Hybrid feature selection for phishing email detection IR A. Hamid, J Abawajy Algorithms and Architectures for Parallel Processing: 11th International …, 2011 | 79 | 2011 |
Face recognition for criminal identification: An implementation of principal component analysis for face recognition NA Abdullah, MJ Saidi, NHA Rahman, CC Wen, IRA Hamid AIP conference proceedings 1891 (1), 2017 | 75 | 2017 |
Using feature selection and classification scheme for automating phishing email detection IRA Hamid, J Abawajy, TH Kim University Of Tasmania, 2013 | 67 | 2013 |
Android malware detection based on network traffic using decision tree algorithm A Zulkifli, IRA Hamid, WM Shah, Z Abdullah Recent Advances on Soft Computing and Data Mining: Proceedings of the Third …, 2018 | 62 | 2018 |
A review of live survey application: SurveyMonkey and SurveyGizmo M Abd Halim, CFM Foozy, I Rahmi, A Mustapha JOIV: International Journal on Informatics Visualization 2 (4-2), 309-312, 2018 | 52 | 2018 |
An approach for profiling phishing activities IRA Hamid, JH Abawajy Computers & Security 45, 27-41, 2014 | 50 | 2014 |
Enhancing trust management in cloud environment SK Chong, J Abawajy, M Ahmad, IRA Hamid Procedia-Social and Behavioral Sciences 129, 314-321, 2014 | 46 | 2014 |
Phishing email feature selection approach IRA Hamid, J Abawajy 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 38 | 2011 |
Investigating machine learning techniques for detection of depression using structural MRI volumetric features K Kipli, A Kouzani, IR A Hamid Deakin University, 2013 | 31 | 2013 |
Profiling phishing email based on clustering approach IRA Hamid, JH Abawajy 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 29 | 2013 |
Android ransomware detection based on dynamic obtained features Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020 | 27 | 2020 |
Generic Assessment Rubrics for Computer Programming Courses. A Mustapha, NA Samsudin, N Arbaiy, R Mohammed, IR Hamid Turkish Online Journal of Educational Technology-TOJET 15 (1), 53-68, 2016 | 23 | 2016 |
Audio Steganography with Embedded Text CT Jian, CC Wen, NHBA Rahman, IRBA Hamid Universiti Tun Hussein Onn Malaysia, 2016 | 16 | 2016 |
A multilevel trust management framework for service oriented environment SK Chong, J Abawajy, IRA Hamid, M Ahmad Procedia-Social and Behavioral Sciences 129, 396-405, 2014 | 15 | 2014 |
Radio frequency identification (RFID) based car parking system MS Mazlan, IRA Hamid, H Kamaludin JOIV: International Journal on Informatics Visualization 2 (4-2), 318-322, 2018 | 11 | 2018 |
Using weighted based feature selection technique for android malware detection NH Mazlan, IRA Hamid Mobile and Wireless Technologies 2017: ICMWT 2017 4, 54-64, 2018 | 11 | 2018 |
Android Malware Classification Using K-Means Clustering Algorithm IRA Hamid, NS Khalid, NA Abdullah, NH Ab Rahman, CC Wen | 11 | 2017 |
Feature Selection Approach to Detect DDoS Attack Using Machine Learning Algorithms MAH Azmi, CFM Foozy, KAM Sukri, NA Abdullah, IRA Hamid, H Amnur JOIV: International Journal on Informatics Visualization 5 (4), 395-401, 2021 | 10 | 2021 |
One-way ANOVA model with fuzzy data for consumer demand PC Lin, N Arbaiy, IRA Hamid International Conference on Soft Computing and Data Mining, 111-121, 2016 | 10 | 2016 |
Extended local mean-based nonparametric classifier for cervical cancer screening NA Samsudin, A Mustapha, N Arbaiy, IRA Hamid Recent Advances on Soft Computing and Data Mining: The Second International …, 2017 | 8 | 2017 |