[go: up one dir, main page]

Follow
Madihah Mohd Saudi
Madihah Mohd Saudi
Verified email at usim.edu.my
Title
Cited by
Cited by
Year
Security awareness training: A review
MM Al-Daeef, N Basir, MM Saudi
Lecture Notes in Engineering and Computer Science, 2017
1232017
A new mobile botnet classification based on permission and API calls
M Yusof, MM Saudi, F Ridzuan
2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017
422017
Android ransomware detection based on dynamic obtained features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
International Conference on Soft Computing and Data Mining, 121-129, 2019
362019
Image Detection Model for Construction Worker Safety Conditions using Faster R-CNN
MM Saudi, AH Ma’arof, A Ahmad, AS Mohd Saudi, MH Ali, A Narzullaev, ...
International Journal of Advanced Computer Science and Applications(IJACSA …, 2020
332020
Performance analysis of routing protocol for WSN using data centric approach
AH Azni, MM Saudi, A Azman, AS Johari
World Academy of Science, Engineering and Technology 53, 2009
322009
Mobile botnet detection: Proof of concept
Z Abdullah, MM Saudi, NB Anuar
2014 IEEE 5th control and system graduate research colloquium, 257-262, 2014
312014
An overview of disk imaging tool in computer forensics
MM Saudi
SANS Institute, 2001
272001
An efficient trojan horse classification (ETC)
AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah
International Journal of Computer Science Issues (IJCSI) 10 (2), 96, 2013
262013
ABC: Android Botnet Classification Using Feature Selection and Classification Algorithms
Z Abdullah, MM Saudi, NB Anuar
Advanced Science Letters 23 (5), 4717-4720, 2017
202017
A proposed system concept on enhancing the encryption and decryption method for cloud computing
SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi
2015 17th UKSim-AMSS International Conference on Modelling and Simulation …, 2015
202015
Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran
MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ...
International Journal of ENgineering & Technology(IJET) 7 (4), 69-74, 2018
182018
A recent assessment for the ransomware attacks against the internet of medical things (iomt): A review
T Nusairat, MM Saudi, AB Ahmad
2023 IEEE 13th International Conference on Control System, Computing and …, 2023
172023
An overview of apoptosis for computer security
MM Saudi, M Woodward, AJ Cullen, HM Noor
2008 International Symposium on Information Technology 4, 1-6, 2008
162008
A new cryptojacking malware classifier model based on dendritic cell algorithm
A Ahmad, W Shafiuddin, MN Kama, MM Saudi
Proceedings of the 3rd International Conference on Vision, Image and Signal …, 2019
152019
Flood risk pattern recognition by using environmetric technique: A case study in Langat river basin
ASM Saudi, H Juahir, A Azid, ME Toriman, MKA Kamarudin, MM Saudi, ...
Jurnal Teknologi (Sciences & Engineering) 77 (1), 2015
152015
EDOWA worm classification
MM Saudi, EM Tamil, SAM Nor, MYI Idris, K Seman
Proceedings of the World Congress on Engineering 1, 582-586, 2008
152008
Flood risk pattern recognition using integrated chemometric method and artificial neural network: A case study in the Johor River Basin
ASM Saudi, A Azid, H Juahir, ME Toriman, MA Amran, AD Mustafa, ...
Jurnal Teknologi (Sciences & Engineering) 74 (1), 2015
132015
iOS mobile malware analysis: a state-of-the-art
M Mohd Saudi, MA Husainiamer, A Ahmad, MYI Idris
Journal of Computer Virology and Hacking Techniques 20 (4), 533-562, 2024
122024
Phishing detection and prevention using chrome extension
MASR Rose, N Basir, NFNR Heng, NJM Zaizi, MM Saudi
2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2022
122022
Mobile Botnet Classification by using Hybrid Analysis
M Yusof, MM Saudi, F Ridzuan
International Journal of ENgineering & Technology(IJET) 7 (4), 103-108, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20