Digital audio steganography: Systematic review, classification, and analysis of the current state of the art AA AlSabhany, AH Ali, F Ridzuan, AH Azni, MR Mokhtar Computer Science Review 38, 100316, 2020 | 60 | 2020 |
A new mobile botnet classification based on permission and API calls M Yusof, MM Saudi, F Ridzuan 2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017 | 36 | 2017 |
Text steganography using extensions Kashida based on the moon and sun letters concept AA Shaker, F Ridzuan, SA Pitchay international journal of advanced computer science and applications, 2017 | 32 | 2017 |
The adaptive multi-level phase coding method in audio steganography AA Alsabhany, F Ridzuan, AH Azni IEEE Access 7, 129291-129306, 2019 | 28 | 2019 |
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi | 22 | 2015 |
Hybrid search approach for retrieving Medical and Health Science knowledge from Quran MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ... International Journal of Engineering and Technology (UAE), 2018 | 19 | 2018 |
Key parameters in identifying cost of spam 2.0 F Ridzuan, V Potdar, A Talevski, WF Smyth 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 15 | 2010 |
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud IEEE Access 8, 198646-198658, 2020 | 13 | 2020 |
Mobile botnet classification by using hybrid analysis M Yusof, MM Saudi, F Ridzuan International Journal of Engineering and Technology (UAE), 2018 | 11 | 2018 |
The progressive multilevel embedding method for audio steganography AA Alsabhany, F Ridzuan, AH Azni Journal of physics: conference series 1551 (1), 012011, 2020 | 10 | 2020 |
Spam 2.0: The problem ahead V Potdar, F Ridzuan, P Hayati, A Talevski, EA Yeganeh, N Firuzeh, ... Computational Science and Its Applications–ICCSA 2010: International …, 2010 | 9 | 2010 |
Factors involved in estimating cost of email spam F Ridzuan, V Potdar, A Talevski Computational Science and Its Applications–ICCSA 2010: International …, 2010 | 9 | 2010 |
Balancing the trade-off between capacity and imperceptibility for least significant bit audio steganography method: A new parameter MHN Azam, F Ridzuan, MNSM Sayuti, AA Alsabhany 2019 IEEE Conference on Application, Information and Network Security (AINS …, 2019 | 8 | 2019 |
A new android botnet classification for GPS exploitation based on permission and API calls M Yusof, MM Saudi, F Ridzuan AETA 2017-Recent Advances in Electrical Engineering and Related Sciences …, 2018 | 8 | 2018 |
A systematic review analysis for Quran verses retrieval SA Pitchay, F Ridzuan Journal of Engineering and Applied Sciences 100 (3), 629-634, 2016 | 8 | 2016 |
Systematic Literature Review: Trend Analysis on the Design of Lightweight Block Cipher AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud Journal of King Saud University-Computer and Information Sciences 35 (5), 101550, 2023 | 7 | 2023 |
LAO-3D: A symmetric lightweight block cipher based on 3D permutation for mobile encryption application AA Zakaria, AH Ab Halim, F Ridzuan, NH Zakaria, M Daud Symmetry 14 (10), 2042, 2022 | 7 | 2022 |
Randomness analysis on RECTANGLE block cipher AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud Cryptol. Inf. Secur. Conf, 133-142, 2020 | 6 | 2020 |
Android mobile malware classification using a tokenization approach IN Ahmad, F Ridzuan, MM Saudi, SA Pitchay, N Basir, NF Nabila Transactions on Engineering Technologies: World Congress on Engineering and …, 2019 | 6 | 2019 |
A systematic review on semantic-based ontology for Quranic knowledge ASM Rusli, F Ridzuan, ZM Zaki, MNSM Sayuti, RA Salam International Journal of Engineering and Technology (UAE), 2018 | 6 | 2018 |