Follow
Isredza Rahmi A HAMID
Title
Cited by
Cited by
Year
Hybrid feature selection for phishing email detection
IR A Hamid, J Abawajy
International Conference on Algorithms and Architectures for Parallel …, 2011
682011
Using feature selection and classification scheme for automating phishing email detection
IRA Hamid, J Abawajy, TH Kim
Studies in informatics and control 22 (1), 61-70, 2013
552013
An approach for profiling phishing activities
IRA Hamid, JH Abawajy
Computers & Security 45, 27-41, 2014
432014
Enhancing trust management in cloud environment
SK Chong, J Abawajy, M Ahmad, IRA Hamid
Procedia-Social and Behavioral Sciences 129, 314-321, 2014
402014
Android malware detection based on network traffic using decision tree algorithm
A Zulkifli, IRA Hamid, WM Shah, Z Abdullah
International Conference on Soft Computing and Data Mining, 485-494, 2018
362018
Phishing email feature selection approach
IRA Hamid, J Abawajy
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
312011
Face recognition for criminal identification: An implementation of principal component analysis for face recognition
NA Abdullah, MJ Saidi, NHA Rahman, CC Wen, IRA Hamid
AIP conference proceedings 1891 (1), 020002, 2017
292017
Investigating machine learning techniques for detection of depression using structural MRI volumetric features
K Kipli, AZ Kouzani, IRA Hamid
International journal of bioscience, biochemistry and bioinformatics 3 (5 …, 2013
232013
Profiling phishing email based on clustering approach
IRA Hamid, JH Abawajy
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
212013
A review of live survey application: SurveyMonkey and SurveyGizmo
M Abd Halim, CFM Foozy, I Rahmi, A Mustapha
JOIV: International Journal on Informatics Visualization 2 (4-2), 309-312, 2018
182018
Generic Assessment Rubrics for Computer Programming Courses.
A Mustapha, NA Samsudin, N Arbaiy, R Mohammed, IR Hamid
Turkish Online Journal of Educational Technology-TOJET 15 (1), 53-68, 2016
182016
Android ransomware detection based on dynamic obtained features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
International Conference on Soft Computing and Data Mining, 121-129, 2020
142020
A multilevel trust management framework for service oriented environment
SK Chong, J Abawajy, IRA Hamid, M Ahmad
Procedia-Social and Behavioral Sciences 129, 396-405, 2014
112014
Audio Steganography with Embedded Text
CT Jian, CC Wen, NHBA Rahman, IRBA Hamid
Universiti Tun Hussein Onn Malaysia, 2016
82016
Using weighted based feature selection technique for Android malware detection
NH Mazlan, IRA Hamid
International Conference on Mobile and Wireless Technology, 54-64, 2017
62017
Extended local mean-based nonparametric classifier for cervical cancer screening
NA Samsudin, A Mustapha, N Arbaiy, IRA Hamid
International Conference on Soft Computing and Data Mining, 386-395, 2016
62016
Network monitoring system to detect unauthorized connection
IRA Hamid, NHA Sukor, CFM Foozy, Z Abdullah
Acta Electronica Malaysia 1 (2), 13-16, 2017
52017
One-way ANOVA model with fuzzy data for consumer demand
PC Lin, N Arbaiy, IRA Hamid
International Conference on Soft Computing and Data Mining, 111-121, 2016
52016
Radio Frequency Identification (RFID) Based Car Parking System
MS Mazlan, IRA Hamid, H Kamaludin
JOIV: International Journal on Informatics Visualization 2 (4-2), 318-322, 2018
32018
Preserving anonymity in e-voting system using voter non-repudiation oriented scheme
IRA Hamid, SNM Radzi, NHA Rahman, CC Wen, NA Abdullah
AIP Conference Proceedings 1891 (1), 020017, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20