Madihah Mohd Saudi
Madihah Mohd Saudi
Associate Professor/CIO at Universiti Sains Islam Malaysia (USIM)
Verified email at
Cited by
Cited by
Security awareness training: A review
MM Al-Daeef, N Basir, MM Saudi
Lecture Notes in Engineering and Computer Science, 2017
Performance analysis of routing protocol for WSN using data centric approach
AH Azni, MM Saudi, A Azman, AS Johari
International Journal of Electrical, Computer, Energetic, Electronic and …, 2009
A new mobile botnet classification based on permission and API calls
M Yusof, MM Saudi, F Ridzuan
2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017
Mobile botnet detection: Proof of concept
Z Abdullah, MM Saudi, NB Anuar
2014 IEEE 5th control and system graduate research colloquium, 257-262, 2014
An overview of disk imaging tool in computer forensics
MM Saudi
SANS Institute, 2001
A proposed system concept on enhancing the encryption and decryption method for cloud computing
SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi
2015 17th UKSim-AMSS International Conference on Modelling and Simulation …, 2015
An efficient trojan horse classification (ETC)
AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah
International Journal of Computer Science Issues, 2013
Android ransomware detection based on dynamic obtained features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
International Conference on Soft Computing and Data Mining, 121-129, 2020
ABC: Android Botnet Classification Using Feature Selection and Classification Algorithms
Z Abdullah, MM Saudi, NB Anuar
Advanced Science Letters 23 (5), 4717-4720, 2017
Flood risk pattern recognition by using environmetric technique: A case study in Langat river basin
ASM Saudi, H Juahir, A Azid, ME Toriman, MKA Kamarudin, MM Saudi, ...
Jurnal Teknologi 77 (1), 2015
An overview of apoptosis for computer security
MM Saudi, M Woodward, AJ Cullen, HM Noor
2008 International Symposium on Information Technology 4, 1-6, 2008
Edowa worm classification
MM Saudi, EM Tamil, SAM Nor, MYI Idris, K Seman
Proceedings of the World Congress on Engineering 1, 582-586, 2008
Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran
MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ...
International Journal of ENgineering & Technology(IJET) 7 (4), 69-74, 2018
Analysis of packets abnormalities in wireless sensor network
AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar
2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009
A systematic review analysis of root exploitation for mobile botnet detection
HAB Hashim, M Mohd Saudi, N Basir
Advanced Computer and Communication Engineering Technology, 113-122, 2016
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
MS Madihah, H Muhammad ‘Afif
International Journal of Advanced Computer Science and Applications(IJACSA …, 2017
A method to measure the efficiency of phishing emails detection features
MM Al-Daeef, N Basir, MM Saudi
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
Mobile Botnet Classification by using Hybrid Analysis
M Yusof, MM Saudi, F Ridzuan
International Journal of ENgineering & Technology(IJET) 7 (4), 103-108, 2018
A review of client-side toolbars as a user-oriented anti-phishing solution
MM Al-Daeef, N Basir, MM Saudi
Advanced Computer and Communication Engineering Technology, 427-437, 2016
Flood risk pattern recognition using integrated chemometric method and artificial neural network: A case study in the Johor River Basin
ASM Saudi, A Azid, H Juahir, ME Toriman, MA Amran, AD Mustafa, ...
Jurnal Teknologi 74 (1), 2015
The system can't perform the operation now. Try again later.
Articles 1–20