Browsing by Author Yusoff, Y.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 26  next >
Issue DateTitleAuthor(s)
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. 
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. 
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. 
2010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
2010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
2010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
2016Ascertaining trust of information transmitted during a disasterYusoff, Y. ; Bakar, A.A. ; Aziz, N. ; Ismail, R. ; Ramli, R. 
2008Comparative study on applicability of WEBMO in web application cost estimation within klang valley in MalaysiaHooi, T.C. ; Yusoff, Y. ; Hassan, Z. 
2008Comparative study on applicability of WEBMO in web application cost estimation within klang valley in MalaysiaHooi, T.C. ; Yusoff, Y. ; Hassan, Z. 
2015Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agentsMusa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. 
2015Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agentsMusa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. 
2015Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agentsMusa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. 
2015Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agentsMusa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. 
2015Financial impacts of smart meter security and privacy breachYussof, S. ; Rusli, M.E. ; Yusoff, Y. ; Ismail, R. ; Ghapar, A.A. 
2015Financial impacts of smart meter security and privacy breachYussof, S. ; Rusli, M.E. ; Yusoff, Y. ; Ismail, R. ; Ghapar, A.A. 
2015Financial impacts of smart meter security and privacy breachYussof, S. ; Rusli, M.E. ; Yusoff, Y. ; Ismail, R. ; Ghapar, A.A. 
2015Interaction testing for an ad-hoc system (queue management system)Ramli, R. ; Mohamed Zabil, M.H. ; Lim, K.C. ; Yusoff, Y. ; Yusuff, M.S. 
2015Interaction testing for an ad-hoc system (queue management system)Ramli, R. ; Mohamed Zabil, M.H. ; Lim, K.C. ; Yusoff, Y. ; Yusuff, M.S. 
2016Issues and challenges of forensics analysis of agents' behavior in multi-Agent systems: A critical reviewMusa, N.A. ; Yusoff, M.Z.M. ; Ismail, R. ; Yusoff, Y. 
2016Issues and challenges of forensics analysis of agents' behavior in multi-Agent systems: A critical reviewMusa, N.A. ; Yusoff, M.Z.M. ; Ismail, R. ; Yusoff, Y.