Browsing by Author Yussof, S.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 58 to 68 of 68 < previous 
Issue DateTitleAuthor(s)
2018Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA systemQassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. 
2015Soft biometrics: Gender recognition from unconstrained face images using local feature descriptorArigbabu, O.A. ; Ahmad, S.M.S. ; Adnan, W.A.W. ; Yussof, S. ; Mahmood, S. 
2017A systematic literature review: Information security cultureMahfuth, A. ; Yussof, S. ; Baker, A.A. ; Ali, N. 
2018A systematic review of technological issues in monitoring pilgrims’ health during hajj: Current state, challenges and future directionsAl Masud, S.M.R. ; Bakar, A.A. ; Yussof, S. 
2008The effect of GA parameters on the performance of GA-based QoS routing algorithmYussof, S. ; See, O.H. 
2008The effect of GA parameters on the performance of GA-based QoS routing algorithmYussof, S. ; See, O.H. 
2016The Semantic Network of Flood Hydrological Data for Kelantan, MalaysiaYusoff, A. ; Md Din, N. ; Yussof, S. ; Khan, S.U. 
2016The Semantic Network of Flood Hydrological Data for Kelantan, MalaysiaYusoff, A. ; Md Din, N. ; Yussof, S. ; Khan, S.U. 
2016Trust system architecture for securing GOOSE communication in IEC 61850 substation networkRashid, M.T.A. ; Yussof, S. ; Yusoff, Y. 
2015A user-centric game selection model based on user preferences for the selection of the best heterogeneous wireless networkSalih, Y.K. ; See, O.H. ; Ibrahim, R.W. ; Yussof, S. ; Iqbal, A. 
2007Using wireless sensor networks (WSN) for detecting leakage in water pipesBakar, A.A. ; Din, M.M. ; Yussof, S. ; Ghapar, A.A. ; Rusli, M.E. ; Chang, G.C.