| Security awareness training: A review MM Al-Daeef, N Basir, MM Saudi Lecture Notes in Engineering and Computer Science, 2017 | 123 | 2017 |
| A new mobile botnet classification based on permission and API calls M Yusof, MM Saudi, F Ridzuan 2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017 | 42 | 2017 |
| Android ransomware detection based on dynamic obtained features Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy International Conference on Soft Computing and Data Mining, 121-129, 2019 | 36 | 2019 |
| Image Detection Model for Construction Worker Safety Conditions using Faster R-CNN MM Saudi, AH Ma’arof, A Ahmad, AS Mohd Saudi, MH Ali, A Narzullaev, ... International Journal of Advanced Computer Science and Applications(IJACSA …, 2020 | 33 | 2020 |
| Performance analysis of routing protocol for WSN using data centric approach AH Azni, MM Saudi, A Azman, AS Johari World Academy of Science, Engineering and Technology 53, 2009 | 32 | 2009 |
| Mobile botnet detection: Proof of concept Z Abdullah, MM Saudi, NB Anuar 2014 IEEE 5th control and system graduate research colloquium, 257-262, 2014 | 31 | 2014 |
| An overview of disk imaging tool in computer forensics MM Saudi SANS Institute, 2001 | 27 | 2001 |
| An efficient trojan horse classification (ETC) AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah International Journal of Computer Science Issues (IJCSI) 10 (2), 96, 2013 | 26 | 2013 |
| ABC: Android Botnet Classification Using Feature Selection and Classification Algorithms Z Abdullah, MM Saudi, NB Anuar Advanced Science Letters 23 (5), 4717-4720, 2017 | 20 | 2017 |
| A proposed system concept on enhancing the encryption and decryption method for cloud computing SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi 2015 17th UKSim-AMSS International Conference on Modelling and Simulation …, 2015 | 20 | 2015 |
| Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ... International Journal of ENgineering & Technology(IJET) 7 (4), 69-74, 2018 | 18 | 2018 |
| A recent assessment for the ransomware attacks against the internet of medical things (iomt): A review T Nusairat, MM Saudi, AB Ahmad 2023 IEEE 13th International Conference on Control System, Computing and …, 2023 | 17 | 2023 |
| An overview of apoptosis for computer security MM Saudi, M Woodward, AJ Cullen, HM Noor 2008 International Symposium on Information Technology 4, 1-6, 2008 | 16 | 2008 |
| A new cryptojacking malware classifier model based on dendritic cell algorithm A Ahmad, W Shafiuddin, MN Kama, MM Saudi Proceedings of the 3rd International Conference on Vision, Image and Signal …, 2019 | 15 | 2019 |
| Flood risk pattern recognition by using environmetric technique: A case study in Langat river basin ASM Saudi, H Juahir, A Azid, ME Toriman, MKA Kamarudin, MM Saudi, ... Jurnal Teknologi (Sciences & Engineering) 77 (1), 2015 | 15 | 2015 |
| EDOWA worm classification MM Saudi, EM Tamil, SAM Nor, MYI Idris, K Seman Proceedings of the World Congress on Engineering 1, 582-586, 2008 | 15 | 2008 |
| Flood risk pattern recognition using integrated chemometric method and artificial neural network: A case study in the Johor River Basin ASM Saudi, A Azid, H Juahir, ME Toriman, MA Amran, AD Mustafa, ... Jurnal Teknologi (Sciences & Engineering) 74 (1), 2015 | 13 | 2015 |
| iOS mobile malware analysis: a state-of-the-art M Mohd Saudi, MA Husainiamer, A Ahmad, MYI Idris Journal of Computer Virology and Hacking Techniques 20 (4), 533-562, 2024 | 12 | 2024 |
| Phishing detection and prevention using chrome extension MASR Rose, N Basir, NFNR Heng, NJM Zaizi, MM Saudi 2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2022 | 12 | 2022 |
| Mobile Botnet Classification by using Hybrid Analysis M Yusof, MM Saudi, F Ridzuan International Journal of ENgineering & Technology(IJET) 7 (4), 103-108, 2018 | 12 | 2018 |