Ahmad Firdaus
Universiti Malaysia Pahang
H-index: 17
Asia-Malaysia
Top articles of Ahmad Firdaus
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review | Journal of Cyber Security and Mobility | Syed Shuja Hussain Mohd Faizal Ab Razak Ahmad Firdaus | 2023/12/5 |
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA) | Journal of Intelligent & Fuzzy Systems | Nur Khairani Kamarudin Ahmad Firdaus Azlee Zabidi Ferda Ernawan Syifak Izhar Hisham | 2023/4 |
CAGDEEP: Mobile Malware Analysis Using Force Atlas 2 with Strong Gravity Call Graph And Deep Learning | Nur Khairani Kamarudin Ahmad Firdaus Azlee Zabidi Mohd Faizal Ab Razak | 2023/8/25 | |
Machine Learning Technique for Phishing Website Detection | Nurul Amira Binti Mohd Zin Mohd Faizal Ab Razak Ahmad Firdaus Ferda Ernawan Nor Saradatul Akmar Zulkifli | 2023/8/25 | |
Cloud of Word vs DroidKungfu: Performance Evaluation in Detecting Root Exploit Malware with Deep Learning Approach | Che Akmal Che Yahaya Ahmad Firdaus Azlee Zabidi Noor Akma Bt Abu Bakar Mukrimah Bt Nawir | 2023/8/25 | |
Auto–Transition in RADG based on chaotic System | Iraqi Journal For Computer Science and Mathematics | LAITH KADHUM Ahmad Firdaus Mohamad Fadli Bin Zolkipli Syifak Izhar Hisham Luhur Bayuaji | 2023/3/22 |
Evaluation of Boruta algorithm in DDoS detection | Egyptian Informatics Journal | Noor Farhana Ahmad Firdaus Mohd Faaizie Darmawan Mohd Faizal Ab Razak | 2023/3/1 |
The Relevance of Bibliometric Analysis to Discover the Area’ s Research Efforts: Root Exploit Evolution | JOIV: International Journal on Informatics Visualization | Che Akmal Che Yahaya Ahmad Firdaus Ferda Ernawan Wan Isni Sofiah Wan Din | 2022/8/7 |
Understanding COVID-19 halal vaccination discourse on Facebook and Twitter using aspect-based sentiment analysis and text emotion analysis | International Journal of Environmental Research and Public Health | Ali Feizollah Nor Badrul Anuar Riyadh Mehdi Ahmad Firdaus Ainin Sulaiman | 2022/5/21 |
The Summer Heat of Cryptojacking Season: Detecting Cryptojacking using Heatmap and Fuzzy | Ahmad Firdaus Ghassan Saleh AlDharhani Zahian Ismail Mohd Faizal Ab Razak | 2022/10/6 | |
Systematic Description of The Internet of Things: A Bibliometric Analysis | Journal of Theoretical and Applied Information Technology | M IZHAM JAYA MOHD FAIZAL AB RAZAK DANAKORN NINCAREAN EH PHON SYIFAK IZHAR HISHAM AHMAD FIRDAUS | 2022/5/15 |
Comparative analysis of machine learning classifiers for phishing detection | Sachin Dahiya Tarun Gulati Dushyant Gupta Karan Kumar BD Parameshachari | 2023/2/24 | |
The rise of ransomware: A review of attacks, detection techniques, and future challenges | Samar Kamil Huda Sheikh Abdullah Siti Norul Ahmad Firdaus Opeyemi Lateef Usman | 2022/2/16 | |
A Bayesian probability model for Android malware detection | ICT Express | Sharfah Ratibah Tuan Mat Mohd Faizal Ab Razak Mohd Nizam Mohmad Kahar Juliza Mohamad Arif Ahmad Firdaus | 2022/9/1 |
Three layer authentications with a spiral block mapping to prove authenticity in medical images | International Journal of Advanced Computer Science and Applications | Ferda Ernawan Afrig Aminuddin Danakorn Nincarean Mohd Faizal Ab Razak Ahmad Firdaus | 2022 |
Trojan Detection System Using Machine Learning Approach | Indonesian Journal of Information Systems | Mohd Faizal Ab Razak M Izham Jaya Zahian Ismail Ahmad Firdaus | 2022/8/28 |
New formula to calculate the number of designs in RADG cryptosystem | International Journal of Nonlinear Analysis and Applications | Laith M Kadhum Ahmad Firdaus Mohamad Fadli Zolkiplib Luay Saferalia Ab Razaka | 2021/4/1 |
A review: Static analysis of android malware and detection technique | Juliza Mohamad Arif Mohd Faizal Ab Razak Suryanti Awang Sharfah Ratibah Tuan Mat Nor Syahidatul Nadiah Ismail | 2021/8/24 | |
The Central Bank Digital Currency in Malaysia: A Literature Review | Normi Sham Awang Abu Bakar Norzariyah Yahya Irni Eliana Khairuddin Ahmad Firdaus Zainal Abidin Jasni Mohamad Zain | 2021/11/6 | |
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches | Hazim Hanif Mohd Hairul Nizam Md Nasir Mohd Faizal Ab Razak Ahmad Firdaus Nor Badrul Anuar | 2021/4/1 |