Browsing by Author Yusoff, Y.

Showing results 1 to 11 of 11
Issue DateTitleAuthor(s)
2010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
2016Ascertaining trust of information transmitted during a disasterYusoff, Y. ; Bakar, A.A. ; Aziz, N. ; Ismail, R. ; Ramli, R. 
2008Comparative study on applicability of WEBMO in web application cost estimation within klang valley in MalaysiaHooi, T.C. ; Yusoff, Y. ; Hassan, Z. 
2015Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agentsMusa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. 
2015Financial impacts of smart meter security and privacy breachYussof, S. ; Rusli, M.E. ; Yusoff, Y. ; Ismail, R. ; Ghapar, A.A. 
2015Interaction testing for an ad-hoc system (queue management system)Ramli, R. ; Mohamed Zabil, M.H. ; Lim, K.C. ; Yusoff, Y. ; Yusuff, M.S. 
2016Issues and challenges of forensics analysis of agents' behavior in multi-Agent systems: A critical reviewMusa, N.A. ; Yusoff, M.Z.M. ; Ismail, R. ; Yusoff, Y. 
2018A low cost and single source atmospheric pressure vapor phase epitaxy of ZnS for thin film photovoltaic applicationsYusoff, Y. ; Chelvanathan, P. ; Kamaruddin, N. ; Akhtaruzzaman, M. ; Amin, N. 
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. 
2018Synthesis of sphere-like-crystal CdS powder and thin films using chemical residue in chemical bath deposition (CBD) for thin film solar cell applicationAli, A.M. ; Yusoff, Y. ; Ali, L.M. ; Misran, H. ; Akhtaruzzaman, M. ; Alghoul, M.A. ; Sopian, K. ; Radiman, S. ; Amin, N. 
2016Trust system architecture for securing GOOSE communication in IEC 61850 substation networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y.