Browsing by Author Ismail, R.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 49  next >
Issue DateTitleAuthor(s)
2015A Hybrid Architecture for Database Intrusion PreventerAlbakoush, Y.A. ; Ismail, R. ; Bakar, A.A. 
2014A modified dipole Quasi-Yagi antenna to increase directivity and gain for WLAN applicationHock, G.T. ; Hock, G.C. ; Ghafil, S.F. ; Chakrabarty, C. ; Ismail, R. 
2009A review on extended role based access control (E-RBAC) model in pervasive computing environmentBakar, A.A. ; Ismail, R. ; Jais, J. ; Manan, J.-L.A. 
2009A routing protocol based on trusted and shortest path selection for mobile ad hoc networkJassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. 
2003A security architecture for reputation systemsIsmail, R. ; Boyd, C. ; Josang, A. ; Russell, S. 
2007A survey of trust and reputation systems for online service provisionJøsang, A. ; Ismail, R. ; Boyd, C. 
2014Access control and privacy in MANET emergency environmentBakar, A.A. ; Ghapar, A.A. ; Ismail, R. 
2010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
2015An authentication mechanism for heterogeneous access control model in MANET emergency rescue missionEl Talib, E.H. ; Bakar, A.A. ; Ismail, R. 
2011An Arabic language framework for semantic webBeseiso, M. ; Ahmad, A.R. ; Ismail, R. 
2016Ascertaining trust of information transmitted during a disasterYusoff, Y. ; Bakar, A.A. ; Aziz, N. ; Ismail, R. ; Ramli, R. 
2010Challenges in adopting and integrating ITIL and CMMi in ICT division of a public utility companyAbdul Latif, A. ; Md Din, M. ; Ismail, R. 
2019Characterization of mechanical properties on natural fibre reinforced polymer using kenaf and polyurethaneIsa, M.R. ; Suhaimi, A.B. ; Zaroog, O.S. ; Zahari, N.M. ; Sulaiman, S.N. ; Ismail, I.N. ; Mohamed, H. 
2015Comparing sound types for stress therapy in a virtual-reality environmentAbdul Latif, R. ; Ismail, R. 
2008Congestion avoidance: Network based schemes solutionShaii, A.Q. ; Ismail, R. ; Jais, J. ; Manan, J. 
2018Construction and evaluation of a user interface acceptance questionnaireBaharum, A. ; Ismail, R. ; Daruis, D.D.I. ; Fabeil, N.F. ; Bahar, I.A.A. ; Omar, M. 
2015Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agentsMusa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. 
2018Demuse: Releasing stress using music mobile applicationBaharum, A. ; Pitchay, S.A. ; Ismail, R. ; Fabeil, N.F. ; Rusli, N.M. ; Bahar, I.A.A. 
2019Design and development of fully automated water sprinkler system for small agriculture fieldMohanasundram, T. ; Isa, M.R. ; Ismail, I.N. ; Zahari, N.M. ; Roslan, M.E. ; Mohamed, H. ; Vicki, W.V. 
2017Evaluating the Localization for E-Learning Website: Case Study in Universiti Malaysia SabahBaharum, A. ; Ismail, R. ; Fabeil, N.F. ; Fatah, N.S.A. ; Tanalol, S.H. ; Zain, N.H.M. ; Hanapi, R.