Face recognition for criminal identification: An implementation of principal component analysis for face recognition NA Abdullah, MJ Saidi, NHA Rahman, CC Wen, IRA Hamid AIP conference proceedings 1891 (1), 2017 | 92 | 2017 |
Hybrid feature selection for phishing email detection IR A. Hamid, J Abawajy Algorithms and Architectures for Parallel Processing: 11th International …, 2011 | 83 | 2011 |
Android malware detection based on network traffic using decision tree algorithm A Zulkifli, IRA Hamid, WM Shah, Z Abdullah Recent Advances on Soft Computing and Data Mining: Proceedings of the Third …, 2018 | 70 | 2018 |
A review of live survey application: SurveyMonkey and SurveyGizmo M Abd Halim, CFM Foozy, I Rahmi, A Mustapha JOIV: International Journal on Informatics Visualization 2 (4-2), 309-312, 2018 | 69 | 2018 |
Using feature selection and classification scheme for automating phishing email detection IRA Hamid, J Abawajy, TH Kim University Of Tasmania, 2013 | 69 | 2013 |
An approach for profiling phishing activities IRA Hamid, JH Abawajy Computers & Security 45, 27-41, 2014 | 52 | 2014 |
Enhancing trust management in cloud environment SK Chong, J Abawajy, M Ahmad, IRA Hamid Procedia-Social and Behavioral Sciences 129, 314-321, 2014 | 49 | 2014 |
Phishing email feature selection approach IRA Hamid, J Abawajy 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 37 | 2011 |
Android ransomware detection based on dynamic obtained features Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth …, 2020 | 33 | 2020 |
Investigating machine learning techniques for detection of depression using structural MRI volumetric features K Kipli, A Kouzani, IR A Hamid Deakin University, 2013 | 33 | 2013 |
Profiling phishing email based on clustering approach IRA Hamid, JH Abawajy 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 30 | 2013 |
Generic Assessment Rubrics for Computer Programming Courses. A Mustapha, NA Samsudin, N Arbaiy, R Mohammed, IR Hamid Turkish Online Journal of Educational Technology-TOJET 15 (1), 53-68, 2016 | 25 | 2016 |
Audio Steganography with Embedded Text CT Jian, CC Wen, NHBA Rahman, IRBA Hamid Universiti Tun Hussein Onn Malaysia, 2016 | 20 | 2016 |
Feature Selection Approach to Detect DDoS Attack Using Machine Learning Algorithms MAH Azmi, CFM Foozy, KAM Sukri, NA Abdullah, IRA Hamid, H Amnur JOIV: International Journal on Informatics Visualization 5 (4), 395-401, 2021 | 18 | 2021 |
A multilevel trust management framework for service oriented environment SK Chong, J Abawajy, IRA Hamid, M Ahmad Procedia-Social and Behavioral Sciences 129, 396-405, 2014 | 16 | 2014 |
Malware awareness tool for internet safety using gamification techniques NS Omar, CFM Foozy, IRA Hamid, H Hafit, AF Arbain, P Shamala Journal of Physics: Conference Series 1874 (1), 012023, 2021 | 14 | 2021 |
Radio frequency identification (RFID) based car parking system MS Mazlan, IRA Hamid, H Kamaludin JOIV: International Journal on Informatics Visualization 2 (4-2), 318-322, 2018 | 13 | 2018 |
Using weighted based feature selection technique for android malware detection NH Mazlan, IRA Hamid Mobile and Wireless Technologies 2017: ICMWT 2017 4, 54-64, 2018 | 11 | 2018 |
Android Malware Classification Using K-Means Clustering Algorithm IRA Hamid, NS Khalid, NA Abdullah, NH Ab Rahman, CC Wen | 11 | 2017 |
One-way ANOVA model with fuzzy data for consumer demand PC Lin, N Arbaiy, IRA Hamid International Conference on Soft Computing and Data Mining, 111-121, 2016 | 10 | 2016 |