Follow
Isredza Rahmi A HAMID
Title
Cited by
Cited by
Year
Hybrid feature selection for phishing email detection
IR A. Hamid, J Abawajy
Algorithms and Architectures for Parallel Processing: 11th International …, 2011
802011
Face recognition for criminal identification: An implementation of principal component analysis for face recognition
NA Abdullah, MJ Saidi, NHA Rahman, CC Wen, IRA Hamid
AIP conference proceedings 1891 (1), 2017
732017
Using feature selection and classification scheme for automating phishing email detection
IRA Hamid, J Abawajy, TH Kim
University Of Tasmania, 2013
672013
Android malware detection based on network traffic using decision tree algorithm
A Zulkifli, IRA Hamid, WM Shah, Z Abdullah
Recent Advances on Soft Computing and Data Mining: Proceedings of the Third …, 2018
552018
A review of live survey application: SurveyMonkey and SurveyGizmo
M Abd Halim, CFM Foozy, I Rahmi, A Mustapha
JOIV: International Journal on Informatics Visualization 2 (4-2), 309-312, 2018
522018
An approach for profiling phishing activities
IRA Hamid, JH Abawajy
Computers & Security 45, 27-41, 2014
502014
Enhancing trust management in cloud environment
SK Chong, J Abawajy, M Ahmad, IRA Hamid
Procedia-Social and Behavioral Sciences 129, 314-321, 2014
462014
Phishing email feature selection approach
IRA Hamid, J Abawajy
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
382011
Investigating machine learning techniques for detection of depression using structural MRI volumetric features
K Kipli, A Kouzani, IR A Hamid
Deakin University, 2013
292013
Profiling phishing email based on clustering approach
IRA Hamid, JH Abawajy
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
292013
Android ransomware detection based on dynamic obtained features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020
252020
Generic Assessment Rubrics for Computer Programming Courses.
A Mustapha, NA Samsudin, N Arbaiy, R Mohammed, IR Hamid
Turkish Online Journal of Educational Technology-TOJET 15 (1), 53-68, 2016
242016
Audio Steganography with Embedded Text
CT Jian, CC Wen, NHBA Rahman, IRBA Hamid
Universiti Tun Hussein Onn Malaysia, 2016
152016
A multilevel trust management framework for service oriented environment
SK Chong, J Abawajy, IRA Hamid, M Ahmad
Procedia-Social and Behavioral Sciences 129, 396-405, 2014
122014
Radio frequency identification (RFID) based car parking system
MS Mazlan, IRA Hamid, H Kamaludin
JOIV: International Journal on Informatics Visualization 2 (4-2), 318-322, 2018
112018
Using weighted based feature selection technique for android malware detection
NH Mazlan, IRA Hamid
Mobile and Wireless Technologies 2017: ICMWT 2017 4, 54-64, 2018
112018
Feature Selection Approach to Detect DDoS Attack Using Machine Learning Algorithms
MAH Azmi, CFM Foozy, KAM Sukri, NA Abdullah, IRA Hamid, H Amnur
JOIV: International Journal on Informatics Visualization 5 (4), 395-401, 2021
102021
Android Malware Classification Using K-Means Clustering Algorithm
IRA Hamid, NS Khalid, NA Abdullah, NH Ab Rahman, CC Wen
102017
One-way ANOVA model with fuzzy data for consumer demand
PC Lin, N Arbaiy, IRA Hamid
International Conference on Soft Computing and Data Mining, 111-121, 2016
92016
Extended local mean-based nonparametric classifier for cervical cancer screening
NA Samsudin, A Mustapha, N Arbaiy, IRA Hamid
Recent Advances on Soft Computing and Data Mining: The Second International …, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20