Browsing by Author Yussof, S.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 42 to 61 of 68 < previous   next >
Issue DateTitleAuthor(s)
2012On the energy consumption in Optical Burst Switching (OBS) networksZaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. 
2012On the energy consumption in Optical Burst Switching (OBS) networksZaiter, M.J. ; Yussof, S. ; Abdelouhahab, A. ; Cheah, C.L. ; Saher, A. 
2014Online handwritten signature verification using neural network classifier based on principal component analysisIranmanesh, V. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Arigbabu, O.A. ; Malallah, F.L. 
2013Online signature verification using neural network and pearson correlation featuresIranmanesh, V. ; Ahmad, S.M.S. ; Wan Adnan, W.A. ; Malallah, F.L. ; Yussof, S. 
2008Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared?Dippel, U. ; Yussof, S. 
2014An overview of intelligent selection and prediction method in heterogeneous wireless networksSalih, Y.K. ; See, O.H. ; Ibrahim, R.W. ; Yussof, S. ; Iqbal, A. 
2011Path selection technique for highly transmission ratio and reliable routing in ManetJassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. 
2011Path selection technique for highly transmission ratio and reliable routing in ManetJassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. 
2011Performance analysis of genetic algorithm (GA)-based multi-constrained path routing algorithmYussof, S. 
2005QoS routing for multiple additive QoS parameters using genetic algorithmYussof, S. ; See, O.H. 
2005QoS routing for multiple additive QoS parameters using genetic algorithmYussof, S. ; See, O.H. 
2015Recent advances in facial soft biometricsArigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. 
2015A review of security attacks on IEC61850 substation automation system networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. 
2015Review of visualization techniques for landslide and flood disaster dataYussof, S. ; Husin, N.B. ; Ibrahim, Z. ; Din, M.M. ; Ghapar, A.A. ; Din, N.M. ; Abdullah, F. 
2015Review of visualization techniques for landslide and flood disaster dataYussof, S. ; Husin, N.B. ; Ibrahim, Z. ; Din, M.M. ; Ghapar, A.A. ; Din, N.M. ; Abdullah, F. 
2009A routing protocol based on trusted and shortest path selection for mobile ad hoc networkJassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. 
2018Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA systemQassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. 
2015Soft biometrics: Gender recognition from unconstrained face images using local feature descriptorArigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Mahmood, S. 
2017A systematic literature review: Information security cultureMahfuth, A. ; Yussof, S. ; Baker, A.A. ; Ali, N. 
2018A systematic review of technological issues in monitoring pilgrims’ health during hajj: Current state, challenges and future directionsAl Masud, S.M.R. ; Bakar, A.A. ; Yussof, S.