Issue Date | Title | Author(s) |
2019 | Factors influencing information security awareness of phishing attacks from bank customers’ perspective: A preliminary investigation | Asfoor, A. ; Rahim, F.A. ; Yussof, S. |
2019 | A modified WBANs MAC superframe using priority-criticality index table for managing pilgrims’ emergency traffic in Hajj | Al Masud, S.M.R. ; Bakar, A.A. ; Yussof, S. |
2019 | A novel architecture to verify offline hand-written signatures using convolutional neural network | Alkaabi, S. ; Yussof, S. ; Almulla, S. ; Al-Khateeb, H. ; Alabdulsalam, A.A. |
2017 | Predictive analytics for network big data using knowledge-based reasoning for smart retrieval of data, information, knowledge, and wisdom (DIKW) | Yusoff, A. ; Din, N.M. ; Yussof, S. ; Abbas, A. ; Khan, S.U. |
2019 | A priority-queue dominated and delay-energy guaranteed MAC superframe structure for WBANs to deal with various emergency traffic of pilgrims during hajj: An analytical model | Masud, S.M.R.A. ; Bakar, A.A. ; Yussof, S. |
Aug-2010 | A robust ga-based QoS routing algorithm for solving the general k-constrained multi-constrained path routing problems | Salman Yussof |
2019 | Shifting Dataset to Preserve Data Privacy | Pozi, M.S.M. ; Bakar, A.A. ; Ismail, R. ; Yussof, S. ; Rahim, F.A. ; Ramli, R. |
2020 | Strategic Research Roadmap 2021-2025 Institute of Informatics and Computing in Energy (IICE) | Hazleen Aris ; Halimah Badioze Zaman ; Nazrita Ibrahim ; Salman Yussof ; Moamin A Mahmoud ; Wahidah Hashim |
2018 | TPAL: A protocol for node authentication in IoT | Razali, M.F. ; Rusli, M.E. ; Jamil, N. ; Yussof, S. |