Results 1-5 of 5 (Search time: 0.0 seconds).

Issue DateTitleAuthor(s)
12018An analysis of common vulnerability and exposure (CVE) of software products in the year 2016Bonandir, A. ; Yussof, S. 
22018A conceptual framework of WMN enabled WBAN system for pilgrims' health monitoring during Hajj in the Kingdom Saudi ArabiaAl Masud, S.M.R. ; Abu Bakar, A. ; Yussof, S. ; Ali, G.A. ; Mostafa, V. 
32011Path selection technique for highly transmission ratio and reliable routing in ManetJassim, H.S. ; Yussof, S. ; Tiong, S.K. ; Chong, K.H. ; Koh, S.P. 
42015Review of visualization techniques for landslide and flood disaster dataYussof, S. ; Husin, N.B. ; Ibrahim, Z. ; Din, M.M. ; Ghapar, A.A. ; Din, N.M. ; Abdullah, F. 
52018Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA systemQassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. 

Loading... 2 0 5 0 false
Credit Name
Salman Yussof Assoc. Prof. Dr.
Full Name
Yussof, S.
Loading... 3 0 5 0 false