS Attacks and Defense Mechanisms: Review (2017) IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 34 (4), pp. 390-407 DOI: 10.1080/02564602.2016.1192964
Elejla, O.E., Belaton, B., Anbar, M., Alijla, B.O. IPv6 OS fingerprinting methods: Review (2017) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10645 LNCS, pp. 661-668 DOI: 10.1007/978-3-319-70010-6_61
2016
Ruhaiyem, N.I.R., Mohamed, A.S.A., Belaton, B. Optimized Segmentation of Cellular Tomography through Organelles' Morphology and Image Features (2016) Journal of Telecommunication, Electronic and Computer Engineering, 8 (3), pp. 79-83 DOI:
2015
Chen, J., Liao, I.Y., Belaton, B., Zaman, M. Division-based large point set registration using coherent point drift (CPD) with automatic parameter tuning (2015) Journal of Intelligent and Fuzzy Systems, 28 (5), pp. 2297-2308 DOI: 10.3233/IFS-141513
Thomas, J.J., Khader, A.T., Belaton, B. SpaceViz: Visualization tool for the computer storage big-data (2015) Proceedings - 2015 IEEE International Conference on Smart City, SmartCity 2015, Held Jointly with 8th IEEE International Conference on Social Computing and Networking, SocialCom 2015, 5th IEEE International Conference on Sustainable Computing and Communications, SustainCom 2015, 2015 International Conference on Big Data Intelligence and Computing, DataCom 2015, 5th International Symposium on Cloud and Service Computing, SC2 2015, , pp. 882-885 DOI: 10.1109/SmartCity.2015.181
Tan, J.S., Venkat, I., Belaton, B. An analytical curvature B-spline algorithm for effective curve modeling (2015) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9429, pp. 283-295 DOI: 10.1007/978-3-319-25939-0_25
Maghari, A.Y.A., Liao, I.Y., Venkat, I., Belaton, B. Distance-based 3D face reconstruction using regularization (2015) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9429, pp. 476-493 DOI: 10.1007/978-3-319-25939-0_42
Chen, J., Zaman, M., Liao, I.Y., Belaton, B. Dbi-stage large point set registration using gaussian mixture models (2015) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9007, pp. 210-225 DOI: 10.1007/978-3-319-16814-2_14
2014
Chen, J., Belaton, B. An improved iterative closest point algorithm for rigid point registration (2014) Communications in Computer and Information Science, 481, pp. 255-263 DOI: 10.1007/978-3-662-45652-1_26
Maghari, A., Venkat, I., Liao, I.Y., Belaton, B. Adaptive face modelling for reconstructing 3D face shapes from single 2D images (2014) IET Computer Vision, 8 (5), pp. 441-454 DOI: 10.1049/iet-cvi.2013.0220
2013
Ghanem, W.A.H.M., Belaton, B. Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework (2013) Proceedings - 2013 IEEE International Conference on Control System, Computing and Engineering, ICCSCE 2013, , pp. 403-407 DOI: 10.1109/ICCSCE.2013.6719998
Chen, J., Belaton, B., Pan, Z. A robust subset-ICP method for point set registration (2013) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8237 LNCS, pp. 59-69 DOI: 10.1007/978-3-319-02958-0_6
Maghari, A.Y.A., Venkat, I., Liao, I.Y., Belaton, B. Reconstructing 3D face shapes from single 2D images using an adaptive deformation model (2013) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8237 LNCS, pp. 300-310 DOI: 10.1007/978-3-319-02958-0_28
Maghari, A.Y.A., Venkat, I., Liao, I.Y., Belaton, B. PCA-based reconstruction of 3D face shapes using tikhonov regularization (2013) International Journal of Advances in Soft Computing and its Applications, 5 (2), pp. - DOI:
Lim, C.Y., Khoo, V.K.T., Belaton, B. Verification mechanism for online responses in criteria prioritization (2013) Applied Mechanics and Materials, 275-277, pp. 2555-2559 DOI: 10.4028/www.scientific.net/AMM.275-277.2555
Zainon, W.M.N.W., Talib, A.Z., Belaton, B. Visualizing phylogenetic trees: Algorithms and visual comparison techniques (2013) Applied Mechanics and Materials, 241-244, pp. 2807-2811 DOI: 10.4028/www.scientific.net/AMM.241-244.2807
Chen, J., Liao, I.Y., Belaton, B., Zaman, M. A neural network-based point registration method for 3D rigid face image (2013) World Wide Web, 18 (2), pp. 197-214 DOI: 10.1007/s11280-013-0213-9
Maghari, A.Y.A., Venkat, I., Liao, I.Y., Belaton, B. Effect of training sample on reconstructing 3D face shapes from feature points (2013) Communications in Computer and Information Science, 409, pp. 131-140 DOI: 10.1007/978-3-319-03783-7_12
2012
Maghari, A.Y.A., Liao, I.Y., Belaton, B. Effect of facial feature points selection on 3D face shape reconstruction using regularization (2012) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7667 LNCS (PART 5), pp. 516-524 DOI: 10.1007/978-3-642-34500-5_61
Thomas, J.J., Khader, A.T., Belaton, B., Ken, C.C. Integrated problem solving steering framework on clash reconciliation strategies for university examination timetabling problem (2012) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7666 LNCS (PART 4), pp. 297-304 DOI: 10.1007/978-3-642-34478-7_37
Irani, A.A.Z., Belaton, B. An automated adaption of K-means based hybrid segmentation system into direct volume rendering object distinction mode for enhanced visualization effect (2012) CGiV 2012 - 2012 9th International Conference on Computer Graphics, Imaging and Visualization, , pp. 62-69 DOI: 10.1109/CGIV.2012.14
Maghari, A.Y.A., Liao, I.Y., Belaton, B. Quantitative analysis on PCA-based statistical 3D face shape modeling (2012) Computational Modelling of Objects Represented in Images: Fundamentals, Methods and Applications III - Proceedings of the International Symposium, CompIMAGE 2012, , pp. 13-18 DOI:
Lim, C.Y., Khoo, V.K.T., Belaton, B. A methodology for deliberating prediction criteria (2012) Applied Mechanics and Materials, 130-134, pp. 1758-1761 DOI: 10.4028/www.scientific.net/AMM.130-134.1758
2011
Joshua Thomas, J., Khader, A.T., Belaton, B. A practical rough sets analysis in real-world examination timetabling problem instances (2011) Communications in Computer and Information Science, 157 CCIS, pp. 21-30 DOI: 10.1007/978-3-642-22786-8_3
Thomas, J.J., Khader, A.T., Belaton, B. A parallel coordinates visualization for the uncapaciated examination timetabling problem (2011) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7066 LNCS (PART 1), pp. 87-98 DOI: 10.1007/978-3-642-25191-7_10
Wan Zainon, W.M.N., Talib, A.Z., Belaton, B. A new framework for phylogenetic tree visualization (2011) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7067 LNCS (PART 2), pp. 348-359 DOI: 10.1007/978-3-642-25200-6_33
Zheng, P., Belaton, B., Liao, I.Y., Rajion, Z.A. The gradient of the maximal curvature estimation for crest lines extraction (2011) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7066 LNCS (PART 1), pp. 196-205 DOI: 10.1007/978-3-642-25191-7_19
Zheng, P., Belaton, B., Liao, I.Y., Rajion, Z.A. Finite difference error analysis of geometry properties of implicit surfaces (2011) ISCI 2011 - 2011 IEEE Symposium on Computers and Informatics, , pp. 413-418 DOI: 10.1109/ISCI.2011.5958951
Thomas, J.J., Tajudin Khader, A., Belaton, B., Leow, A. Exploration of rough sets analysis in real-world examination timetabling problem instances (2011) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6729 LNCS (PART 2), pp. 173-182 DOI: 10.1007/978-3-642-21524-7_21
2010
Zainon, W.M.N.W., Talib, A.Z., Belaton, B. Display-based approaches for phylogenetic tree visualisation (2010) 2010 International Conference on Distributed Frameworks for Multimedia Applications, DFmA 2010, , pp. - DOI:
Thomas, J.J., Khader, A.T., Al-Betar, M., Belaton, B. The perception of interaction on the university examination timetabling problem (2010) PATAT 2010 - Proceedings of the 8th International Conference on the Practice and Theory of Automated Timetabling, , pp. 392-416 DOI:
San, T.J., Liao, I.Y., Zheng, P., Belaton, B. Skull registration with modified inverse chord length and Rigid Super-Curves incorporated with scaling (2010) Proc. of the IADIS Int. Conf. - Computer Graphics, Visualization, Computer Vision and Image Processing, CGVCVIP 2010, Visual Commun., VC 2010, Web3DW 2010, Part of the MCCSIS 2010, , pp. 133-140 DOI:
Thomas, J.J., Tajudin Khader, A., Belaton, B., Christy, E. Visual interface tools to solve real-world examination timetabling problem (2010) Proceedings - 2010 7th International Conference on Computer Graphics, Imaging and Visualization, CGIV 2010, , pp. 167-172 DOI: 10.1109/CGIV.2010.36
Etemadpour, R., Masood, M., Belaton, B. Information visualization and proposing new interface for movie retrieval system (IMDB (2010) Turkish Online Journal of Distance Education, 11 (3), pp. 162-172 DOI:
2009
Choo Sheong, D., Belaton, B. Estimating extremal planes to extract crest lines from volumetric data (2009) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5857 LNCS, pp. 748-758 DOI: 10.1007/978-3-642-05036-7_71
Irani, A.A.Z., Belaton, B. A K-means based generic segmentation system (2009) Proceedings of the 2009 6th International Conference on Computer Graphics, Imaging and Visualization: New Advances and Trends, CGIV2009, , pp. 300-307 DOI: 10.1109/CGIV.2009.8
Liao, I.Y., Zheng, P., Belaton, B. Skull registration using rigid super-curves (2009) Proceedings of the 2009 6th International Conference on Computer Graphics, Imaging and Visualization: New Advances and Trends, CGIV2009, , pp. 475-479 DOI: 10.1109/CGIV.2009.62
Joshua Thomas, J., Khader, A.T., Belaton, B. Visualization techniques on the examination timetabling pre-processing data (2009) Proceedings of the 2009 6th International Conference on Computer Graphics, Imaging and Visualization: New Advances and Trends, CGIV2009, , pp. 454-458 DOI: 10.1109/CGIV.2009.23
Thomas, J.J., Khader, A.T., Belaton, B. Visualization of preprocess data in the examination timetabling problem (2009) 2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009, 3, pp. 264-268 DOI: 10.1109/CSIE.2009.920
Ab Karim, M.B., Talib, A.Z., Ismail, A.I., Belaton, B. A crowd model for emergency and panic situations: Structure, characteristics and behaviours (2009) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4078 LNAI, pp. 178-191 DOI: 10.1007/978-3-642-03339-1_15
Zheng, P., Belaton, B., Liao, I.Y. Isosurface extraction of volumetric data using implicit surface polygonization (2009) Proceedings - 2009 3rd Asia International Conference on Modelling and Simulation, AMS 2009, , pp. 555-559 DOI: 10.1109/AMS.2009.45
2008
Thomas, J.J., Khader, A.T., Belaton, B. A visual analytics framework for the examination timetabling problem (2008) Proceedings - Computer Graphics, Imaging and Visualisation, Modern Techniques and Applications, CGIV, , pp. 305-310 DOI: 10.1109/CGIV.2008.16
2006
Ling, T.S., Belaton, B. Investigating slice reduction step for fast surface reconstruction (2006) 2006 International Conference on Computing and Informatics, ICOCI '06, , pp. - DOI: 10.1109/ICOCI.2006.5276580
Zakaria, N., Belaton, B., Talib, A.Z.H. Simple and fast ray tracing of point-based geometry (2006) GRAPP 2006 - Proceedings of the 1st International Conference on Computer Graphics Theory and Applications, , pp. 293-298 DOI:
2005
Nizamani, A.B., Belaton, B. TCP attack analysis on packets captured using symantec decoy server (2005) Proceedings of 1st International Conference on Information and Communication Technology, ICICT 2005, 2005, pp. 249-254 DOI: 10.1109/ICICT.2005.1598595
Bakar, N.A., Belaton, B. Towards implementing intrusion alert quality framework (2005) Proceedings - First International Conference on Distributed Frameworks for Multimedia Applications 2005, DFMA '05, 2005, pp. 198-205 DOI: 10.1109/DFMA.2005.49
Joseph, L.T.A., Samsudin, A., Belaton, B. Efficient search on encrypted data (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 1, pp. 352-357 DOI: 10.1109/ICON.2005.1635501
Ho, Y.L., Samsudin, A., Belaton, B. Heuristic cryptanalysis of classical and modern ciphers (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 2, pp. 710-715 DOI: 10.1109/ICON.2005.1635595
Bakar, N.A., Belaton, B., Samsudin, A. False positives reduction via intrusion alert quality framework (2005) 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings, 1, pp. 547-552 DOI: 10.1109/ICON.2005.1635545
2004
Karim, M.B.A., Talib, A.Z., Ismail, A.I., Belaton, B. A virtual human model for emergency and panic situations (2004) Proceedings of the Fourth IASTED International Conference on Visualization, Imaging, and Image Processing, , pp. 391-395 DOI:
Supervision
[Fill your graduates supervisions]
Teaching
[Fill your teaching subjects]
Recognition & Leadership
[Fill your recognitions, e.g. examiners, editorial boards etc.]
Consultancy
[Fill your consultation works]
- Hits: 5750