Issue Date | Title | Author(s) |
2010 | Adopting hadith verification techniques in to digital evidence authentication | Yusoff, Y. ; Ismail, R. ; Hassan, Z. |
2016 | Ascertaining trust of information transmitted during a disaster | Yusoff, Y. ; Bakar, A.A. ; Aziz, N. ; Ismail, R. ; Ramli, R. |
2008 | Comparative study on applicability of WEBMO in web application cost estimation within klang valley in Malaysia | Hooi, T.C. ; Yusoff, Y. ; Hassan, Z. |
2015 | Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents | Musa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. |
2015 | Financial impacts of smart meter security and privacy breach | Yussof, S. ; Rusli, M.E. ; Yusoff, Y. ; Ismail, R. ; Ghapar, A.A. |
2015 | Interaction testing for an ad-hoc system (queue management system) | Ramli, R. ; Mohamed Zabil, M.H. ; Lim, K.C. ; Yusoff, Y. ; Yusuff, M.S. |
2016 | Issues and challenges of forensics analysis of agents' behavior in multi-Agent systems: A critical review | Musa, N.A. ; Yusoff, M.Z.M. ; Ismail, R. ; Yusoff, Y. |
2018 | A low cost and single source atmospheric pressure vapor phase epitaxy of ZnS for thin film photovoltaic applications | Yusoff, Y. ; Chelvanathan, P. ; Kamaruddin, N. ; Akhtaruzzaman, M. ; Amin, N. |
2015 | A review of security attacks on IEC61850 substation automation system network | Rashid, M.T.A. ; Yussof, S. ; Yusoff, Y. ; Ismail, R. |
2016 | Trust system architecture for securing GOOSE communication in IEC 61850 substation network | Rashid, M.T.A. ; Yussof, S. ; Yusoff, Y. |