Ahmad Firdaus

Orcid: 0000-0002-7116-2643

According to our database1, Ahmad Firdaus authored at least 21 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review.
J. Cyber Secur. Mobil., 2024

2023
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA).
J. Intell. Fuzzy Syst., 2023

Machine Learning Technique for Phishing Website Detection.
Proceedings of the 8th IEEE International Conference On Software Engineering and Computer Systems, 2023

Cloud of Word vs DroidKungfu: Performance Evaluation in Detecting Root Exploit Malware with Deep Learning Approach.
Proceedings of the 8th IEEE International Conference On Software Engineering and Computer Systems, 2023

CAGDEEP: Mobile Malware Analysis Using Force Atlas 2 with Strong Gravity Call Graph And Deep Learning.
Proceedings of the 8th IEEE International Conference On Software Engineering and Computer Systems, 2023

2022
A Bayesian probability model for Android malware detection.
ICT Express, 2022

2021
Towards a systematic description of the field using bibliometric analysis: malware evolution.
Scientometrics, 2021

Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation).
PeerJ Comput. Sci., 2021

The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches.
J. Netw. Comput. Appl., 2021

Exploring halal tourism tweets on social media.
J. Big Data, 2021

Android mobile malware detection using fuzzy AHP.
J. Inf. Secur. Appl., 2021

An Improved Image Watermarking by Modifying Selected DWT-DCT Coefficients.
IEEE Access, 2021

2020
MapReduce scheduling algorithms: a review.
J. Supercomput., 2020

Android Botnets: A Proof-of-Concept Using Hybrid Analysis Approach.
J. Organ. End User Comput., 2020

Blending Big Data Analytics: Review on Challenges and a Recent Study.
IEEE Access, 2020

2019
The rise of "blockchain": bibliometric analysis of blockchain study.
Scientometrics, 2019

Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA).
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

2018
Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics.
Multim. Tools Appl., 2018

Discovering optimal features using static analysis and a genetic search based method for Android malware detection.
Frontiers Inf. Technol. Electron. Eng., 2018

Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.
J. Medical Syst., 2018

2016
The rise of "malware": Bibliometric analysis of malware study.
J. Netw. Comput. Appl., 2016


  Loading...