Dr. Madihah  Mohd Saudi
My Social Links

Dr. Madihah Mohd Saudi

Research Scientist
Universiti Sains Islam Malaysia, Malaysia


Highest Degree
Ph.D. in Computer Security from The University of Bradford, UK

Share this Profile

Area of Interest:

Computer Sciences
100%
Computer Security
62%
Software Engineering
90%
Network Security
75%
Management System
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
0
Abstracts
0

Selected Publications

  1. Zaizi, N.J.M. and M.M. Saudi, 2017. A new system call classification of mobile malwares for SMS exploitation. Adv. Sci. Lett., 23: 4565-4569.
    CrossRef  |  Direct Link  |  
  2. Yusof, M.B., M.B.M. Saudi and F. Ridzuan, 2017. A systematic review and analysis of mobile botnet detection for GPS exploitation. Adv. Sci. Lett., 23: 4696-4700.
    CrossRef  |  Direct Link  |  
  3. Sawese, K.G.A., M.M. Saudi and N.H Azman, 2017. New countermeasure approach on XML digital signature against wrapping attack. Adv. Sci. Lett., 23: 5168-5172.
  4. Saudi, M.M. and M.A.B. Husainiamer, 2017. Mobile malware classification via system calls and permission for GPS exploitation. Int. J. Adv. Comput. Sci. Applic., 8: 277-283.
    Direct Link  |  
  5. Ridzuan, F., Z. Shirzad, A.H. Azni and M.M. Saudi, 2017. Classification for Quran authentication using characters and diacritics hashed values. Adv. Sci. Lett., 23: 4692-4695.
    CrossRef  |  Direct Link  |  
  6. Kanaker, H., M.M. Saudi and N. Azman, 2017. Evaluation of EWCDMCC cloud worm detection classification based on statistical analysis. Adv. Sci. Lett., 23: 5365-5369.
  7. Hashim, H.A., M.M. Saudi and N.H. Azman, 2017. Detection of android botnet based on permission and API calls. Adv. Sci. Lett., 23: 5314-5317.
  8. Basir, N., N.F. Nabila, N.J.M. Zaizi, M.M. Saudi, F.H.M. Ridzuan and S.A. Pitchay, 2017. Intelligent Quranic ontology retrieval. Adv. Sci. Lett., 23: 4449-4453.
    CrossRef  |  Direct Link  |  
  9. Aliyu, A., M.M. Saudi and I. Abdullah, 2017. A review and proof of concept for phishing scam detection and response using apoptosis. Int. J. Adv. Comput. Sci. Applic., 8: 284-289.
    Direct Link  |  
  10. Al-Shawabkekh, M., M.M. Saudi, N.H.M. Alwi and N.H. Azman, 2017. Information security management systems (ISMS) and computer security self-efficacy (CSSE) model comparison. Adv. Sci. Lett., 23: 5237-5241.
  11. Al-Daeef, M.M., N. Basir and M.M. Saudi, 2017. Anti-phishing immune system. Adv. Sci. Lett., 23: 4745-4749.
    CrossRef  |  Direct Link  |  
  12. Ahmad, I.N., F. Ridzuan and M.M. Saudi, 2017. Optimizing the performance of mobile malware detection using the indexing rule. Adv. Sci. Lett., 23: 4627-4630.
    CrossRef  |  Direct Link  |  
  13. Abdullah, Z., M.M. Saudi and N.B. Anuar, 2017. ABC: Android botnet classification using feature selection and classification algorithms. Adv. Sci. Lett., 23: 4717-4720.
    CrossRef  |  Direct Link  |  
  14. Safee, M.A.M., M.M. Saudi, S.A. Pitchay and F. Ridzuan, 2016. A systematic review analysis for Quran verses retrieval. J. Eng. Applied Sci., 11: 629-634.
  15. Ahmad, I.N., F. Ridzuan, M.M. Saudi and S.A. Pitchay, 2016. Indexing android mobile malware. J. Eng. Applied Sci., 11: 369-374.
    Direct Link  |  
  16. Kanaker, H.M., M.M. Saudi and M.F. Marhusin, 2015. A systematic analysis on worm detection in cloud based systems. ARPN J. Eng. Applied Sci., 10: 540-548.
  17. Al-Shawabkekh, M., M.M. Saudi and N.H.M. Alwi, 2015. Computer security factors effects towards online usage of internet banking system. ARPN J. Eng. Applied Sci., 10: 532-539.
  18. Al-Daeef, M.M., N. Basir and M.M. Saudi, 2015. An anti-phishing tool to verify urls in Email's content. ARPN J. Eng. Applied Sci., 10: 1378-1382.
  19. Abd Rahman, M.Z., M.M. Saudi and N. Basir, 2015. A comprehensive review of mobile botnet detection using genetic algorithm: A systematic review. ARPN J. Eng. Applied Sci., 10: 1399-1404.
  20. Kanaker, H.M., M.M. Saudi and M.F. Marhusin, 2014. Detecting worm attacks in cloud computing environment: Proof of concept. Aust. J. Basic Applied Sci., 8: 120-124.
  21. Daw, D.A.A., K.B. Seman and M.B.M. Saudi, 2014. Forecasting the wimax traffic via modified artificial neural network model. Int. J. Artif. Intell. Applic., 5: 33-52.
  22. Saudi, M. and Z. Abdullah, 2013. An efficient framework to build up malware dataset. Int. J. Comput. Sci. Eng., 7: 512-518.
  23. Daw, D.A.A., K. Bin Seman and M.B.M. Saudi, 2013. Traffic evaluation in mobile wimax. Int. J. Eng. Res. Dev., 7: 82-92.
    Direct Link  |  
  24. Daw, D.A.A., K. Bin Seman and M.B.M. Saudi, 2013. A new algorithm for prediction wimax traffic based on artificial neural network models. Int. J. Artif. Intell. Neural Networks, 4: 26-32.
    Direct Link  |  
  25. AbuZaid, A.M., M.M. Saudi, B.M. Taib and Z. Abdullah, 2013. An efficient Trojan horse classifiaction (ETC). Int. J. Comput. Sci. Issues, 10: 96-104.
    Direct Link  |  
  26. Saudi, M.M., A.J. Cullen and M. Woodward, 2011. Efficient STAKCERT KDD processes in worm detection. World Acad. Sci. Eng. Technol. J., 55: 453-457.
  27. Azni, A.H., M.M. Saudi, A. Azman and A.S. Johari, 2009. Performance analysis of routing protocol for WSN using data centric approach. Int. J. Electr. Electron. Eng., 2: 66-69.