Follow
Yunus Yusoff, PhD
Title
Cited by
Cited by
Year
Common phases of computer forensics investigation models
Y Yusoff, R Ismail, Z Hassan
International Journal of Computer Science & Information Technology 3 (3), 17-31, 2011
2582011
A review of security attacks on IEC61850 substation automation system network
MTA Rashid, S Yussof, Y Yusoff, R Ismail
Proceedings of the 6th international conference on information technology …, 2014
842014
Software project management using machine learning technique—A Review
MN Mahdi, MH Mohamed Zabil, AR Ahmad, R Ismail, Y Yusoff, LK Cheng, ...
Applied Sciences 11 (11), 5183, 2021
612021
Adopting hadith verification techniques in to digital evidence authentication
Y Yusoff, R Ismail, Z Hassan
Journal of Computer Science 6 (6), 613, 2010
292010
Financial impacts of smart meter security and privacy breach
S Yussof, ME Rusli, Y Yusoff, R Ismail, AA Ghapar
Proceedings of the 6th International Conference on Information Technology …, 2014
192014
Trust system architecture for securing GOOSE communication in IEC 61850 substation network
MTA Rashid, S Yussof, Y Yusoff
International journal of security and its applications 10 (4), 289-302, 2016
162016
Comparative study on applicability of WEBMO in Web application cost estimation within Klang Valley in Malaysia
TC Hooi, Y Yusoff, Z Hassan
2008 IEEE 8th International Conference on Computer and Information …, 2008
132008
Issues and challenges of forensics analysis of agents' behavior in multi-agent systems: A critical review
NA Musa, MZM Yusoff, R Ismail, Y Yusoff
2015 International Symposium on Agents, Multi-Agent Systems and Robotics …, 2015
92015
Smart grid digital forensics investigation framework
HIM Abdullah, MZ Mustaffa, FA Rahim, ZA Ibrahim, Y Yusoff, S Yussof, ...
2020 8th International Conference on Information Technology and Multimedia …, 2020
72020
Willingness of Electricity Consumer in Malaysia to Share Electric Energy Consumption Data
S Yussof, NN Mohd Zulkefle, Y Yusoff, A Abu Bakar
Advances in Visual Informatics: 7th International Visual Informatics …, 2021
22021
A comparative usability study using hierarchical agglomerative and k-means clustering on mobile augmented reality interaction data
KC Lim, A Selamat, MH Mohamed Zabil, Y Yusoff, MH Selamat, RA Alias, ...
Advancing Technology Industrialization Through Intelligent Software …, 2019
22019
E-Iqra’: Mobile application for learning AL-Quran using voice recognition
R Ramli, Y Yusoff
Advanced Science Letters 24 (3), 1666-1669, 2018
22018
Ascertaining trust of information transmitted during a disaster
Y Yusoff, AA Bakar, N Aziz, R Ismail, R Ramli
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8 …, 2016
22016
Triangulating the implementation of hierarchical agglomerative clustering on MAR-learning usability data
KC Lim, A Selamat, MH Mohamed Zabil, Y Yusoff, MH Selamat, RA Alias, ...
Advancing Technology Industrialization Through Intelligent Software …, 2019
12019
Interaction testing for an ad-hoc system (queue management system)
R Ramli, MZ MH, KC Lim, Y Yusoff, MS Yusuff
12006
Modelling Bitcoin networks in terms of anonymity and privacy in the metaverse application within Industry 5.0: Comprehensive taxonomy, unsolved issues and suggested solution
ZK Mohammad, S Bin Yousif, Y Bin Yousif
Journal of Intelligent Systems 33 (1), 20230117, 2024
2024
Smart Grid Digital Forensics Investigation Framework
MA HI, MZ Mustaffa, FA Rahim, ZA Ibrahim, Y Yusoff, S Yussof, AA Bakar, ...
Institute of Electrical and Electronics Engineers Inc., 2020
2020
Diagnosis Security Problems for Hybrid Cloud Computing in Medium Organizations
MT Shakir, ABA Bakar, YB Yusoff, MT Sheker
National Conference on Information Systems Trends : Cloud Computing, 2016
2016
Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents
NA Musa, MZM Yusoff, Y Yusoff, R Ismail
Proceedings of the 6th International Conference on Information Technology …, 2014
2014
Ascertaining the trustworthiness of digital evidence based on hadith authentication methodology
Y Yusoff
2014
The system can't perform the operation now. Try again later.
Articles 1–20