Publications

Below are some of my publications from 2009 till date.

 

N. Pius Owoh.; M. Mahinderjit Singh; SenseCrypt: A Security Framework for Mobile Crowd Sensing Applications. Sensors 202020, 3280. https://doi.org/10.3390/s20113280


Z. Zulkefli, M.Mahinderjit Singh, Sentient-based Access Control model: A mitigation technique for Advanced Persistent Threats in Smartphones, Journal of Information Security and Applications, Volume 51,102431, ISSN 2214 2126. https://doi.org/10.1016/j.jisa.2019.102431.


R.Khanna, M.Mahinderjit Singh,  F. Damanhoori, N. Mustafa. Investigating the Importance of Implementing Ethical Value on a Healthcare System within a Social Media context. 2020.International Journal of Innovation, Creativity and Change


N. Baharom, M. Mahinderjit Singh, Authentication and Authorization Model for Safeguarding Mission-Critical Applications in Pervasive Environment, International Journal of Advanced Trends in Computer Science and Engineering. Vol 9, No1.1., 2020. https://doi.org/10.30534/ijatcse/2020/5191.12020


Y.S Chow, W.S.Ting, M. Mahinderjit Singh, M.N Ab Wahab, Ambient Sensors Fusion Smart Home, Test Engineering & Management, Volume 82, 2020. pp 12001-12009.

Pius Owoh, M. Mahinderjit SinghApplying Diffie-Hellman Algorithm to Solve the Key Agreement Problem in Mobile Blockchain-based Sensing Applications, International Journal of Advanced Computer Science and Applications (IJACSA), 10(3), 2019. http://dx.doi.org/10.14569/IJACSA.2019.0100308.


Mahinderjit Singh. M, Wern Shen. L, Anbar. M. Conceptualizing Distrust Model with Balance Theory and Multi-Faceted Model for Mitigating False Reviews in Location-Based Services (LBS). Symmetry 2019, 11, 1118. https://doi.org/10.3390/sym11091118


Singh, M.M., Lim, Y., Manaf, A. Smart home using microelectromechanical systems (MEMS) sensor and ambient intelligences (SAHOMASI) (2019) Lecture Notes in Electrical Engineering, 481, pp. 557-567. DOI: 10.1007/978-981-13-2622-6_54


Chuan, B.L.J., Singh, M.M., Shariff, A.R.M. APTGuard: Advanced persistent threat (APT) detections and predictions using android smartphone (2019) Lecture Notes in Electrical Engineering, 481, pp. 545-555. DOI: 10.1007/978-981-13-2622-6_53


Al Ashhab, Z.R., Anbar, M., Singh, M.M., Alieyan, K., Ghazaleh, W.I.A. Detection of http flooding ddos attack using hadoop with mapreduce: a survey (2019) International Journal of Advanced Trends in Computer Science and Engineering, 8 (1), pp. 71-77. DOI: 10.30534/ijatcse/2019/12812019

Amran, A., Zaaba, Z.F., Mahinderjit Singh, M.K. Habituation effects in computer security warning (2018) Information Security Journal, 27 (4), pp. 192-204. DOI: 10.1080/19393555.2018.1505008


Pius Owoh, N., Mahinderjit Singh, M., Zaaba, Z.F. Automatic annotation of unlabeled data from smartphone-based motion and location sensors (2018) Sensors (Switzerland), 18 (7), pp. -. DOI: 10.3390/s18072134


Abiodun, O.I., Jantan, A., Singh, M.M., Anbar, M., Zaaba, Z.F., Oludare Abiodun, O.E. Forensic dna profiling for identifying an individual crime (2018) International Journal of Civil Engineering and Technology, 9 (7), pp. 755-765. DOI:


Amran, A., Zaaba, Z.F., Mahinderjit Singh, M.K. Habituation effects in computer security warning (2018) Information Security Journal, , pp. 1-13. DOI: 10.1080/19393555.2018.1448492


Owoh, N.P., Mahinderjit Singh, M. Security analysis of mobile crowd sensing applications (2018) Applied Computing and Informatics, , pp. -. DOI: 10.1016/j.aci.2018.10.002


Mahinderjit Singh, M., Ching, K.W., Abd Manaf, A. A novel out-of-band biometrics authentication scheme for wearable devices (2018) International Journal of Computers and Applications, , pp. -. DOI: 10.1080/1206212X.2018.1547347


Mohammed, S.M.Z., Shariff, A.R.M., Singh, M.M. An Authentication Technique: Behavioral Data Profiling on Smart Phones (2018) Lecture Notes in Electrical Engineering, 488, pp. 88-98. DOI: 10.1007/978-981-10-8276-4_9


Hassan, R., Mahinderjit-Singh, M., Hassan, H., Yuhaniz, S.S. Online Islamic business enhancer tool (OIBET) for young entrepreneurs (2018) Proceedings of the 31st International Business Information Management Association Conference, IBIMA 2018: Innovation Management and Education Excellence through Vision 2020, , pp. 687-701. DOI:


Mun, S.P., Husin, M.H., Singh, M.M., Malim, N.H.A.H. N-LibSys: Library system using NFC technology (2018) Lecture Notes in Electrical Engineering, 425, pp. 22-30. DOI: 10.1007/978-981-10-5281-1_3



Shien, L.K., Singh, M.M. A secure mobile crowdsensing (MCS) location tracker for elderly in smart city (2017) AIP Conference Proceedings, 1891, pp. -. DOI: 10.1063/1.5005418


Wei, K.C., Singh, M.M., Osman, H.M.B. Near Field Communication Interactive Learning System (NILES) for Blended Learning: A Pervasive Social Networking Services (2017) Proceedings – 2017 Palestinian International Conference on Information and Communication Technology, PICICT 2017, , pp. 71-77. DOI: 10.1109/PICICT.2017.29


Samsudin, N.F., Zaaba, Z.F., Singh, M.M. Further investigation on security warnings implementation: A case in higher institution (2017) Advanced Science Letters, 23 (5), pp. 4141-4145. DOI: 10.1166/asl.2017.8293


Ching, K.W., Singh, M.M., Zaaba, Z.F. Human activity recognition (HAR) for wearable sensors with classification techniques (2017) Advanced Science Letters, 23 (5), pp. 4206-4210. DOI: 10.1166/asl.2017.8300


Radzi, S.F.M., Abidin, S.S.Z., Aziz, A.A., Damandhoori, F.S.H., Singh, M.M. Breast cancer cells predictions with classification algorithms (2017) Advanced Science Letters, 23 (5), pp. 4331-4335. DOI: 10.1166/asl.2017.8316


Yeong, B.C., Malim, N.H.A.H., Singh, M.M. NFC-based waste management tracking and monitoring system (2017) ACM International Conference Proceeding Series, , pp. -. DOI: 10.1145/3018896.3025134


Ching, L.L., Malim, N.H.A.H., Husin, M.H., Singh, M.M. Smart university: Reservation system with contactless technology (2017) ACM International Conference Proceeding Series, , pp. -. DOI: 10.1145/3018896.3018903


Singh, M.M., Teo, Y.C. Enhanced action based trust model: A multi-facet model for social media (2017) Transactions on Engineering Technologies: World Congress on Engineering and Computer Science 2015, , pp. 411-423. DOI: 10.1007/978-981-10-2717-8_29


Ragunatha Nadarajah, V., Singh, M.M. Privacy-by-design(PBD) IoT framework: A case of location privacy mitigation strategies for near field communication (NFC) tag sensor (2017) Advances in Science, Technology and Engineering Systems, 2 (1), pp. 134-148. DOI: 10.25046/aj020116


Patric, I.A., Singh, M.M. Context-aware security policies: Model for anti-counterfeiting in RFID-enabled Supply Chain Management (SCM) (2017) Journal of Engineering and Applied Sciences, 12 (3), pp. 722-733. DOI:


Kit, J.L.W., Singh, M.M., Malim, N.H.A.H. Ambient intelligence smart home automation (AMISHA) system (2017) Advanced Science Letters, 23 (6), pp. 5073-5077. DOI: 10.1166/asl.2017.7312


Zulkefli, Z., Singh, M.M., Mohd Shariff, A.R., Samsudin, A. Typosquat Cyber Crime Attack Detection via Smartphone (2017) Procedia Computer Science, 124, pp. 664-671. DOI: 10.1016/j.procs.2017.12.203


Amran, A., Zaaba, Z.F., Singh, M.M., Marashdih, A.W. Usable Security: Revealing End-Users Comprehensions on Security Warnings (2017) Procedia Computer Science, 124, pp. 624-631. DOI: 10.1016/j.procs.2017.12.198


Ismail, K.A., Singh, M.M., Mustaffa, N., Keikhosrokiani, P., Zulkefli, Z. Security Strategies for Hindering Watering Hole Cyber Crime Attack (2017) Procedia Computer Science, 124, pp. 656-663. DOI: 10.1016/j.procs.2017.12.202


Singh, M.M., Ng, P.J., Yap, K.M., Husin, M.H., Malim, N.H.A.H. Cyberbullying and a mobile game app? An initial perspective on an alternative solution (2017) Journal of Information Processing Systems, 13 (3), pp. 559-572. DOI: 10.3745/JIPS.04.0033

Wen, K.S., Singh, M.M. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor (2016) IOP Conference Series: Materials Science and Engineering, 160 (1), pp. -. DOI: 10.1088/1757-899X/160/1/012091


Hassan, R., Marimuthu, M., Mahinderjit-Singh, M. Application of Six-Sigma for process improvement in manufacturing industries: A case study (2016) International Business Management, 10 (5), pp. 676-691. DOI: 10.3923/ibm.2016.676.691

Wai Soon, S., Wei, L.T., Mahinderjit Singh, M., Husin, M.H. INdoor-OuTdoor Elderly CAring SystEm (NOTECASE) (2015) 2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 – Proceeding, , pp. 136-141. DOI: 10.1109/ISTMET.2015.7359017


Rostam, N.A., Zulkiffli, N.F., Ghazali, N.H., Ahamed Hassain Malim, N.H., Mahinderjit Singh, M., Husin, M.H. The acceptance study of NFC technology: A survey of models and user acceptance (2015) 2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 – Proceeding, , pp. 53-57. DOI: 10.1109/ISTMET.2015.7359000


Chin, T.Y., Singh, M.M. Multi-facet trust factors ranking with correlation analysis technique: A case study on Online Social Network (OSN) (2015) Proceedings of the 26th International Business Information Management Association Conference – Innovation Management and Sustainable Economic Competitive Advantage: From Regional Development to Global Growth, IBIMA 2015, , pp. 1812-1822. DOI:


Zhi, M., Singh, M.M. Rfid-enabled smart attendance management system (2015) Lecture Notes in Electrical Engineering, 329, pp. 213-231. DOI: 10.1007/978-94-017-9558-6_26


Almazrooie, M., Samsudin, A., Singh, M.M. Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map (2015) Journal of Information Processing Systems, 11 (2), pp. 310-324. DOI: 10.3745/JIPS.02.0024


Bann, L.L., Singh, M.M., Samsudin, A. Trusted Security Policies for Tackling Advanced Persistent Threat via Spear Phishing in BYOD Environment (2015) Procedia Computer Science, 72, pp. 129-136. DOI: 10.1016/j.procs.2015.12.113


Mohammed, S.M.Z., Mohd, A.R., Singh, M.M. A Secure Mobile App Solution Using Human Behavioral Context and Analytic Hierarchy Process (2015) Procedia Computer Science, 72, pp. 434-445. DOI: 10.1016/j.procs.2015.12.124


Zulkefli, Z., Singh, M.M., Malim, N.H.A.H. Advanced persistent threat mitigation using multi level security – access control framework (2015) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9158, pp. 90-105. DOI: 10.1007/978-3-319-21410-8_7


Cherng, L.Y., Hassain Malim, N.H.A., Mahinderjit Singh, M. Trend analysis in ageing and ICT research (2015) Jurnal Teknologi, 76 (1), pp. 313-327. DOI:


Azahar, T.F., Mahinderjit-Singh, M., Hassan, R. RFID-enabled supply chain detection using clustering algorithms (2015) ACM IMCOM 2015 – Proceedings, , pp. -. DOI: 10.1145/2701126.2701140


Singh, M.M., Chieng, L.B., Hassan, R., Zaaba, Z.F. Friends personalization of trustworthiness for privacy perseverance in social networking (2015) Lecture Notes in Engineering and Computer Science, 2219, pp. 428-432. DOI:


Hassan, R., Mahinderjit-Singh, M., Jidwin, A.P., Hasan, J. A critical assessment of quality assurance practices in Mobile telecommunication and business performance (2015) Proceedings of the 26th International Business Information Management Association Conference – Innovation Management and Sustainable Economic Competitive Advantage: From Regional Development to Global Growth, IBIMA 2015, , pp. 1106-1113. DOI:


Chow, S.T., Leow, Y.Q., Ching, F., Damanhoori, F., Singh, M.M. Breast cancer factors detection using classification algorithms (2015) Proceedings of the 26th International Business Information Management Association Conference – Innovation Management and Sustainable Economic Competitive Advantage: From Regional Development to Global Growth, IBIMA 2015, , pp. 1786-1801. DOI:


Chew, C.B., Wei, K.C., Sheng, T.W., Mahinderjit-Singh, M., Malim, N.H.A.H., Husin, M.H. Security challenges and mitigations of NFC-Enabled attendance system (2015) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9141, pp. 160-167. DOI: 10.1007/978-3-319-20472-7_18


Othman, A.S., Kadir, H.A., Ishak, N.H.H., Ahamed, M.H.H.N.H., Malim, H., Singh, M.M. Mobile organizer apps: A general understanding study among the undergraduates of universiti sains Malaysia (2015) ARPN Journal of Engineering and Applied Sciences, 10 (15), pp. 6381-6386. DOI:


Osman, N.F., Samsudin, N.F., Nor, N.S.M., Husin, M.H., Malim, N.H.A.H., Singh, M.M. User friendliness of near-field communication (2015) ARPN Journal of Engineering and Applied Sciences, 10 (15), pp. 6370-6375. DOI:

Li, T.J., Singh, M.M. Hybrid trust framework for loss of control in cloud computing (2014) Lecture Notes in Electrical Engineering, 279 LNEE, pp. 669-675. DOI: 10.1007/978-3-642-41674-3_96


Chung, S.K., Yee, O.C., Singh, M.M., Hassan, R. SQL injections attack and session hijacking on e-learning systems (2014) I4CT 2014 – 1st International Conference on Computer, Communications, and Control Technology, Proceedings, , pp. 338-342. DOI: 10.1109/I4CT.2014.6914201

Singh, M., Bolla, V.H., Berg, R. A Case of in-stent thrombosis in a patient with drug eluting stents during perioperative management with glycoprotein IIb/IIIa inhibitors (2013) Catheterization and Cardiovascular Interventions, 82 (7), pp. 1108-1112. DOI: 10.1002/ccd.24845


Mahinderjit-Singh, M., Li, X., Li, Z. Context-aware web services for security control and privacy preservation in an RFID supply chain (2013) International Journal of Information Technology and Management, 12 (2-Jan), pp. 39-66. DOI: 10.1504/IJITM.2013.051629

Singh, M.M., Li, X., Li, Z. Security and privacy protection in RFID-enabled supply chain management (2011) International Journal of Radio Frequency Identification Technology and Applications, 3 (4), pp. 294-318. DOI: 10.1504/IJRFITA.2011.043738

Mahinderjit-Singh, M., Li, X. Trust in RFID-enabled supply-chain management (2010) International Journal of Security and Networks, 5 (3-Feb), pp. 96-105. DOI: 10.1504/IJSN.2010.032208

Mahinderjit-Singh, M., Li, X. Trust framework for RFID tracking in supply chain management (2009) RFID Technology Concepts, Applications, Challenges – Proceedings of the 3rd International Workshop on RFID Technology – Concepts, Applications, Challenges IWRT 2009 In Conjunction with ICEIS 2009, , pp. 17-26. DOI:


Mahinderjit-Singh, M., Li, X. Computational model for trust management in RFID supply chains (2009) 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS ’09, , pp. 734-740. DOI: 10.1109/MOBHOC.2009.5336926