Showing results 1 to 18 of 49
next >
Issue Date | Title | Author(s) |
2015 | A Hybrid Architecture for Database Intrusion Preventer | Albakoush, Y.A. ; Ismail, R. ; Bakar, A.A. |
2014 | A modified dipole Quasi-Yagi antenna to increase directivity and gain for WLAN application | Hock, G.T. ; Hock, G.C. ; Ghafil, S.F. ; Chakrabarty, C. ; Ismail, R. |
2009 | A review on extended role based access control (E-RBAC) model in pervasive computing environment | Bakar, A.A. ; Ismail, R. ; Jais, J. ; Manan, J.-L.A. |
2009 | A routing protocol based on trusted and shortest path selection for mobile ad hoc network | Jassim, H.Sh. ; Yussof, S. ; Kiong, T.S. ; Koh, S.P. ; Ismail, R. |
2003 | A security architecture for reputation systems | Ismail, R. ; Boyd, C. ; Josang, A. ; Russell, S. |
2007 | A survey of trust and reputation systems for online service provision | Jøsang, A. ; Ismail, R. ; Boyd, C. |
2014 | Access control and privacy in MANET emergency environment | Bakar, A.A. ; Ghapar, A.A. ; Ismail, R. |
2010 | Adopting hadith verification techniques in to digital evidence authentication | Yusoff, Y. ; Ismail, R. ; Hassan, Z. |
2015 | An authentication mechanism for heterogeneous access control model in MANET emergency rescue mission | El Talib, E.H. ; Bakar, A.A. ; Ismail, R. |
2011 | An Arabic language framework for semantic web | Beseiso, M. ; Ahmad, A.R. ; Ismail, R. |
2016 | Ascertaining trust of information transmitted during a disaster | Yusoff, Y. ; Bakar, A.A. ; Aziz, N. ; Ismail, R. ; Ramli, R. |
2010 | Challenges in adopting and integrating ITIL and CMMi in ICT division of a public utility company | Abdul Latif, A. ; Md Din, M. ; Ismail, R. |
2015 | Comparing sound types for stress therapy in a virtual-reality environment | Abdul Latif, R. ; Ismail, R. |
2008 | Congestion avoidance: Network based schemes solution | Shaii, A.Q. ; Ismail, R. ; Jais, J. ; Manan, J. |
2018 | Construction and evaluation of a user interface acceptance questionnaire | Baharum, A. ; Ismail, R. ; Daruis, D.D.I. ; Fabeil, N.F. ; Bahar, I.A.A. ; Omar, M. |
2015 | Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents | Musa, N.A. ; Yusoff, M.Z.M. ; Yusoff, Y. ; Ismail, R. |
2018 | Demuse: Releasing stress using music mobile application | Baharum, A. ; Pitchay, S.A. ; Ismail, R. ; Fabeil, N.F. ; Rusli, N.M. ; Bahar, I.A.A. |
2017 | Evaluating the Localization for E-Learning Website: Case Study in Universiti Malaysia Sabah | Baharum, A. ; Ismail, R. ; Fabeil, N.F. ; Fatah, N.S.A. ; Tanalol, S.H. ; Zain, N.H.M. ; Hanapi, R. |