Digital audio steganography: Systematic review, classification, and analysis of the current state of the art AA AlSabhany, AH Ali, F Ridzuan, AH Azni, MR Mokhtar Computer Science Review 38, 100316, 2020 | 78 | 2020 |
A new mobile botnet classification based on permission and API calls M Yusof, MM Saudi, F Ridzuan 2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017 | 41 | 2017 |
The adaptive multi-level phase coding method in audio steganography AA Alsabhany, F Ridzuan, AH Azni IEEE Access 7, 129291-129306, 2019 | 35 | 2019 |
Text steganography using extensions Kashida based on the moon and sun letters concept AA Shaker, F Ridzuan, SA Pitchay international journal of advanced computer science and applications 8 (8), 2017 | 33 | 2017 |
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud IEEE Access 8, 198646-198658, 2020 | 22 | 2020 |
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi | 21 | 2015 |
Systematic Literature Review: Trend Analysis on the Design of Lightweight Block Cipher AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud Journal of King Saud University-Computer and Information Sciences 35 (5), 101550, 2023 | 20 | 2023 |
Hybrid search approach for retrieving Medical and Health Science knowledge from Quran MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ... Int. J. Eng. Technol 7 (4.15), 69-74, 2018 | 17 | 2018 |
The progressive multilevel embedding method for audio steganography AA Alsabhany, F Ridzuan, AH Azni Journal of physics: conference series 1551 (1), 012011, 2020 | 14 | 2020 |
Key parameters in identifying cost of spam 2.0 F Ridzuan, V Potdar, A Talevski, WF Smyth 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 14 | 2010 |
Balancing the trade-off between capacity and imperceptibility for least significant bit audio steganography method: a new parameter MHN Azam, F Ridzuan, MNSM Sayuti, AA Alsabhany 2019 IEEE Conference on Application, Information and Network Security (AINS …, 2019 | 12 | 2019 |
Mobile botnet classification by using hybrid analysis M Yusof, MM Saudi, F Ridzuan Int. J. Eng. Technol 7 (4), 103-108, 2018 | 12 | 2018 |
A systematic review analysis for Quran verses retrieval SA Pitchay, F Ridzuan Journal of Engineering and Applied Sciences 100 (3), 629-634, 2016 | 10 | 2016 |
LAO-3D: A symmetric lightweight block cipher based on 3d permutation for mobile encryption application AA Zakaria, AH Ab Halim, F Ridzuan, NH Zakaria, M Daud Symmetry 14 (10), 2042, 2022 | 9 | 2022 |
A systematic review on semantic-based ontology for Quranic knowledge ASM Rusli, F Ridzuan, ZM Zaki, M Sayuti, RA Salam Int. J. Eng. Technol, 2018 | 9 | 2018 |
A new android botnet classification for GPS exploitation based on permission and API calls M Yusof, MM Saudi, F Ridzuan AETA 2017-Recent Advances in Electrical Engineering and Related Sciences …, 2018 | 9 | 2018 |
Factors involved in estimating cost of email spam F Ridzuan, V Potdar, A Talevski International Conference on Computational Science and Its Applications, 383-399, 2010 | 9 | 2010 |
A theoretical comparative analysis of DNA techniques used in DNA based cryptography NAN Abdullah, NH Zakaria, AH Ab Halim, FHM Ridzuan, A Ahmad, ... Journal of Sustainability Science and Management 17 (5), 165-178, 2022 | 8 | 2022 |
Spam 2.0: The problem ahead V Potdar, F Ridzuan, P Hayati, A Talevski, EA Yeganeh, N Firuzeh, ... Computational Science and Its Applications–ICCSA 2010: International …, 2010 | 8 | 2010 |
Modifications of key schedule algorithm on RECTANGLE block cipher AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 7 | 2021 |