Dr. Madihah Mohd Saudi

Research Scientist
Universiti Sains Islam Malaysia, Malaysia


Highest Degree
Ph.D. in Computer Security from The University of Bradford, UK

Share this Profile

Area of Interest:

Computer Sciences
Computer Security
Software Engineering
Network Security
Management System

Selected Publications

  1. Zaizi, N.J.M. and M.M. Saudi, 2017. A new system call classification of mobile malwares for SMS exploitation. Adv. Sci. Lett., 23: 4565-4569.
    CrossRef  |  Direct Link  |  

  2. Yusof, M.B., M.B.M. Saudi and F. Ridzuan, 2017. A systematic review and analysis of mobile botnet detection for GPS exploitation. Adv. Sci. Lett., 23: 4696-4700.
    CrossRef  |  Direct Link  |  

  3. Sawese, K.G.A., M.M. Saudi and N.H Azman, 2017. New countermeasure approach on XML digital signature against wrapping attack. Adv. Sci. Lett., 23: 5168-5172.

  4. Saudi, M.M. and M.A.B. Husainiamer, 2017. Mobile malware classification via system calls and permission for GPS exploitation. Int. J. Adv. Comput. Sci. Applic., 8: 277-283.
    Direct Link  |  

  5. Ridzuan, F., Z. Shirzad, A.H. Azni and M.M. Saudi, 2017. Classification for Quran authentication using characters and diacritics hashed values. Adv. Sci. Lett., 23: 4692-4695.
    CrossRef  |  Direct Link  |  

  6. Kanaker, H., M.M. Saudi and N. Azman, 2017. Evaluation of EWCDMCC cloud worm detection classification based on statistical analysis. Adv. Sci. Lett., 23: 5365-5369.

  7. Hashim, H.A., M.M. Saudi and N.H. Azman, 2017. Detection of android botnet based on permission and API calls. Adv. Sci. Lett., 23: 5314-5317.

  8. Basir, N., N.F. Nabila, N.J.M. Zaizi, M.M. Saudi, F.H.M. Ridzuan and S.A. Pitchay, 2017. Intelligent Quranic ontology retrieval. Adv. Sci. Lett., 23: 4449-4453.
    CrossRef  |  Direct Link  |  

  9. Aliyu, A., M.M. Saudi and I. Abdullah, 2017. A review and proof of concept for phishing scam detection and response using apoptosis. Int. J. Adv. Comput. Sci. Applic., 8: 284-289.
    Direct Link  |  

  10. Al-Shawabkekh, M., M.M. Saudi, N.H.M. Alwi and N.H. Azman, 2017. Information security management systems (ISMS) and computer security self-efficacy (CSSE) model comparison. Adv. Sci. Lett., 23: 5237-5241.

  11. Al-Daeef, M.M., N. Basir and M.M. Saudi, 2017. Anti-phishing immune system. Adv. Sci. Lett., 23: 4745-4749.
    CrossRef  |  Direct Link  |  

  12. Ahmad, I.N., F. Ridzuan and M.M. Saudi, 2017. Optimizing the performance of mobile malware detection using the indexing rule. Adv. Sci. Lett., 23: 4627-4630.
    CrossRef  |  Direct Link  |  

  13. Abdullah, Z., M.M. Saudi and N.B. Anuar, 2017. ABC: Android botnet classification using feature selection and classification algorithms. Adv. Sci. Lett., 23: 4717-4720.
    CrossRef  |  Direct Link  |  

  14. Safee, M.A.M., M.M. Saudi, S.A. Pitchay and F. Ridzuan, 2016. A systematic review analysis for Quran verses retrieval. J. Eng. Applied Sci., 11: 629-634.

  15. Ahmad, I.N., F. Ridzuan, M.M. Saudi and S.A. Pitchay, 2016. Indexing android mobile malware. J. Eng. Applied Sci., 11: 369-374.
    Direct Link  |  

  16. Kanaker, H.M., M.M. Saudi and M.F. Marhusin, 2015. A systematic analysis on worm detection in cloud based systems. ARPN J. Eng. Applied Sci., 10: 540-548.

  17. Al-Shawabkekh, M., M.M. Saudi and N.H.M. Alwi, 2015. Computer security factors effects towards online usage of internet banking system. ARPN J. Eng. Applied Sci., 10: 532-539.

  18. Al-Daeef, M.M., N. Basir and M.M. Saudi, 2015. An anti-phishing tool to verify urls in Email's content. ARPN J. Eng. Applied Sci., 10: 1378-1382.

  19. Abd Rahman, M.Z., M.M. Saudi and N. Basir, 2015. A comprehensive review of mobile botnet detection using genetic algorithm: A systematic review. ARPN J. Eng. Applied Sci., 10: 1399-1404.

  20. Kanaker, H.M., M.M. Saudi and M.F. Marhusin, 2014. Detecting worm attacks in cloud computing environment: Proof of concept. Aust. J. Basic Applied Sci., 8: 120-124.

  21. Daw, D.A.A., K.B. Seman and M.B.M. Saudi, 2014. Forecasting the wimax traffic via modified artificial neural network model. Int. J. Artif. Intell. Applic., 5: 33-52.

  22. Saudi, M. and Z. Abdullah, 2013. An efficient framework to build up malware dataset. Int. J. Comput. Sci. Eng., 7: 512-518.

  23. Daw, D.A.A., K. Bin Seman and M.B.M. Saudi, 2013. Traffic evaluation in mobile wimax. Int. J. Eng. Res. Dev., 7: 82-92.
    Direct Link  |  

  24. Daw, D.A.A., K. Bin Seman and M.B.M. Saudi, 2013. A new algorithm for prediction wimax traffic based on artificial neural network models. Int. J. Artif. Intell. Neural Networks, 4: 26-32.
    Direct Link  |  

  25. AbuZaid, A.M., M.M. Saudi, B.M. Taib and Z. Abdullah, 2013. An efficient Trojan horse classifiaction (ETC). Int. J. Comput. Sci. Issues, 10: 96-104.
    Direct Link  |  

  26. Saudi, M.M., A.J. Cullen and M. Woodward, 2011. Efficient STAKCERT KDD processes in worm detection. World Acad. Sci. Eng. Technol. J., 55: 453-457.

  27. Azni, A.H., M.M. Saudi, A. Azman and A.S. Johari, 2009. Performance analysis of routing protocol for WSN using data centric approach. Int. J. Electr. Electron. Eng., 2: 66-69.