Selecting Root Exploit Features Using Flying Animal-Inspired Decision

Ahmad Firdaus , Mohd Faizal Ab Razak , Wan Isni Sofiah Wan Din , Danakorn Nincarean
Indonesian Journal of Electrical Engineering and Informatics 7 ( 4) 628 -638

2019
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches

Mohd Hairul Nizam Bin Md Nasir , Nor Badrul Anuar , Ahmad Firdaus , Mohd Faizal Ab Razak
Journal of Network and Computer Applications 179 103009

41
2021
Towards a systematic description of the field using bibliometric analysis: malware evolution.

Mohd Nizam Mohmad Kahar , Salwana Mohamad , Ahmad Firdaus , Mohd Faizal Ab Razak
Scientometrics 126 ( 3) 1 -43

23
2021
An Improved Image Watermarking by Modifying Selected DWT-DCT Coefficients

Ferda Ernawan , Ahmad Firdaus , Dhani Ariatmanto
IEEE Access 9 45474 -45485

2021
Exploring halal tourism tweets on social media

Ali Feizollah , Mohamed M. Mostafa , Zalina Zakaria , Ainin Sulaiman
Journal of Big Data 8 ( 1) 1 -18

34
2021
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network

Wan Isni Sofiah Wan Din , Asyran Zarizi Bin Abdullah , Razulaimi Razali , Firdaus Ahmad
International Journal of Electrical and Computer Engineering 9 ( 6) 5360 -5367

1
2019
A hybrid Particle swarm optimization -Extreme Learning Machine approach for Intrusion Detection System

Mohammed Hasan Ali , Mohamad Fadlizolkipi , Ahmad Firdaus , Nik Zulkarnaen Khidzir
student conference on research and development

7
2018
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

Ahmad Firdaus , Nor Badrul Anuar , Mohd Faizal Ab Razak , Ibrahim Abaker Targio Hashem
Journal of Medical Systems 42 ( 6) 112 -112

61
2018
Bio-inspired for Features Optimization and Malware Detection

Mohd Faizal Ab Razak , Nor Badrul Anuar , Fazidah Othman , Ahmad Firdaus
Arabian Journal for Science and Engineering 43 ( 12) 6963 -6979

14
2018
Balancing Data Utility versus Information Loss in Data-Privacy Protection using k-Anonymity

Thamer Khalil Esmeel , Md Munirul Hasan , Muhammad Nomani Kabir , Ahmad Firdaus
ieee conference on systems process and control

3
2020
Android Botnets: A Proof-of-Concept Using Hybrid Analysis Approach

Ahmad Karim , Victor Chang , Ahmad Firdaus
Journal of Organizational and End User Computing 32 ( 3) 50 -67

1
2020
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics

Ahmad Firdaus , Nor Badrul Anuar , Mohd Faizal Ab Razak , Arun Kumar Sangaiah
Multimedia Tools and Applications 77 ( 14) 17519 -17555

17
2018
Discovering optimal features using static analysis and a genetic search based method for Android malware detection

Ahmad Firdaus , Nor Badrul Anuar , Ahmad Karim , Mohd Faizal Ab Razak
Journal of Zhejiang University Science C 19 ( 6) 712 -736

59
2018
“Less Give More”: Evaluate and zoning Android applications

Mohd Faizal Ab Razak , Nor Badrul Anuar , Rosli Salleh , Ahmad Firdaus
Measurement 133 396 -411

21
2019
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)

Hammoudeh S. Alamri , Kamal Z. Zamli , Mohd Faizal Ab Razak , Ahmad Firdaus
international conference software and computer applications 135 -139

1
2019
The rise of “blockchain”: bibliometric analysis of blockchain study

Ahmad Firdaus , Mohd Faizal Ab Razak , Ali Feizollah , Ibrahim Abaker Targio Hashem
Scientometrics 120 ( 3) 1289 -1331

132
2019
Blending Big Data Analytics: Review on Challenges and a Recent Study

Fairuz Amalina , Ibrahim Abaker Targio Hashem , Zati Hakim Azizul , Ang Tan Fong
IEEE Access 8 3629 -3645

75
2020
Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)

Rosmalissa Jusoh , Ahmad Firdaus , Shahid Anwar , Mohd Zamri Osman
PeerJ Computer Science 7 e522

12
2021