Madihah Mohd Saudi

Orcid: 0000-0001-9120-1702

According to our database1, Madihah Mohd Saudi authored at least 19 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Recent Assessment for the Ransomware Attacks Against the Internet of Medical Things (IoMT): A Review.
Proceedings of the 13th IEEE International Conference on Control System, 2023

2022
Phishing Detection and Prevention using Chrome Extension.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

2020
Android Ransomware Detection Based on Dynamic Obtained Features.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2020

Crytojacking Classification based on Machine Learning Algorithm.
Proceedings of the ICCBN 2020: 8th International Conference on Communications and Broadband Networking, 2020

2019
Detection of Social Media Exploitation via SMS and Camera.
Int. J. Interact. Mob. Technol., 2019

A New Cryptojacking Malware Classifier Model Based on Dendritic Cell Algorithm.
Proceedings of the ICVISP 2019: 3rd International Conference on Vision, 2019

2018
State of the Art Intrusion Detection System for Cloud Computing.
Int. J. Commun. Networks Inf. Secur., 2018

Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System.
Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, 2018

2017
A new mobile botnet classification based on permission and API calls.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

2016
A New Mobile Malware Classification for SMS Exploitation.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

2015
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

An Efficient Easy Computer Emergency Response Team Malware Reservoir System(eZCERT).
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

Using Probability Theory to Identify the Unsure Value of an Incomplete Sentence.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

Domain-Specific Inter-textual Non-taxonomic Extraction (DSINTE).
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

2009
STAKCERT Framework in Eradicating Worms Attack.
Proceedings of the 2009 International Conference on CyberWorlds, 2009

2008
Reverse Engineering: EDOWA Worm Analysis and Classification.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

Needleman Wunsch Implementation for SPAM/UCE Inline Filter.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

2006
An Efficient Control of Virus Propagation.
Proceedings of the Pacific Asia Conference on Information Systems, 2006


  Loading...