Showing results 53 to 68 of 68
< previous
Issue Date | Title | Author(s) |
2015 | Recent advances in facial soft biometrics | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. |
2015 | A review of security attacks on IEC61850 substation automation system network | Rashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. |
2015 | Review of visualization techniques for landslide and flood disaster data | Yussof, S. ; Husin, N.B. ; Ibrahim, Z. ; Din, M.M. ; Ghapar, A.A. ; Din, N.M. ; Abdullah, F. |
2015 | Review of visualization techniques for landslide and flood disaster data | Yussof, S. ; Husin, N.B. ; Ibrahim, Z. ; Din, M.M. ; Ghapar, A.A. ; Din, N.M. ; Abdullah, F. |
2009 | A routing protocol based on trusted and shortest path selection for mobile ad hoc network | Jassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. |
2018 | Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system | Qassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. |
2015 | Soft biometrics: Gender recognition from unconstrained face images using local feature descriptor | Arigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Mahmood, S. |
2017 | A systematic literature review: Information security culture | Mahfuth, A. ; Yussof, S. ; Baker, A.A. ; Ali, N. |
2018 | A systematic review of technological issues in monitoring pilgrims’ health during hajj: Current state, challenges and future directions | Al Masud, S.M.R. ; Bakar, A.A. ; Yussof, S. |
2008 | The effect of GA parameters on the performance of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2008 | The effect of GA parameters on the performance of GA-based QoS routing algorithm | Yussof, S. ; See, O.H. |
2016 | The Semantic Network of Flood Hydrological Data for Kelantan, Malaysia | Yusoff, A. ; Md Din, N. ; Yussof, S. ; Khan, S.U. |
2016 | The Semantic Network of Flood Hydrological Data for Kelantan, Malaysia | Yusoff, A. ; Md Din, N. ; Yussof, S. ; Khan, S.U. |
2016 | Trust system architecture for securing GOOSE communication in IEC 61850 substation network | Rashid, M.T.A. ; Yussof, S. ; Yusoff, Y. |
2015 | A user-centric game selection model based on user preferences for the selection of the best heterogeneous wireless network | Salih, Y.K. ; See, O.H. ; Ibrahim, R.W. ; Yussof, S. ; Iqbal, A. |
2007 | Using wireless sensor networks (WSN) for detecting leakage in water pipes | Bakar, A.A. ; Din, M.M. ; Yussof, S. ; Ghapar, A.A. ; Rusli, M.E. ; Chang, G.C. |