Follow
Madihah Mohd Saudi
Madihah Mohd Saudi
Verified email at usim.edu.my
Title
Cited by
Cited by
Year
Security awareness training: A review
MM Al-Daeef, N Basir, MM Saudi
Lecture Notes in Engineering and Computer Science, 2017
832017
A new mobile botnet classification based on permission and API calls
M Yusof, MM Saudi, F Ridzuan
2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017
362017
Performance analysis of routing protocol for WSN using data centric approach
AH Azni, MM Saudi, A Azman, AS Johari
International Journal of Electrical, Computer, Energetic, Electronic and …, 2009
342009
Android ransomware detection based on dynamic obtained features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020
292020
Mobile botnet detection: Proof of concept
Z Abdullah, MM Saudi, NB Anuar
2014 IEEE 5th control and system graduate research colloquium, 257-262, 2014
292014
An efficient trojan horse classification (ETC)
AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah
International Journal of Computer Science Issues, 2013
242013
A proposed system concept on enhancing the encryption and decryption method for cloud computing
SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi
2015 17th UKSim-AMSS International Conference on Modelling and Simulation …, 2015
222015
An overview of disk imaging tool in computer forensics
MM Saudi
SANS Institute, 2001
222001
ABC: Android Botnet Classification Using Feature Selection and Classification Algorithms
Z Abdullah, MM Saudi, NB Anuar
Advanced Science Letters 23 (5), 4717-4720, 2017
202017
Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran
MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ...
International Journal of ENgineering & Technology(IJET) 7 (4), 69-74, 2018
192018
Image Detection Model for Construction Worker Safety Conditions using Faster R-CNN
MM Saudi, AH Ma’arof, A Ahmad, AS Mohd Saudi, MH Ali, A Narzullaev, ...
International Journal of Advanced Computer Science and Applications(IJACSA …, 2020
162020
Flood risk pattern recognition by using environmetric technique: A case study in Langat river basin
ASM Saudi, H Juahir, A Azid, ME Toriman, MKA Kamarudin, MM Saudi, ...
Jurnal Teknologi, 2015
152015
An overview of apoptosis for computer security
MM Saudi, M Woodward, AJ Cullen, HM Noor
2008 International Symposium on Information Technology 4, 1-6, 2008
152008
Edowa worm classification
MM Saudi, EM Tamil, SAM Nor, MYI Idris, K Seman
Proceedings of the World Congress on Engineering 1, 582-586, 2008
152008
A new cryptojacking malware classifier model based on dendritic cell algorithm
A Ahmad, W Shafiuddin, MN Kama, MM Saudi
Proceedings of the 3rd International Conference on Vision, Image and Signal …, 2019
122019
A systematic review analysis of root exploitation for mobile botnet detection
HAB Hashim, M Mohd Saudi, N Basir
Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016
122016
Analysis of packets abnormalities in wireless sensor network
AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar
2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009
122009
Mobile Botnet Classification by using Hybrid Analysis
M Yusof, MM Saudi, F Ridzuan
International Journal of ENgineering & Technology(IJET) 7 (4), 103-108, 2018
112018
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
MS Madihah, H Muhammad ‘Afif
International Journal of Advanced Computer Science and Applications(IJACSA …, 2017
11*2017
Flood risk pattern recognition using integrated chemometric method and artificial neural network: A case study in the Johor River Basin
ASM Saudi, A Azid, H Juahir, ME Toriman, MA Amran, AD Mustafa, ...
Jurnal Teknologi, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20