Suivre
Farida Ridzuan
Titre
Citée par
Citée par
Année
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art
AA AlSabhany, AH Ali, F Ridzuan, AH Azni, MR Mokhtar
Computer Science Review 38, 100316, 2020
782020
A new mobile botnet classification based on permission and API calls
M Yusof, MM Saudi, F Ridzuan
2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017
412017
The adaptive multi-level phase coding method in audio steganography
AA Alsabhany, F Ridzuan, AH Azni
IEEE Access 7, 129291-129306, 2019
352019
Text steganography using extensions Kashida based on the moon and sun letters concept
AA Shaker, F Ridzuan, SA Pitchay
international journal of advanced computer science and applications 8 (8), 2017
332017
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
IEEE Access 8, 198646-198658, 2020
222020
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing
SA Pitchay, WAA Alhiagem, F Ridzuan, MM Saudi
212015
Systematic Literature Review: Trend Analysis on the Design of Lightweight Block Cipher
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
Journal of King Saud University-Computer and Information Sciences 35 (5), 101550, 2023
202023
Hybrid search approach for retrieving Medical and Health Science knowledge from Quran
MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ...
Int. J. Eng. Technol 7 (4.15), 69-74, 2018
172018
The progressive multilevel embedding method for audio steganography
AA Alsabhany, F Ridzuan, AH Azni
Journal of physics: conference series 1551 (1), 012011, 2020
142020
Key parameters in identifying cost of spam 2.0
F Ridzuan, V Potdar, A Talevski, WF Smyth
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
142010
Balancing the trade-off between capacity and imperceptibility for least significant bit audio steganography method: a new parameter
MHN Azam, F Ridzuan, MNSM Sayuti, AA Alsabhany
2019 IEEE Conference on Application, Information and Network Security (AINS …, 2019
122019
Mobile botnet classification by using hybrid analysis
M Yusof, MM Saudi, F Ridzuan
Int. J. Eng. Technol 7 (4), 103-108, 2018
122018
A systematic review analysis for Quran verses retrieval
SA Pitchay, F Ridzuan
Journal of Engineering and Applied Sciences 100 (3), 629-634, 2016
102016
LAO-3D: A symmetric lightweight block cipher based on 3d permutation for mobile encryption application
AA Zakaria, AH Ab Halim, F Ridzuan, NH Zakaria, M Daud
Symmetry 14 (10), 2042, 2022
92022
A systematic review on semantic-based ontology for Quranic knowledge
ASM Rusli, F Ridzuan, ZM Zaki, M Sayuti, RA Salam
Int. J. Eng. Technol, 2018
92018
A new android botnet classification for GPS exploitation based on permission and API calls
M Yusof, MM Saudi, F Ridzuan
AETA 2017-Recent Advances in Electrical Engineering and Related Sciences …, 2018
92018
Factors involved in estimating cost of email spam
F Ridzuan, V Potdar, A Talevski
International Conference on Computational Science and Its Applications, 383-399, 2010
92010
A theoretical comparative analysis of DNA techniques used in DNA based cryptography
NAN Abdullah, NH Zakaria, AH Ab Halim, FHM Ridzuan, A Ahmad, ...
Journal of Sustainability Science and Management 17 (5), 165-178, 2022
82022
Spam 2.0: The problem ahead
V Potdar, F Ridzuan, P Hayati, A Talevski, EA Yeganeh, N Firuzeh, ...
Computational Science and Its Applications–ICCSA 2010: International …, 2010
82010
Modifications of key schedule algorithm on RECTANGLE block cipher
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021
72021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20