Common phases of computer forensics investigation models Y Yusoff, R Ismail, Z Hassan International Journal of Computer Science & Information Technology 3 (3), 17-31, 2011 | 258 | 2011 |
A review of security attacks on IEC61850 substation automation system network MTA Rashid, S Yussof, Y Yusoff, R Ismail Proceedings of the 6th international conference on information technology …, 2014 | 84 | 2014 |
Software project management using machine learning technique—A Review MN Mahdi, MH Mohamed Zabil, AR Ahmad, R Ismail, Y Yusoff, LK Cheng, ... Applied Sciences 11 (11), 5183, 2021 | 61 | 2021 |
Adopting hadith verification techniques in to digital evidence authentication Y Yusoff, R Ismail, Z Hassan Journal of Computer Science 6 (6), 613, 2010 | 29 | 2010 |
Financial impacts of smart meter security and privacy breach S Yussof, ME Rusli, Y Yusoff, R Ismail, AA Ghapar Proceedings of the 6th International Conference on Information Technology …, 2014 | 19 | 2014 |
Trust system architecture for securing GOOSE communication in IEC 61850 substation network MTA Rashid, S Yussof, Y Yusoff International journal of security and its applications 10 (4), 289-302, 2016 | 16 | 2016 |
Comparative study on applicability of WEBMO in Web application cost estimation within Klang Valley in Malaysia TC Hooi, Y Yusoff, Z Hassan 2008 IEEE 8th International Conference on Computer and Information …, 2008 | 13 | 2008 |
Issues and challenges of forensics analysis of agents' behavior in multi-agent systems: A critical review NA Musa, MZM Yusoff, R Ismail, Y Yusoff 2015 International Symposium on Agents, Multi-Agent Systems and Robotics …, 2015 | 9 | 2015 |
Smart grid digital forensics investigation framework HIM Abdullah, MZ Mustaffa, FA Rahim, ZA Ibrahim, Y Yusoff, S Yussof, ... 2020 8th International Conference on Information Technology and Multimedia …, 2020 | 7 | 2020 |
Willingness of Electricity Consumer in Malaysia to Share Electric Energy Consumption Data S Yussof, NN Mohd Zulkefle, Y Yusoff, A Abu Bakar Advances in Visual Informatics: 7th International Visual Informatics …, 2021 | 2 | 2021 |
A comparative usability study using hierarchical agglomerative and k-means clustering on mobile augmented reality interaction data KC Lim, A Selamat, MH Mohamed Zabil, Y Yusoff, MH Selamat, RA Alias, ... Advancing Technology Industrialization Through Intelligent Software …, 2019 | 2 | 2019 |
E-Iqra’: Mobile application for learning AL-Quran using voice recognition R Ramli, Y Yusoff Advanced Science Letters 24 (3), 1666-1669, 2018 | 2 | 2018 |
Ascertaining trust of information transmitted during a disaster Y Yusoff, AA Bakar, N Aziz, R Ismail, R Ramli Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8 …, 2016 | 2 | 2016 |
Triangulating the implementation of hierarchical agglomerative clustering on MAR-learning usability data KC Lim, A Selamat, MH Mohamed Zabil, Y Yusoff, MH Selamat, RA Alias, ... Advancing Technology Industrialization Through Intelligent Software …, 2019 | 1 | 2019 |
Interaction testing for an ad-hoc system (queue management system) R Ramli, MZ MH, KC Lim, Y Yusoff, MS Yusuff | 1 | 2006 |
Modelling Bitcoin networks in terms of anonymity and privacy in the metaverse application within Industry 5.0: Comprehensive taxonomy, unsolved issues and suggested solution ZK Mohammad, S Bin Yousif, Y Bin Yousif Journal of Intelligent Systems 33 (1), 20230117, 2024 | | 2024 |
Smart Grid Digital Forensics Investigation Framework MA HI, MZ Mustaffa, FA Rahim, ZA Ibrahim, Y Yusoff, S Yussof, AA Bakar, ... Institute of Electrical and Electronics Engineers Inc., 2020 | | 2020 |
Diagnosis Security Problems for Hybrid Cloud Computing in Medium Organizations MT Shakir, ABA Bakar, YB Yusoff, MT Sheker National Conference on Information Systems Trends : Cloud Computing, 2016 | | 2016 |
Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents NA Musa, MZM Yusoff, Y Yusoff, R Ismail Proceedings of the 6th International Conference on Information Technology …, 2014 | | 2014 |
Ascertaining the trustworthiness of digital evidence based on hadith authentication methodology Y Yusoff | | 2014 |