Isredza Rahmi A. Hamid

Orcid: 0000-0002-4269-0762

According to our database1, Isredza Rahmi A. Hamid authored at least 14 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander.
PeerJ Comput. Sci., 2024

2022
Android Botnet Detection Based on Network Analysis Using Machine Learning Algorithm.
Proceedings of the Recent Advances in Soft Computing and Data Mining, 2022

2021
Data Wiping Tool: ByteEditor Technique.
Proceedings of the 3rd International Cyber Resilience Conference, 2021

2020
Classification of Metamorphic Virus Using N-Grams Signatures.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2020

Android Ransomware Detection Based on Dynamic Obtained Features.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2020

2018
Android Malware Detection Based on Network Traffic Using Decision Tree Algorithm.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

Comparative Studies of Information Retrieval Approaches in User-Centered Health Information System.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

2016
Extended Local Mean-Based Nonparametric Classifier for Cervical Cancer Screening.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

One-Way ANOVA Model with Fuzzy Data for Consumer Demand.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

Dynamic Trackback Strategy for Email-Born Phishing Using Maximum Dependency Algorithm (MDA).
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

2014
An approach for profiling phishing activities.
Comput. Secur., 2014

2013
Profiling Phishing Email Based on Clustering Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2011
Phishing Email Feature Selection Approach.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Hybrid Feature Selection for Phishing Email Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011


  Loading...