Cik Feresa binti Mohd Foozy
Cik Feresa binti Mohd Foozy
Verified email at
Cited by
Cited by
Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset
ZK Maseer, R Yusof, N Bahaman, SA Mostafa, CFM Foozy
IEEE access 9, 22351-22370, 2021
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
Integrating Elman recurrent neural network with particle swarm optimization algorithms for an improved hybrid training of multidisciplinary datasets
MF Ab Aziz, SA Mostafa, CFM Foozy, MA Mohammed, M Elhoseny, ...
Expert Systems with Applications 183, 115441, 2021
A machine learning approach for improving the performance of network intrusion detection systems
AH Azizan, SA Mostafa, A Mustapha, CFM Foozy, MHA Wahab, ...
Annals of Emerging Technologies in Computing (AETiC) 5 (5), 201-208, 2021
A review of live survey application: SurveyMonkey and SurveyGizmo
M Abd Halim, CFM Foozy, I Rahmi, A Mustapha
JOIV: International Journal on Informatics Visualization 2 (4-2), 309-312, 2018
Customer profiling using classification approach for bank telemarketing
S Palaniappan, A Mustapha, CFM Foozy, R Atan
JOIV: International Journal on Informatics Visualization 1 (4-2), 214-217, 2017
Phishing detection taxonomy for mobile device
CFM Foozy, R Ahmad, MF Abdollah
International Journal of Computer Science Issues (IJCSI) 10 (1), 338-344, 2013
Android ransomware detection based on dynamic obtained features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020
Header based email spam detection framework using Support Vector Machine (SVM) Technique
SA Khamis, CFM Foozy, MFA Aziz, N Rahim
Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020
A generic review of web technology: Django and flask
N Idris, CFM Foozy, P Shamala
International Journal of Advanced Science Computing and Engineering 2 (1), 34-40, 2020
Video spam comment features selection using machine learning techniques
N Alias, CFM Foozy, SN Ramli, N Zainuddin
Indones. J. Electr. Eng. Comput. Sci 15 (2), 1046-1053, 2019
YouTube spam comment detection using support vector machine and K–nearest neighbor
A Aziz, CFM Foozy, P Shamala, Z Suradi
Indonesian Journal of Electrical Engineering and Computer Science 12 (2 …, 2018
A comparative study with RapidMiner and WEKA tools over some classification techniques for SMS spam
CFM Foozy, R Ahmad, MAF Abdollah, CC Wen
IOP Conference Series: Materials Science and Engineering 226 (1), 012100, 2017
Feature Selection Approach to Detect DDoS Attack Using Machine Learning Algorithms
MAH Azmi, CFM Foozy, KAM Sukri, NA Abdullah, IRA Hamid, H Amnur
JOIV: International Journal on Informatics Visualization 5 (4), 395-401, 2021
Machine Learning-Based Distributed Denial of Service Attack Detection on Intrusion Detection System Regarding to Feature Selection
AW Muhammad, CFM Foozy, A Azhari
International Journal of Artificial Intelligence Research 4 (1), 1-8, 2020
A Practical Rule Based Technique by Splitting SMS Phishing from SMS Spam for Better Accuracy in Mobile Device
C. Mohd Foozy, Ahmad, R., Abdollah, M.
International Review on Computers and Software (IRECOS) 9 (1), 8, 2014
Malware awareness tool for internet safety using gamification techniques
NS Omar, CFM Foozy, IRA Hamid, H Hafit, AF Arbain, P Shamala
Journal of Physics: Conference Series 1874 (1), 012023, 2021
Preliminary analysis of malware detection in opcode sequences within iot environment
FS Ahmed, N Mustapha, A Mustapha, M Kakavand, CFM Foozy
Journal of Computer Science 16 (9), 1306-1318, 2020
Network monitoring system to detect unauthorized connection
IRA Hamid, NHA Sukor, CFM Foozy, Z Abdullah
Acta Electronica Malaysia 1 (2), 13-16, 2017
A framework for SMS spam and phishing detection in Malay Language: a case study
C. Mohd Foozy, Ahmad, R., Abdollah, M.
International Review on Computers and Software 9 (7), 1248-1254, 2014
The system can't perform the operation now. Try again later.
Articles 1–20