Madihah Mohd Saudi
Madihah Mohd Saudi
Associate Professor at Universiti Sains Islam Malaysia (USIM)
Verified email at usim.edu.my
TitleCited byYear
Performance analysis of routing protocol for WSN using data centric approach
AH Azni, MM Saudi, A Azman, AS Johari
World Academy of Science, Engineering and Technology 53, 2009
282009
An overview of disk imaging tool in computer forensics
MM Saudi
SANS Institute, 2001
182001
Mobile botnet detection: Proof of concept
Z Abdullah, MM Saudi, NB Anuar
2014 IEEE 5th control and system graduate research colloquium, 257-262, 2014
172014
Security Awareness Training: A Review
MAD Melad, B Nurlida, MS Madihah
Lecture Notes in Engineering and Computer Science: Proceedings of The World …, 2017
14*2017
Analysis of Packets Abnormalities in Wireless Sensor Network
AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar
2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009
112009
An efficient trojan horse classification (ETC)
AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah
International Journal of Computer Science Issues (IJCSI) 10 (2), 96, 2013
102013
A new mobile botnet classification based on permission and API calls
M Yusof, MM Saudi, F Ridzuan
2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017
92017
Flood risk pattern recognition by using environmetric technique: A case study in Langat River Basin
ASM Saudi, H Juahir, A Azid, ME Toriman, MKA Kamarudin, MM Saudi, ...
Jurnal Teknologi 77 (1), 2015
92015
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing
MMS SA Pitchay, WAA Alhiagem, F Ridzuan
UKSIM'15, 2015
9*2015
Edowa worm classification
MM Saudi, EM Tamil, SAM Nor, MYI Idris, K Seman
Proceedings of the World Congress on Engineering 1, 582-586, 2008
92008
An overview of apoptosis for computer security
MM Saudi, M Woodward, AJ Cullen, HM Noor
2008 International Symposium on Information Technology 4, 1-6, 2008
82008
Detecting worm attacks in cloud computing environment: Proof of concept
HM Kanaker, MM Saudi, MF Marhusin
2014 IEEE 5th Control and System Graduate Research Colloquium, 253-256, 2014
72014
ABC: Android Botnet Classification Using Feature Selection and Classification Algorithms
Z Abdullah, MM Saudi, NB Anuar
Advanced Science Letters 23 (5), 4717-4720, 2017
62017
A systematic review analysis of root exploitation for mobile botnet detection
HAB Hashim, MM Saudi, N Basir
Advanced Computer and Communication Engineering Technology, 113-122, 2016
62016
A New Model for Worm Detection and Response: Development and Evaluation of a New Model Based on Knowledge Discovery and Data Mining Techniques to Detect and Respond to Worm …
MM Saudi
University of Bradford, 2011
62011
A SYSTEMATIC ANALYSIS ON WORM DETECTION IN CLOUD BASED SYSTEMS
HM Kanaker, M Mohd Saudi, MF Marhusin
ARPN Journal of Engineering and Applied Sciences 10 (2), 540-548, 2015
5*2015
A method to measure the efficiency of phishing emails detection features
MM Al-Daeef, N Basir, MM Saudi
2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014
52014
Computer security self-efficacy effect: An extention of Technology-to-Performance chain model
M Al-Shawabkeh, MM Saudi, NHM Alwi
2012 IEEE Control and System Graduate Research Colloquium, 64-69, 2012
52012
E-Learning Assessment Application Based on Bloom Taxonomy.
M Rahmat, MM Saudi
International Journal of Learning 14 (9), 2008
52008
Knowledge structure on virus for user education
S Madihah, J Nazean
2006 International Conference on Computational Intelligence and Security 2 …, 2006
52006
The system can't perform the operation now. Try again later.
Articles 1–20