Cik Feresa binti Mohd Foozy
Cik Feresa binti Mohd Foozy
Lecturer
Verified email at uthm.edu.my
TitleCited byYear
Generic taxonomy of social engineering attack
F Mohd Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas' ud
342011
Phishing detection taxonomy for mobile device
CF Mohd Foozy, R Ahmad, MF Abdollah
International Journal of Computer Science Issues 10 (1), 338-344, 2013
192013
Customer profiling using classification approach for bank telemarketing
S Palaniappan, A Mustapha, CFM Foozy, R Atan
JOIV: International Journal on Informatics Visualization 1 (4-2), 214-217, 2017
52017
Network monitoring system to detect unauthorized connection
IRA Hamid, NHA Sukor, CFM Foozy, Z Abdullah
Acta Electronica Malaysia 1 (2), 13-16, 2017
42017
A Practical Rule Based Technique by Splitting SMS Phishing from SMS Spam for Better Accuracy in Mobile Device
C. Mohd Foozy, Ahmad, R., Abdollah, M.
International Review on Computers and Software (IRECOS) 9 (1), 8, 2014
4*2014
A watermarking authentication system for medical images
AM Zeki, AA Manaf, CFM Foozy, SS Mahmod
World Congress on Engineering and Technology (CET 2011), Shanghai, China, 2011
42011
A Comparative Study with RapidMiner and WEKA Tools over some Classification Techniques for SMS Spam
CFM Foozy, R Ahmad, MAF Abdollah, CC Wen
IOP Conference Series: Materials Science and Engineering 226 (1), 012100, 2017
32017
A framework for SMS spam and phishing detection in Malay Language: a case study
C. Mohd Foozy, Ahmad, R., Abdollah, M.
International Review on Computers and Software 9 (7), 1248-1254, 2014
32014
Digital watermarking for mammogram authentication
AA Manaf, AM Zeki, CFM Foozy
International Conference on Fundamental & Applied Sciences, 15-17, 2010
22010
YouTube Spam Comment Detection Using Support Vector Machine and K–Nearest Neighbor
A Aziz, CFM Foozy, P Shamala, Z Suradi
Indonesian Journal of Electrical Engineering and Computer Science 12 (2 …, 2018
12018
IMPROVING SECURITY AND PRIVACY REQUIREMENT FOR
SF Daud, NC Pa, A Mustapha, CFM Foozy
ZIBELINE 1 (2), 7-8, 2017
12017
Android Botnet Detection by Classification Techniques
AZB Majit, P Shamala, CFM Foozy, CC Wen, M Chinniah
International Conference on Soft Computing and Data Mining, 109-120, 2020
2020
Android Ransomware Detection Based on Dynamic Obtained Features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
International Conference on Soft Computing and Data Mining, 121-129, 2020
2020
Source Camera Identification for Online Social Network Images Using Texture Feature
N Rahim, CFM Foozy
International Conference on Soft Computing and Data Mining, 283-296, 2020
2020
Header Based Email Spam Detection Framework Using Support Vector Machine (SVM) Technique
SA Khamis, CFM Foozy, MF Ab Aziz, N Rahim
International Conference on Soft Computing and Data Mining, 57-65, 2020
2020
Classification of Metamorphic Virus Using N-Grams Signatures
IRA Hamid, NSM Sani, Z Abdullah, CFM Foozy, K Kipli
International Conference on Soft Computing and Data Mining, 140-149, 2020
2020
A Generic Review of Messenger Application: Wechat And Whatsapp
EBA Apon, CFM Foozy, P Shamala
International Journal of Advanced Science Computing and Engineering 1 (1), 15-23, 2019
2019
A Generic Review of Web Technology: DJango and Flask
N Idris, CFM Foozy, P Shamala
International Journal of Engineering Information Computing and Application 1 (1), 2019
2019
Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack
CC Wen, A Vivegan, L Samylingam, I Darmawan, PSS Palaniappan, ...
International Journal of Integrated Engineering 10 (6), 2018
2018
Information Structure Framework for ISMS Planning and Certification: Malaysian Data
P Shamala, M Chinniah, CFM Foozy, CC Wen, A Mustapha, R Ahmad
Indonesian Journal of Electrical Engineering and Computer Science 12 (2 …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20