{"id":233,"date":"2025-06-29T15:00:22","date_gmt":"2025-06-29T15:00:22","guid":{"rendered":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/?page_id=233"},"modified":"2025-07-02T08:41:39","modified_gmt":"2025-07-02T08:41:39","slug":"research-publications-asst-prof-dr-adamu-abubakar-ibrahim","status":"publish","type":"page","link":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/research-publications-asst-prof-dr-adamu-abubakar-ibrahim\/","title":{"rendered":"Research &amp; Publications Asst. Prof. Dr. Adamu Abubakar Ibrahim"},"content":{"rendered":"\n<div class=\"wp-block-cover alignwide is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\" style=\"background-color:#f4ecf3\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"626\" class=\"wp-block-cover__image-background wp-image-89\" alt=\"\" src=\"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/wp-content\/uploads\/2025\/06\/RESEARCH.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/wp-content\/uploads\/2025\/06\/RESEARCH.jpg 626w, https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/wp-content\/uploads\/2025\/06\/RESEARCH-300x300.jpg 300w, https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/wp-content\/uploads\/2025\/06\/RESEARCH-150x150.jpg 150w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><strong><strong>RESEARCH<\/strong><\/strong><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-2-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-3 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading has-text-align-center is-style-default\"><mark style=\"background-color:#117a65\" class=\"has-inline-color has-custom-gold-color\"><strong>Asst. Prof. Dr. Adamu Abubakar Ibrahim<\/strong><\/mark><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-container-core-column-is-layout-1 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<ol class=\"wp-block-list\">\n<li>Blockchain-based Model for Deep Packet Inspection System<\/li>\n\n\n\n<li>\u00a0Structured Large Data Volume Heterogeneity with Minimal Incompleteness in a Big Data Analytics<\/li>\n\n\n\n<li>An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment<\/li>\n\n\n\n<li>A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems<\/li>\n\n\n\n<li>Novel Over-sampling Methods for Classification of Quranic Topics<\/li>\n\n\n\n<li>Subjective Assessment Model of the Quranic Audio Watermarking<\/li>\n\n\n\n<li>User Awareness on the Authenticity of Mobile Quran<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignwide is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\" style=\"background-color:#f5f0ef\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"626\" class=\"wp-block-cover__image-background wp-image-90\" alt=\"\" src=\"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/wp-content\/uploads\/2025\/06\/Publication.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/wp-content\/uploads\/2025\/06\/Publication.jpg 626w, https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/wp-content\/uploads\/2025\/06\/Publication-300x300.jpg 300w, https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/wp-content\/uploads\/2025\/06\/Publication-150x150.jpg 150w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><strong><strong>PUBLICATIONS<\/strong><\/strong><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-2-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-5 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-4 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading has-text-align-center is-style-default\"><strong><strong><mark style=\"background-color:#117a65\" class=\"has-inline-color has-custom-gold-color\">Asst. Prof. Dr. Adamu Abubakar Ibrahim<\/mark><\/strong><\/strong><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-container-core-column-is-layout-2 wp-block-column-is-layout-flow\">\n<ol class=\"wp-block-list\">\n<li>Zaidi, N. S., Ali, A. F. M., Firdaus, A., <strong>Ibrahim, A. A<\/strong>., AlDharhani, G. S., &amp; Ab Razak, M. F. (2025). Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems. Mesopotamian Journal of CyberSecurity, 5(2), 577\u2013589.<\/li>\n\n\n\n<li>Gumaida, B. G., &amp; <strong>Ibrahim, A. A.<\/strong> (2025). Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: A comprehensive review. International Journal of Innovative Computing, 15(1), 1\u201315.<\/li>\n\n\n\n<li>Atoum, M. S., Alarood, A. A., Alsolami, E., <strong>Abubakar, A.<\/strong>, Hwaitat, A. K. A., &amp; Alsmadi, I. (2025). Cybersecurity intelligence through textual data analysis: A framework using machine learning and terrorism datasets. Future Internet, 17(4), 182.<\/li>\n\n\n\n<li>Ahmed, M., Al-Hussaini, A. I. S., &amp; <strong>Ibrahim, A. A. (2025).<\/strong> Factors influencing the intention to use the Nigerian central bank digital currency (E Naira) among Nigerian retailers. Journal of Financial Services Marketing, 30(1), 1\u201316.<\/li>\n\n\n\n<li>Hussain, M. K., Wani, S., &amp; <strong>Abubakar, A.<\/strong> (2025). Examining mortality risk prediction using machine learning in heart failure patients. International Journal on Perceptive and Cognitive Computing, 11(1), 81\u201387.<\/li>\n\n\n\n<li>Ahmed, M., Al-Hussaini, A. I. S., <strong>Ibrahim, A. A.<\/strong>, &amp; Abubakar, R. A. (2025). Mediating effect of emotionality on the intention to use the Nigerian central bank digital currency (e Naira). International Journal of Business and Systems Research, 19(2), 95\u2013110.<\/li>\n\n\n\n<li>Al-Khasawneh, M. A., Faheem, M., Alsekait, D. M., <strong>Abubakar, A.<\/strong>, &amp; Issa, G. F. (2025). Hybrid neural network methods for the detection of credit card fraud. Security and Privacy, 8(1), e500.<\/li>\n\n\n\n<li>Ahmed, M., Othman, R., Noordin, M. F., <strong>Ibrahim, A. A.<\/strong>, &amp; Al-Hussaini, A. I. S. (2024). Factors influencing open science participation through research data sharing and reuse among researchers: A systematic literature review. Knowledge and Information Systems, 1\u201353.<\/li>\n\n\n\n<li>Khan, F. A., &amp; <strong>Ibrahim, A. A.<\/strong> (2024). Network traffic classification analysis on differentiated services code point using deep learning models for efficient deep packet inspection. International Journal of Innovative Computing, 14(2), 15\u201324.<\/li>\n\n\n\n<li>Ibrahim, W. A. W., Khalil, A. N. A., &amp; <strong>Abubakar, A.<\/strong> (2024). Design and development of cybersecurity suite. International Journal on Perceptive and Cognitive Computing, 10(2), 104\u2013112.<\/li>\n\n\n\n<li>Nasharuddin, M. Z. S. M., &amp; <strong>Abubakar, A.<\/strong> (2024). Analyzing threat level of the backdoor attack method for an organization\u2019s operation. International Journal on Perceptive and Cognitive Computing, 10(2), 51\u201359.<\/li>\n\n\n\n<li>Khan, F. A., &amp; <strong>Ibrahim, A. A. <\/strong>(2024). Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advanced network management. Journal of Telecommunication, Electronic and Computer Engineering, 16(2), [page unspecified].<\/li>\n\n\n\n<li>Jauro, F., Gital, A. Y., Abdullahi, U. A., Abdulsalami, A. O., Abdullahi, M., <strong>Ibrahim, A. A.<\/strong>, &#8230; (2024). Modified symbiotic organisms search optimization for automatic construction of convolutional neural network architectures. Intelligent Systems with Applications, 22, 200349.<\/li>\n\n\n\n<li>Gumaida, B., &amp; <strong>Ibrahim, A. A.<\/strong> (2024). IWDSA: A hybrid intelligent water drops with a simulated annealing for the localization improvement in wireless sensor networks. International Journal of Applied Information Technology, 14\u201342.<\/li>\n\n\n\n<li>Gumaida, B., &amp; <strong>Ibrahim, A. A<\/strong>. (2024). A novel polytope algorithm based on Nelder-Mead method for localization in wireless sensor network. International Journal of Sensors Wireless Communications and Control, 14(1),\u00a0<\/li>\n\n\n\n<li><strong>Abubakar, A.<\/strong>, Najmuddin, N. M., Alwi, R. A. M., &amp; Faizal, N. A. I. M. (2024). Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session. International Journal on Perceptive and Cognitive Computing, 10(1), 98\u2013104.\u00a0<\/li>\n\n\n\n<li><strong>Abubakar, A.,<\/strong> &amp; Yusof, Z. M. (2024). Streams of data flow in transmission control protocol (TCP) request-response cycle efficiency. International Journal on Perceptive and Cognitive Computing, 10(1), 79\u201389.<\/li>\n\n\n\n<li><strong>Abubakar, A<\/strong>., &amp; Khan, F. A. (2024). Integrating Blockchain with Deep Packet Inspection and The Performance Overhead Introduced. Preprints.https:\/\/doi.org\/10.20944\/preprints202408.1475.v1<\/li>\n\n\n\n<li>Almuqren, A., Alsuwaelim, H., Rahman, M. M. H., &amp; <strong>Ibrahim, A. A.<\/strong> (2024). A systematic literature review on digital forensic investigation on Android devices. Procedia Computer Science, 235, 1332\u20131352.<\/li>\n\n\n\n<li>Alarood, A. A., <strong>Ibrahim, A. A.<\/strong>, &amp; Alsubaei, F. S. (2023). Attacks notification of differentiated services code point (DSCP) values modifications. IEEE Access, 11, 126950\u2013126966.<\/li>\n\n\n\n<li>Anuar, M. A. B., Zeki, A. M., &amp; <strong>Abubakar, A<\/strong>. (2023). Exploring blockchain for KYC: Deepening client understanding. 2023 IEEE 13th International Conference on Control System, Computing and Engineering.\u00a0<\/li>\n\n\n\n<li>Khan, F. A., &amp; <strong>Ibrahim, A. A. (2023).<\/strong> Non-fungible token based smart manufacturing to scale industry 4.0 by using augmented reality, deep learning and industrial internet of things. International Journal on Perceptive and Cognitive Computing, 9(2), 62\u201372.<\/li>\n\n\n\n<li>Altulaihan, E., Alismail, A., Rahman, M. M. H., &amp; <strong>Ibrahim, A. A.<\/strong> (2023). Email security issues, tools, and techniques used in investigation. Sustainability, 15(13), 10612.<\/li>\n\n\n\n<li>Alarood, A. A., <strong>Abubakar, A.<\/strong>, Alzahrani, A., &amp; Alsubaei, F. S. (2023). Electronic waste collection incentivization scheme based on the blockchain. Sustainability, 15(13), 10209.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Asst. Prof. Dr. Adamu Abubakar Ibrahim Asst. Prof. Dr. Adamu Abubakar Ibrahim<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-233","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/wp-json\/wp\/v2\/pages\/233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":7,"href":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/wp-json\/wp\/v2\/pages\/233\/revisions"}],"predecessor-version":[{"id":372,"href":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/wp-json\/wp\/v2\/pages\/233\/revisions\/372"}],"wp:attachment":[{"href":"https:\/\/kulliyyah.iium.edu.my\/kict\/blockchainIIUM\/index.php\/wp-json\/wp\/v2\/media?parent=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}