Performance analysis of routing protocol for WSN using data centric approach AH Azni, MM Saudi, A Azman, AS Johari World Academy of Science, Engineering and Technology 53, 2009 | 28 | 2009 |
An overview of disk imaging tool in computer forensics MM Saudi SANS Institute, 2001 | 18 | 2001 |
Mobile botnet detection: Proof of concept Z Abdullah, MM Saudi, NB Anuar 2014 IEEE 5th control and system graduate research colloquium, 257-262, 2014 | 17 | 2014 |
Security Awareness Training: A Review MAD Melad, B Nurlida, MS Madihah Lecture Notes in Engineering and Computer Science: Proceedings of The World …, 2017 | 14* | 2017 |
Analysis of Packets Abnormalities in Wireless Sensor Network AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar 2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009 | 11 | 2009 |
An efficient trojan horse classification (ETC) AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah International Journal of Computer Science Issues (IJCSI) 10 (2), 96, 2013 | 10 | 2013 |
A new mobile botnet classification based on permission and API calls M Yusof, MM Saudi, F Ridzuan 2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017 | 9 | 2017 |
Flood risk pattern recognition by using environmetric technique: A case study in Langat River Basin ASM Saudi, H Juahir, A Azid, ME Toriman, MKA Kamarudin, MM Saudi, ... Jurnal Teknologi 77 (1), 2015 | 9 | 2015 |
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing MMS SA Pitchay, WAA Alhiagem, F Ridzuan UKSIM'15, 2015 | 9* | 2015 |
Edowa worm classification MM Saudi, EM Tamil, SAM Nor, MYI Idris, K Seman Proceedings of the World Congress on Engineering 1, 582-586, 2008 | 9 | 2008 |
An overview of apoptosis for computer security MM Saudi, M Woodward, AJ Cullen, HM Noor 2008 International Symposium on Information Technology 4, 1-6, 2008 | 8 | 2008 |
Detecting worm attacks in cloud computing environment: Proof of concept HM Kanaker, MM Saudi, MF Marhusin 2014 IEEE 5th Control and System Graduate Research Colloquium, 253-256, 2014 | 7 | 2014 |
ABC: Android Botnet Classification Using Feature Selection and Classification Algorithms Z Abdullah, MM Saudi, NB Anuar Advanced Science Letters 23 (5), 4717-4720, 2017 | 6 | 2017 |
A systematic review analysis of root exploitation for mobile botnet detection HAB Hashim, MM Saudi, N Basir Advanced Computer and Communication Engineering Technology, 113-122, 2016 | 6 | 2016 |
A New Model for Worm Detection and Response: Development and Evaluation of a New Model Based on Knowledge Discovery and Data Mining Techniques to Detect and Respond to Worm … MM Saudi University of Bradford, 2011 | 6 | 2011 |
A SYSTEMATIC ANALYSIS ON WORM DETECTION IN CLOUD BASED SYSTEMS HM Kanaker, M Mohd Saudi, MF Marhusin ARPN Journal of Engineering and Applied Sciences 10 (2), 540-548, 2015 | 5* | 2015 |
A method to measure the efficiency of phishing emails detection features MM Al-Daeef, N Basir, MM Saudi 2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014 | 5 | 2014 |
Computer security self-efficacy effect: An extention of Technology-to-Performance chain model M Al-Shawabkeh, MM Saudi, NHM Alwi 2012 IEEE Control and System Graduate Research Colloquium, 64-69, 2012 | 5 | 2012 |
E-Learning Assessment Application Based on Bloom Taxonomy. M Rahmat, MM Saudi International Journal of Learning 14 (9), 2008 | 5 | 2008 |
Knowledge structure on virus for user education S Madihah, J Nazean 2006 International Conference on Computational Intelligence and Security 2 …, 2006 | 5 | 2006 |