Cik Feresa binti Mohd Foozy
Cik Feresa binti Mohd Foozy
Adresă de e-mail confirmată pe uthm.edu.my
Citat de
Citat de
Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset
ZK Maseer, R Yusof, N Bahaman, SA Mostafa, CFM Foozy
IEEE access 9, 22351-22370, 2021
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
Customer profiling using classification approach for bank telemarketing
S Palaniappan, A Mustapha, CFM Foozy, R Atan
JOIV: International Journal on Informatics Visualization 1 (4-2), 214-217, 2017
Phishing detection taxonomy for mobile device
CFM Foozy, R Ahmad, MF Abdollah
International Journal of Computer Science Issues (IJCSI) 10 (1), 338-344, 2013
A review of live survey application: SurveyMonkey and SurveyGizmo
M Abd Halim, CFM Foozy, I Rahmi, A Mustapha
JOIV: International Journal on Informatics Visualization 2 (4-2), 309-312, 2018
Integrating Elman recurrent neural network with particle swarm optimization algorithms for an improved hybrid training of multidisciplinary datasets
MF Ab Aziz, SA Mostafa, CFM Foozy, MA Mohammed, M Elhoseny, ...
Expert Systems with Applications 183, 115441, 2021
A machine learning approach for improving the performance of network intrusion detection systems
AH Azizan, SA Mostafa, A Mustapha, CFM Foozy, MHA Wahab, ...
Annals of Emerging Technologies in Computing (AETiC) 5 (5), 201-208, 2021
Android ransomware detection based on dynamic obtained features
Z Abdullah, FW Muhadi, MM Saudi, IRA Hamid, CFM Foozy
International Conference on Soft Computing and Data Mining, 121-129, 2020
Header based email spam detection framework using Support Vector Machine (SVM) Technique
SA Khamis, CFM Foozy, MFA Aziz, N Rahim
International conference on soft computing and data mining, 57-65, 2020
A generic review of web technology: Django and flask
N Idris, CFM Foozy, P Shamala
International Journal of Advanced Science Computing and Engineering 2 (1), 34-40, 2020
A comparative study with RapidMiner and WEKA tools over some classification techniques for SMS spam
CFM Foozy, R Ahmad, MAF Abdollah, CC Wen
IOP Conference Series: Materials Science and Engineering 226 (1), 012100, 2017
Video spam comment features selection using machine learning techniques
N Alias, CFM Foozy, SN Ramli, N Zainuddin
Indones. J. Electr. Eng. Comput. Sci 15 (2), 1046-1053, 2019
Machine Learning-Based Distributed Denial of Service Attack Detection on Intrusion Detection System Regarding to Feature Selection
AW Muhammad, CFM Foozy, A Azhari
International Journal of Artificial Intelligence Research 4 (1), 1-8, 2020
Preliminary analysis of malware detection in opcode sequences within IoT environment
FS Ahmed, N Mustapha, A Mustapha, M Kakavand, CFM Foozy
Journal of Computer Science 16 (9), 1306-1318, 2020
Network monitoring system to detect unauthorized connection
IRA Hamid, NHA Sukor, CFM Foozy, Z Abdullah
Acta Electronica Malaysia 1 (2), 13-16, 2017
A framework for SMS spam and phishing detection in Malay Language: a case study
C. Mohd Foozy, Ahmad, R., Abdollah, M.
International Review on Computers and Software 9 (7), 1248-1254, 2014
YouTube spam comment detection using support vector machine and K–nearest neighbor
A Aziz, CFM Foozy, P Shamala, Z Suradi
Indones. J. Electr. Eng. Comput. Sci 12 (2), 612, 2018
Enhancing the Randomness of Symmetric Key using Genetic Algorithm
AZ Zakaria, SN Ramli, CC Wen, CFM Foozy, PSS Palaniappan, ...
International Journal of Innovative Technology and Exploring Engineering …, 2019
A Practical Rule Based Technique by Splitting SMS Phishing from SMS Spam for Better Accuracy in Mobile Device
C. Mohd Foozy, Ahmad, R., Abdollah, M.
International Review on Computers and Software (IRECOS) 9 (1), 8, 2014
A watermarking authentication system for medical images
AM Zeki, AA Manaf, CFM Foozy, SS Mahmod
World Congress on Engineering and Technology (CET 2011), Shanghai, China, 2011
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20