Publications

Results 1-18 of 18 (Search time: 0.0 seconds).

Issue DateTitleAuthor(s)
12014Preserving privacy for mobile ad-hoc network emergency services via heterogeneous access control modelBakar, A.A. ; El-Talib, E.-M.H. ; Ismail, R. 
22015Interface design for young dyslexics: A survey on visual representationIsmail, R. ; Jaafar, A. 
32015Interface design for dyslexia: Teachers’ perception on text presentationIsmail, R. ; Jaafar, A. 
42011Interactive screen-based design for dyslexic childrenIsmail, R. ; Jaafar, A. 
52014Important features in text presentation for children with dyslexiaIsmail, R. ; Jaafar, A. 
62009Forming trust in mobile ad -hoc networkAbu Bakar, A. ; Ismail, R. ; Jais, J. ; Abdul Manan, J.-L. 
72015Financial impacts of smart meter security and privacy breachYussof, S. ; Rusli, M.E. ; Yusoff, Y. ; Ismail, R. ; Ghapar, A.A. 
82008Congestion avoidance: Network based schemes solutionShaii, A.Q. ; Ismail, R. ; Jais, J. ; Manan, J. 
92016Ascertaining trust of information transmitted during a disasterYusoff, Y. ; Bakar, A.A. ; Aziz, N. ; Ismail, R. ; Ramli, R. 
102015An authentication mechanism for heterogeneous access control model in MANET emergency rescue missionEl Talib, E.H. ; Bakar, A.A. ; Ismail, R. 
112010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
122014Access control and privacy in MANET emergency environmentBakar, A.A. ; Ghapar, A.A. ; Ismail, R. 
132007A survey of trust and reputation systems for online service provisionJøsang, A. ; Ismail, R. ; Boyd, C. 
142003A security architecture for reputation systemsIsmail, R. ; Boyd, C. ; Josang, A. ; Russell, S. 
152009A routing protocol based on trusted and shortest path selection for mobile ad hoc networkJassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. 
162009A review on extended role based access control (E-RBAC) model in pervasive computing environmentBakar, A.A. ; Ismail, R. ; Jais, J. ; Manan, J.-L.A. 
172014A modified dipole Quasi-Yagi antenna to increase directivity and gain for WLAN applicationHock, G.T. ; Hock, G.C. ; Ghafil, S.F. ; Chakrabarty, C. ; Ismail, R. 
182015A Hybrid Architecture for Database Intrusion PreventerAlbakoush, Y.A. ; Ismail, R. ; Bakar, A.A. 

Loading... 2 0 5 0 false
Roz.jpg picture
Credit Name
Rozita Ismail
Full Name
Ismail, R.
Email
Irozita@uniten.edu.my
 
Loading... 3 0 5 0 false