Dr. Madihah Mohd Saudi
Research ScientistUniversiti Sains Islam Malaysia, Malaysia
Highest Degree
Ph.D. in Computer Security from The University of Bradford, UK
Share this Profile
Area of Interest:
Selected Publications
- Zaizi, N.J.M. and M.M. Saudi, 2017. A new system call classification of mobile malwares for SMS exploitation. Adv. Sci. Lett., 23: 4565-4569.
CrossRef | Direct Link | - Yusof, M.B., M.B.M. Saudi and F. Ridzuan, 2017. A systematic review and analysis of mobile botnet detection for GPS exploitation. Adv. Sci. Lett., 23: 4696-4700.
CrossRef | Direct Link | - Sawese, K.G.A., M.M. Saudi and N.H Azman, 2017. New countermeasure approach on XML digital signature against wrapping attack. Adv. Sci. Lett., 23: 5168-5172.
- Saudi, M.M. and M.A.B. Husainiamer, 2017. Mobile malware classification via system calls and permission for GPS exploitation. Int. J. Adv. Comput. Sci. Applic., 8: 277-283.
Direct Link | - Ridzuan, F., Z. Shirzad, A.H. Azni and M.M. Saudi, 2017. Classification for Quran authentication using characters and diacritics hashed values. Adv. Sci. Lett., 23: 4692-4695.
CrossRef | Direct Link | - Kanaker, H., M.M. Saudi and N. Azman, 2017. Evaluation of EWCDMCC cloud worm detection classification based on statistical analysis. Adv. Sci. Lett., 23: 5365-5369.
- Hashim, H.A., M.M. Saudi and N.H. Azman, 2017. Detection of android botnet based on permission and API calls. Adv. Sci. Lett., 23: 5314-5317.
- Basir, N., N.F. Nabila, N.J.M. Zaizi, M.M. Saudi, F.H.M. Ridzuan and S.A. Pitchay, 2017. Intelligent Quranic ontology retrieval. Adv. Sci. Lett., 23: 4449-4453.
CrossRef | Direct Link | - Aliyu, A., M.M. Saudi and I. Abdullah, 2017. A review and proof of concept for phishing scam detection and response using apoptosis. Int. J. Adv. Comput. Sci. Applic., 8: 284-289.
Direct Link | - Al-Shawabkekh, M., M.M. Saudi, N.H.M. Alwi and N.H. Azman, 2017. Information security management systems (ISMS) and computer security self-efficacy (CSSE) model comparison. Adv. Sci. Lett., 23: 5237-5241.
- Al-Daeef, M.M., N. Basir and M.M. Saudi, 2017. Anti-phishing immune system. Adv. Sci. Lett., 23: 4745-4749.
CrossRef | Direct Link | - Ahmad, I.N., F. Ridzuan and M.M. Saudi, 2017. Optimizing the performance of mobile malware detection using the indexing rule. Adv. Sci. Lett., 23: 4627-4630.
CrossRef | Direct Link | - Abdullah, Z., M.M. Saudi and N.B. Anuar, 2017. ABC: Android botnet classification using feature selection and classification algorithms. Adv. Sci. Lett., 23: 4717-4720.
CrossRef | Direct Link | - Safee, M.A.M., M.M. Saudi, S.A. Pitchay and F. Ridzuan, 2016. A systematic review analysis for Quran verses retrieval. J. Eng. Applied Sci., 11: 629-634.
- Ahmad, I.N., F. Ridzuan, M.M. Saudi and S.A. Pitchay, 2016. Indexing android mobile malware. J. Eng. Applied Sci., 11: 369-374.
Direct Link | - Kanaker, H.M., M.M. Saudi and M.F. Marhusin, 2015. A systematic analysis on worm detection in cloud based systems. ARPN J. Eng. Applied Sci., 10: 540-548.
- Al-Shawabkekh, M., M.M. Saudi and N.H.M. Alwi, 2015. Computer security factors effects towards online usage of internet banking system. ARPN J. Eng. Applied Sci., 10: 532-539.
- Al-Daeef, M.M., N. Basir and M.M. Saudi, 2015. An anti-phishing tool to verify urls in Email's content. ARPN J. Eng. Applied Sci., 10: 1378-1382.
- Abd Rahman, M.Z., M.M. Saudi and N. Basir, 2015. A comprehensive review of mobile botnet detection using genetic algorithm: A systematic review. ARPN J. Eng. Applied Sci., 10: 1399-1404.
- Kanaker, H.M., M.M. Saudi and M.F. Marhusin, 2014. Detecting worm attacks in cloud computing environment: Proof of concept. Aust. J. Basic Applied Sci., 8: 120-124.
- Daw, D.A.A., K.B. Seman and M.B.M. Saudi, 2014. Forecasting the wimax traffic via modified artificial neural network model. Int. J. Artif. Intell. Applic., 5: 33-52.
- Saudi, M. and Z. Abdullah, 2013. An efficient framework to build up malware dataset. Int. J. Comput. Sci. Eng., 7: 512-518.
- Daw, D.A.A., K. Bin Seman and M.B.M. Saudi, 2013. Traffic evaluation in mobile wimax. Int. J. Eng. Res. Dev., 7: 82-92.
Direct Link | - Daw, D.A.A., K. Bin Seman and M.B.M. Saudi, 2013. A new algorithm for prediction wimax traffic based on artificial neural network models. Int. J. Artif. Intell. Neural Networks, 4: 26-32.
Direct Link | - AbuZaid, A.M., M.M. Saudi, B.M. Taib and Z. Abdullah, 2013. An efficient Trojan horse classifiaction (ETC). Int. J. Comput. Sci. Issues, 10: 96-104.
Direct Link | - Saudi, M.M., A.J. Cullen and M. Woodward, 2011. Efficient STAKCERT KDD processes in worm detection. World Acad. Sci. Eng. Technol. J., 55: 453-457.
- Azni, A.H., M.M. Saudi, A. Azman and A.S. Johari, 2009. Performance analysis of routing protocol for WSN using data centric approach. Int. J. Electr. Electron. Eng., 2: 66-69.