Follow
Farida Ridzuan
Title
Cited by
Cited by
Year
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art
AA AlSabhany, AH Ali, F Ridzuan, AH Azni, MR Mokhtar
Computer Science Review 38, 100316, 2020
542020
A new mobile botnet classification based on permission and API calls
M Yusof, MM Saudi, F Ridzuan
2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017
362017
Text steganography using extensions Kashida based on the moon and sun letters concept
AA Shaker, F Ridzuan, SA Pitchay
international journal of advanced computer science and applications, 2017
312017
The adaptive multi-level phase coding method in audio steganography
AA Alsabhany, F Ridzuan, AH Azni
IEEE Access 7, 129291-129306, 2019
282019
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing
SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi
212015
Hybrid search approach for retrieving Medical and Health Science knowledge from Quran
MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ...
International Journal of Engineering and Technology (UAE), 2018
192018
Key parameters in identifying cost of spam 2.0
F Ridzuan, V Potdar, A Talevski, WF Smyth
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
152010
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
IEEE Access 8, 198646-198658, 2020
132020
Mobile botnet classification by using hybrid analysis
M Yusof, MM Saudi, F Ridzuan
International Journal of Engineering and Technology (UAE), 2018
112018
The progressive multilevel embedding method for audio steganography
AA Alsabhany, F Ridzuan, AH Azni
Journal of physics: conference series 1551 (1), 012011, 2020
102020
Spam 2.0: The problem ahead
V Potdar, F Ridzuan, P Hayati, A Talevski, EA Yeganeh, N Firuzeh, ...
Computational Science and Its Applications–ICCSA 2010: International …, 2010
92010
Factors involved in estimating cost of email spam
F Ridzuan, V Potdar, A Talevski
Computational Science and Its Applications–ICCSA 2010: International …, 2010
92010
Balancing the trade-off between capacity and imperceptibility for least significant bit audio steganography method: A new parameter
MHN Azam, F Ridzuan, MNSM Sayuti, AA Alsabhany
2019 IEEE Conference on Application, Information and Network Security (AINS …, 2019
82019
A new android botnet classification for GPS exploitation based on permission and API calls
M Yusof, MM Saudi, F Ridzuan
AETA 2017-Recent Advances in Electrical Engineering and Related Sciences …, 2018
82018
A systematic review analysis for Quran verses retrieval
SA Pitchay, F Ridzuan
Journal of Engineering and Applied Sciences 100 (3), 629-634, 2016
82016
Systematic Literature Review: Trend Analysis on the Design of Lightweight Block Cipher
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
Journal of King Saud University-Computer and Information Sciences 35 (5), 101550, 2023
62023
LAO-3D: A symmetric lightweight block cipher based on 3D permutation for mobile encryption application
AA Zakaria, AH Ab Halim, F Ridzuan, NH Zakaria, M Daud
Symmetry 14 (10), 2042, 2022
62022
Android mobile malware classification using a tokenization approach
IN Ahmad, F Ridzuan, MM Saudi, SA Pitchay, N Basir, NF Nabila
Transactions on Engineering Technologies: World Congress on Engineering and …, 2019
62019
A systematic review on semantic-based ontology for Quranic knowledge
ASM Rusli, F Ridzuan, ZM Zaki, MNSM Sayuti, RA Salam
International Journal of Engineering and Technology (UAE), 2018
62018
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
NAN Abdullah, NH Zakaria, AH Ab Halim, FHM Ridzuan, A Ahmad, ...
Journal of Sustainability Science and Management, 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20