Security awareness training: A review MM Al-Daeef, N Basir, MM Saudi Lecture Notes in Engineering and Computer Science, 2017 | 98 | 2017 |
A new mobile botnet classification based on permission and API calls M Yusof, MM Saudi, F Ridzuan 2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017 | 40 | 2017 |
Performance analysis of routing protocol for WSN using data centric approach AH Azni, MM Saudi, A Azman, AS Johari World Academy of Science, Engineering and Technology 53, 2009 | 33 | 2009 |
Android ransomware detection based on dynamic obtained features Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020 | 32 | 2020 |
Mobile botnet detection: Proof of concept Z Abdullah, MM Saudi, NB Anuar 2014 IEEE 5th control and system graduate research colloquium, 257-262, 2014 | 31 | 2014 |
An efficient trojan horse classification (ETC) AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah International Journal of Computer Science Issues (IJCSI) 10 (2), 96, 2013 | 26 | 2013 |
An overview of disk imaging tool in computer forensics MM Saudi SANS Institute, 2001 | 24 | 2001 |
Image Detection Model for Construction Worker Safety Conditions using Faster R-CNN MM Saudi, AH Ma’arof, A Ahmad, AS Mohd Saudi, MH Ali, A Narzullaev, ... International Journal of Advanced Computer Science and Applications(IJACSA …, 2020 | 23 | 2020 |
A proposed system concept on enhancing the encryption and decryption method for cloud computing SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi 2015 17th UKSim-AMSS International Conference on Modelling and Simulation …, 2015 | 22 | 2015 |
ABC: Android Botnet Classification Using Feature Selection and Classification Algorithms Z Abdullah, MM Saudi, NB Anuar Advanced Science Letters 23 (5), 4717-4720, 2017 | 20 | 2017 |
Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ... International Journal of ENgineering & Technology(IJET) 7 (4), 69-74, 2018 | 19 | 2018 |
An overview of apoptosis for computer security MM Saudi, M Woodward, AJ Cullen, HM Noor 2008 International Symposium on Information Technology 4, 1-6, 2008 | 16 | 2008 |
Edowa worm classification MM Saudi, EM Tamil, SAM Nor, MYI Idris, K Seman Proceedings of the World Congress on Engineering 1, 582-586, 2008 | 16 | 2008 |
Flood risk pattern recognition by using environmetric technique: A case study in Langat river basin ASM Saudi, H Juahir, A Azid, ME Toriman, MKA Kamarudin, MM Saudi, ... Jurnal Teknologi 77 (1), 2015 | 15 | 2015 |
A new cryptojacking malware classifier model based on dendritic cell algorithm A Ahmad, W Shafiuddin, MN Kama, MM Saudi Proceedings of the 3rd International Conference on Vision, Image and Signal …, 2019 | 13 | 2019 |
Mobile Malware Classification via System Calls and Permission for GPS Exploitation MS Madihah, H Muhammad ‘Afif International Journal of Advanced Computer Science and Applications(IJACSA …, 2017 | 12* | 2017 |
A systematic review analysis of root exploitation for mobile botnet detection HAB Hashim, M Mohd Saudi, N Basir Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016 | 12 | 2016 |
Flood risk pattern recognition using integrated chemometric method and artificial neural network: A case study in the Johor River Basin ASM Saudi, A Azid, H Juahir, ME Toriman, MA Amran, AD Mustafa, ... Jurnal Teknologi 74 (1), 2015 | 12 | 2015 |
Analysis of Packets Abnormalities in Wireless Sensor Network AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar 2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009 | 12 | 2009 |
Mobile Botnet Classification by using Hybrid Analysis M Yusof, MM Saudi, F Ridzuan International Journal of ENgineering & Technology(IJET) 7 (4), 103-108, 2018 | 11 | 2018 |