Publications

Journals

  1. Mohd Saudi M., Amran L., Ridzuan F. (2020) Go-Detect Application Inspired by Apoptosis to Detect SMS Exploitation by Malwares. In: P. P. Abdul Majeed A., Mat-Jizat J., Hassan M., Taha Z., Choi H., Kim J. (eds) RITA 2018. Lecture Notes in Mechanical Engineering. Springer, Singapore. [Scopus]
  2. *Alsabhany, A.A., Ridzuan, F., & Azni, A.H. ,2019. The Adaptive Multi-Level Phase Coding Method in Audio Steganography. IEEE Access, 7, 129291-129306 [ISI]
  3. Kalid A. Marsal, A.H. Azni, Farida Ridzuan. Formulation of 3D Euclidean Distance for Network in Wireless Sensor Network, COMPUSOFT, An International Journal of Advanced Computer Technology, 8(9), 3368-3373. [Scopus]
  4. M. Norazizi Sham Mohd Sayuti, Farida Hazwani Mohd Ridzuan, Zul Hilmi Abdullah, 2019. Task mapping and routing optimization for hard real-time networks-on-chip, Bulletin of Electrical Engineering and Informatics, 8(2), 414-421. [Scopus]
  5. *Asma Salsabila Muhmad Rusli, Farida Ridzuan, Zulkifly Mohd Zaki, M Norazizi Sham Mohd Sayuti & Rosalina Abdul Salam, 2018. A Systematic Review on Semantic-based Ontology for Quranic Knowledge, International Journal of Engineering & Technology, 7(4.15), 80-86.  [Scopus]
  6. Muhammad Yusof, Madihah Mohd Saudi & Farida Ridzuan, 2018. Mobile Botnet Classification by Using Hybrid Analysis, International Journal of Engineering & Technology, 7(4.15), 103-108.  [Scopus]
  7. Nurlida Basir, N.F. Nabila, Nurzi Juana Mohd Zaizi, Madihah Mohd Saudi, Farida Ridzuan, and Sakinah Ali Pitchay, 2018. Retrieval Performance for USIM’s Quranic Search Engine, International Journal of Engineering & Technology, 7(4.15), 126-129.  [Scopus]
  8. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan and Sundresan Perumal, 2018. Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption, International Journal of Engineering & Technology, 7(4.15), 98-102.  [Scopus]
  9. Muhammad Afifi Mohamad Safee, Madihah Mohd Saudi, Sakinah A. Pitchay, Farida Ridzuan, Nurlida Basir, Kamarudin Saadan & Fatin Nabila, 2018. Hybrid Search Approach for Retrieving Medical and Health Science Knowledge from Quran, International Journal of Engineering & Technology, 7(4.15), 69-74.  [Scopus]
  10. Madihah Mohd Saudi, Amirul Adli Ismail and Farida Ridzuan, 2018. Mobile Malware Call Logs Classification based on Android Package Index (API). Journal of Engineering Science and Technology, 152-161. [Scopus]
  11. *Ahmed A. Alsabhany, Farida Hazwani Mohd Ridzuan and A. H. Azni Haslizan Ab Halim, 2018. An Adaptive Multi Amplitude Thresholds Embedding Algorithm for Audio Steganography. Malaysian Journal of Science, Health & Technology, 2(1), 7- 10. [Non indexed]
  12. *Anes A. Shaker, Farida Hazwani Mohd Ridzuan & Sakinah Ali Pitchay, 2018. A Review Analysis for Text Steganography. Malaysian Journal of Science, Health & Technology, 2(1), 26-30. [Non indexed]
  13. Muhammad Yusof, Madihah Mohd Saudi & Farida Hazwani Mohd Ridzuan, 2018. A Systematic Review Analysis for Mobile Botnet Detection using GPS Exploitation. Malaysian Journal of Science, Health & Technology, 2(1), 16 – 20. [Non indexed]
  14. *Anes A. Shaker, Farida Ridzuan, Sakinah Ali Pitchay, 2017. Text Steganography using Extensions Kashida based on the Moon and Sun Letters Concept, International Journal of Advanced Computer Science and Applications(IJACSA),8,8,286-290 [Non ISI/Scopus]
  15. *Ahmed A. Alsabhany, Farida Ridzuan, Azni A. H.,A, 2017. A Hybrid Method for Data Communication Using Encrypted Audio Steganography, Advanced Science Letters,23,5,4896–4900 [Scopus]
  16. *Intan Nurfarahin Ahmad, Farida Ridzuan, Madihah Mohd Saudi, 2017. Optimizing the Performance of Mobile Malware Detection using the Indexing Rule, Advanced Science Letters,23,5,4627–4630 [Scopus]
  17. *Farida Ridzuan, Ziaurahman Shirzad, A H Azni , Madihah Mohd Saudi, 2017. Classification for Quran Authentication Using Characters and Diacritics Hashed Values, Advanced Science Letters,23,5,4692–4695 [Scopus]
  18. Nurlida Basir, N. F. Nabila, Nurzi Juana Mohd Zaizi, Madihah M. Saudi, Farida Hazwani Mohd Ridzuan, and Sakinah Ali Pitchay 2017.Intelligent Quranic Ontology Retrieval,Advanced Science Letters,23,5,4449–4453. [Scopus]
  19. Muhammad bin Yusof, Madihah binti Mohd Saudi and Farida Ridzuan, 2017. A Systematic Review and Analysis of Mobile Botnet Detection for GPS Exploitation,Advanced Science Letters,23,5,4696–4700 [Scopus]
  20. Muhammad Afifi Mohamad Safee, Madihah Mohd Saudi, Sakinah Ali Pitchay, Farida Ridzuan, 2016. A Systematic Review Analysis for Quran Verses Retrieval. Journal of Engineering and Applied Science, 11(3). 629-634. [Non indexed]
  21. *Intan Nurfarahin Ahmad, Farida Ridzuan, Madihah Mohd Saudi, 2016. Indexing Android Mobile Malware. Journal of Engineering and Applied Science, 11(3). 369-374. [Non indexed]
  22. A.H Azni, Rabiah Ahmad, Zul Azri Mohamad Noh, Farida Hazwani, Najwa Hayaati. 2014. Systematic Review for Network Survivability Analysis in MANETs. Procedia – Social and Behavioral Science. 195, 2015, 1872-1881. [Scopus]
  23. *Farida Ridzuan, Vidyasagar Potdar and Wendy Hui. 2013. “Awareness, Knowledge and Perception of Online Spam.” Journal of Next Generation Information Technology (JNIT) 4(3): 9-22. [Scopus]

Proceedings

  1. *Muhammad Harith Noor Azam, Farida Ridzuan, M Norazizi Sham Mohd Sayuti and Ahmed A. Alsabhany. (2020) Balancing the Trade-Off Between Capacity and Imperceptibility for Least Significant Bit Audio Steganography Method: A New Parameter. IEEE Explore. Accepted. [Scopus]
  2. *Ahmed A. Alsabhany, Farida Ridzuan, and A.H. Azni, 2018. A Framework to enhance the wavelet-based Audio Steganography Thresholds Embedding Algorithm for Audio Steganography. E-Proceeding of the 1st International Conference on Islamic Education Technology (ICIET 2018), 20-26. [Non ISI/Scopus]
  3. Sakinah Ali Pitchay, Nur Nabihah Mohd Suhaimi, Madihah Mohd Saudi, Farida Ridzuan, Nurlida Basir and N.F.Nabila, (2017). An Investigation on Jawi CAPTCHA Based Security for Login Authentication and Authorization: Is It an Alternative Solution?. In Proceedings of the World Congress on Engineering and Computer Science (Vol. 1). [Scopus]
  4. Saudi, Madihah Mohd, Luqman Hakim Zahari, Farida Ridzuan, Nurlida Basir, Sakinah Ali Pitchay, and N. F. Nabila. 2017. “A New Mobile Malware Classification for Camera Exploitation based on System Call and Permission.” In Proceedings of the World Congress on Engineering and Computer Science, vol. 1. [Scopus]
  5. Saudi, Madihah Mohd, Farida Ridzuan, and Hasan Al-Banna Hashim. 2017. “An Efficient Data Transformation Technique for Web Log.” Proceedings of the World Congress on Engineering. Vol. 1. [Scopus]
  6. *Intan Nurfarahin Ahmad, Farida Ridzuan, Madihah Mohd Saudi, Sakinah Ali Pitchay, Nurlida Basir, and N. F. Nabila. 2017. “Android Mobile Malware Classification using Tokenization Approach based on System Call Sequence.” In Proceedings of the World Congress on Engineering and Computer Science, vol. 1. [Scopus]
  7. Muhammad Yusof, Madihah Mohd Saudi, and Farida Ridzuan. 2017. “A new mobile botnet classification based on permission and API calls.” In Emerging Security Technologies (EST), 2017 Seventh International Conference on, pp. 122-127. IEEE. [Scopus]
  8. Muhammad Yusof, Madihah Mohd Saudi, and Farida Ridzuan. (2017, December). A New Android Botnet Classification for GPS Exploitation Based on Permission and API Calls. In International Conference on Advanced Engineering Theory and Applications (pp. 27-37). Springer, Cham. [Scopus]
  9. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi, 2015. A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing. In the 17th UKSIM-AMSS International Conference on Modelling and Simulation. Cambridge, UK.202-205.  IEEE. [Scopus]
  10. Sakinah Ali Pitchay Madihah Mohd Saudi, Nurlida Basir, N.F.Nabila, Farida Ridzuan. 2015. An Efficient Easy Computer Emergency Response Team Malware Reservoir System (eZCERT). In the 17th UKSIM-AMSS International Conference on Modelling and Simulation. Cambridge, UK. 142-146. IEEE. [Scopus]
  11. Madihah Mohd Saudi, Farida Ridzuan, Nurlida Basir, NF Nabila, Sakinah Ali Pitchay, Intan Nurfarahin Ahmad, 2015. Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept. In the 17th UKSIM-AMSS International Conference on Modelling and Simulation. Cambridge, UK. 176-181. IEEE. [Scopus]
  12. N.F.Nabila, Nurlida Basir, Madihah Mohd Saudi, Farida Ridzuan, S.A.Pitchay, 2015. Using Probability Theory to Identify the Unsure Value of an Incomplete Sentence. In the 17th UKSIM-AMSS International Conference on Modelling and Simulation. Cambridge, UK. 497-501. IEEE. [Scopus]
  13. Vidyasagar Potdar, Nazanin Firoozeh, Farida Ridzuan et.al. 2012. “The Changing Nature of Spam 2.0.” In Proceedings of the CUBE International Information Technology Conference, Pune, India. ACM. [Scopus]
  14. *Farida Ridzuan, Vidyasagar Potdar and Wendy Hui. 2012. “A Survey of Awareness, Knowledge and Perception of Online Spam.” In the 7th International Conference on Computing and Convergence Technology (ICCCT), Seoul, Korea, 1106-1110. IEEE Explore. [Scopus]
  15. *Farida Ridzuan and Vidyasagar Potdar, 2012. “Spam 2.0.” In Proceedings of the CUBE International Information Technology Conference, Pune, India, 724-731. ACM. [Scopus]
  16. *Farida Ridzuan, Vidyasagar Potdar, and Jaipal Singh. 2011. “Storage Cost of Spam 2.0 in a Web Discussion Forum.” In Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, Perth, Australia, 200-209. ACM. [Scopus]
  17. *Farida Ridzuan, Vidyasagar Potdar, Alex Talevski, and William F. Smyth. 2010. “Key Parameters in Identifying Cost of Spam 2.0.” In 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Western Australia, 789-796. IEEE Computer Society. [Scopus]
  18. *Farida Ridzuan, Vidyasagar Potdar, Alex Talevski. 2010. “Factors involved in estimating cost of Email spam.” In The 2010 International Conference on Computational Science and Applications. Lecture Notes in Computer Science (LNCS) Vol. 6017, 2010, pp 383-399. Springer. [Scopus]
  19. Potdar, V., Ridzuan, F. H., Hayati, P., Talevski, A., Yeganeh, E. A., Sarenche, S. et al (2010). Spam 2.0: The Problem Ahead. In The 2010 International Conference on Computational Science & its Applications (ICCSA 2010). Lecture Notes in Computer Science (LNCS) Vol. 6017, 2010, pp 400-411. Springer. [Scopus]

Chapters in Book

  1. Ahmad I.N., Ridzuan F., Saudi M.M., Pitchay S.A., Basir N., Nabila N.F. (2019) Android Mobile Malware Classification Using a Tokenization Approach. In: Ao SI., Kim H., Amouzegar M. (eds) Transactions on Engineering Technologies. WCECS 2017. Springer, Singapore [Non ISI/Scopus]
  2. *Intan Nurfarahin Ahmad, Farida Ridzuan & Madihah Mohd Saudi. “A Systematic Review Analysis for Indexing Algorithm for Quran Verses” in Innovation in Student Centered Teaching and Learning. Vol. 1, 2016, pp 50-59. USIM publisher. [Non ISI/Scopus]
  3. *Farida Hazwani Mohd Ridzuan, Azni Haslizan Abdul Halim, Mohd Aizuddin Abdul Aziz, Mudzfirah Halim & Nur Ain Fatimah, 2019. Spam and the Ethics of Spamming from an Islamic Perspective in The Integration of Naqli and Aqli in Information Security and Assurance from the Islamic & Technological Perspectives. 36-50. USIM publisher. [Non ISI/Scopus]

Book/Modules

  1. Proceeding of Postgraduate Colloquium on Science and Technology (KOSIST) 2017. eISBN : 978-967-440-399-7

Any Queries? Ask us a question at +0000000000