Mobile malware classification via system calls and permission for GPS exploitation MM Saudi International journal of advanced computer science and applications 8 (6), 2017 | 12 | 2017 |
Malware Classification for Cyber Physical System (CPS) based on Phylogenetics Madihah Mohd Saudi, Sazali Sukardi, Noor Azwa Azreen Abd Aziz, Azuan Ahmad ... International Journal of Engineering & Advanced Technology (IJEAT) 9 (1 …, 2019 | 4* | 2019 |
Securing mobile applications against mobile malware attacks: A case study MA Husainiamer, MM Saudi, M Yusof 2021 IEEE 19th Student Conference on Research and Development (SCOReD), 433-438, 2021 | 3 | 2021 |
Mobile Malware Classification based on Phylogenetics Madihah Mohd Saudi, Sazali Sukardi, Amirul Syauqi Mohamad Syafiq, Azuan ... International Journal of Engineering & Advanced Technology (IJEAT) 9 (1 …, 2019 | 3* | 2019 |
iOS mobile malware analysis: a state-of-the-art M Mohd Saudi, MA Husainiamer, A Ahmad, MYI Idris Journal of Computer Virology and Hacking Techniques, 1-30, 2023 | 2 | 2023 |
Gaming Mobile Applications: Proof of Concept for Security Exploitation MH Saudi Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (8 …, 2021 | 2 | 2021 |
Mobile malware classification for ios inspired by phylogenetics MA Husainiamer, MM Saudi, A Ahmad, ASM Syafiq International Journal of Advanced Computer Science and Applications 12 (8), 2021 | 2 | 2021 |
Risk Management Using PESTLE: External Factors Trigger COVID-19 Transmission MM Saudi, A Ahmad, MNM Liki, MA Husainiamer 2021 International Conference on Intelligent Cybernetics Technology …, 2021 | 2 | 2021 |
Classification for iOS mobile malware inspired by phylogenetic: Proof of concept MA Husainiamer, MM Saudi, A Ahmad 2020 IEEE Conference on Open Systems (ICOS), 59-63, 2020 | 2 | 2020 |
Mobile malware classification for social media application MM Saudi, A Ahmad, SRM Kassim, MA Husainiamer, AZ Kassim, NJ Zaizi 2019 International Conference on Cybersecurity (ICoCSec), 70-75, 2019 | 2 | 2019 |
CallDetect: detection of call log exploitation inspired by apoptosis MM Saudi, A Adli, C Ismail, A Ahmad, HM Afif Int. J. Adv. Sci. Eng. Inf. Technol. 10 (5), 1792-1797, 2021 | 1 | 2021 |