Follow
Roslan Ismail, PhD
Title
Cited by
Cited by
Year
A survey of trust and reputation systems for online service provision
A Jøsang, R Ismail, C Boyd
Decision support systems 43 (2), 618-644, 2007
45862007
The beta reputation system
A Josang, R Ismail
Proceedings of the 15th bled electronic commerce conference 5, 2502-2511, 2002
2175*2002
Common phases of computer forensics investigation models
Y Yusoff, R Ismail, Z Hassan
International Journal of Computer Science & Information Technology 3 (3), 17-31, 2011
2062011
A review of security attacks on IEC61850 substation automation system network
MTA Rashid, S Yussof, Y Yusoff, R Ismail
Proceedings of the 6th International Conference on Information Technology …, 2014
622014
A Survey of Arabic language Support in Semantic web
M Beseiso, AR Ahmad, R Ismail
International Journal of Computer Applications 9 (1), 35-40, 2010
562010
A survey of scada testbed implementation approaches
Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ...
Indian Journal of Science and Technology 10 (26), 1-8, 2017
412017
A Routing Protocol based on Trusted and shortest Path selection for Mobile Ad hoc Network
HS Jassim, S Yussof, TS Kiong, SP Koh, R Ismail
2009 IEEE 9th Malaysia International Conference on Communications (MICC …, 2009
332009
A security architecture for reputation systems
R Ismail, C Boyd, A Josang, S Russell
International Conference on Electronic Commerce and Web Technologies, 176-185, 2003
322003
Adopting hadith verification techniques in to digital evidence authentication
Y Yusoff, R Ismail, Z Hassan
Journal of Computer Science 6 (6), 613, 2010
242010
Strong privacy in reputation systems
R Ismail, C Boyd, A Josang, S Russel
Information security applications: proceedings of the 4th International …, 2003
232003
An Arabic language framework for semantic web
M Beseiso, AR Ahmad, R Ismail
2011 International Conference on Semantic Technology and Information …, 2011
222011
Sign language to voice recognition: hand detection techniques for vision-based approach
NSM Salleh, J Jais, L Mazalan, R Ismail, S Yussof, A Ahmad, A Anuar, ...
Current Developments in Technology-Assisted Education 422, 2006
222006
Private reputation schemes for p2p systems
R Ismail, C Boyd, A Josang, S Russell
Proceedings of the 2nd International Workshop on Security In Information …, 2004
212004
Forming trust in mobile ad hoc network
AA Bakar, R Ismail, J Jais
2009 WRI International Conference on Communications and Mobile Computing 3 …, 2009
202009
Solution for information overload using faceted search–a review
MN Mahdi, AR Ahmad, R Ismail, H Natiq, MA Mohammed
IEEE Access 8, 119554-119585, 2020
182020
Financial impacts of smart meter security and privacy breach
S Yussof, ME Rusli, Y Yusoff, R Ismail, AA Ghapar
Proceedings of the 6th International Conference on Information Technology …, 2014
162014
A review on extended role based access control (E-RBAC) model in pervasive computing environment
AA Bakar, R Ismail, J Jais
2009 First International Conference on Networked Digital Technologies, 533-535, 2009
152009
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
QS Qassim, N Jamil, M Daud, N Ja’affar, S Yussof, R Ismail, ...
International Journal of Engineering & Technology 7 (2.14), 153-159, 2018
142018
Access control and privacy in MANET emergency environment
AA Bakar, AA Ghapar, R Ismail
2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014
142014
A new architecture for email knowledge extraction
M Beseiso, AR Ahmad, R Ismail
International Journal of Web & Semantic Technology 3 (3), 1, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20