Browsing by Author Ismail, R.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 58  next >
Issue DateTitleAuthor(s)
2015A Hybrid Architecture for Database Intrusion PreventerAlbakoush, Y.A. ; Ismail, R. ; Bakar, A.A. 
2014A modified dipole Quasi-Yagi antenna to increase directivity and gain for WLAN applicationHock, G.T. ; Hock, G.C. ; Ghafil, S.F. ; Chakrabarty, C. ; Ismail, R. 
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. 
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. 
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. 
2009A review on extended role based access control (E-RBAC) model in pervasive computing environmentBakar, A.A. ; Ismail, R. ; Jais, J. ; Manan, J.-L.A. 
2009A routing protocol based on trusted and shortest path selection for mobile ad hoc networkJassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. 
2003A security architecture for reputation systemsIsmail, R. ; Boyd, C. ; Josang, A. ; Russell, S. 
2007A survey of trust and reputation systems for online service provisionJøsang, A. ; Ismail, R. ; Boyd, C. 
2014Access control and privacy in MANET emergency environmentBakar, A.A. ; Ghapar, A.A. ; Ismail, R. 
2010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
2010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
2010Adopting hadith verification techniques in to digital evidence authenticationYusoff, Y. ; Ismail, R. ; Hassan, Z. 
2015An authentication mechanism for heterogeneous access control model in MANET emergency rescue missionEl Talib, E.H. ; Bakar, A.A. ; Ismail, R. 
2011An Arabic language framework for semantic webBeseiso, M. ; Ahmad, A.R. ; Ismail, R. 
2016Ascertaining trust of information transmitted during a disasterYusoff, Y. ; Bakar, A.A. ; Aziz, N. ; Ismail, R. ; Ramli, R. 
2010Challenges in adopting and integrating ITIL and CMMi in ICT division of a public utility companyAbdul Latif, A. ; Md Din, M. ; Ismail, R. 
2015Comparing sound types for stress therapy in a virtual-reality environmentAbdul Latif, R. ; Ismail, R. 
2015Comparing sound types for stress therapy in a virtual-reality environmentAbdul Latif, R. ; Ismail, R. 
2008Congestion avoidance: Network based schemes solutionShaii, A.Q. ; Ismail, R. ; Jais, J. ; Manan, J.