A survey of trust and reputation systems for online service provision A Jøsang, R Ismail, C Boyd Decision support systems 43 (2), 618-644, 2007 | 3312 | 2007 |
The beta reputation system A Josang, R Ismail Proceedings of the 15th bled electronic commerce conference 5, 2502-2511, 2002 | 2324* | 2002 |
Common phases of computer forensics investigation models Y Yusoff, R Ismail, Z Hassan AIRCC's International Journal of Computer Science and Information Technology …, 2011 | 249 | 2011 |
A review of security attacks on IEC61850 substation automation system network MTA Rashid, S Yussof, Y Yusoff, R Ismail Proceedings of the 6th international conference on information technology …, 2014 | 83 | 2014 |
A Survey of Arabic language Support in Semantic web M Beseiso, AR Ahmad, R Ismail International Journal of Computer Applications 9 (1), 35-40, 2010 | 60 | 2010 |
A survey of scada testbed implementation approaches Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ... Indian Journal of Science and Technology, 2017 | 53 | 2017 |
Software project management using machine learning technique—A Review MN Mahdi, MH Mohamed Zabil, AR Ahmad, R Ismail, Y Yusoff, LK Cheng, ... Applied Sciences 11 (11), 5183, 2021 | 45 | 2021 |
A Routing Protocol based on Trusted and shortest Path selection for Mobile Ad hoc Network HS Jassim, S Yussof, TS Kiong, SP Koh, R Ismail 2009 IEEE 9th Malaysia International Conference on Communications (MICC …, 2009 | 36 | 2009 |
A security architecture for reputation systems R Ismail, C Boyd, A Josang, S Russell International Conference on Electronic Commerce and Web Technologies, 176-185, 2003 | 32 | 2003 |
The beta reputation system J Audun, I Roslan Proceedings of the 15th Bled Electronic Commerce Conference 5, 2502-2511, 2002 | 28 | 2002 |
Adopting hadith verification techniques in to digital evidence authentication Y Yusoff, R Ismail, Z Hassan Journal of Computer Science 6 (6), 613, 2010 | 27 | 2010 |
Solution for information overload using faceted search–a review MN Mahdi, AR Ahmad, R Ismail, H Natiq, MA Mohammed IEEE Access 8, 119554-119585, 2020 | 25 | 2020 |
Strong privacy in reputation systems R Ismail, C Boyd, A Josang, S Russel Information security applications: proceedings of the 4th International …, 2003 | 25 | 2003 |
Sign language to voice recognition: hand detection techniques for vision-based approach NSM Salleh, J Jais, L Mazalan, R Ismail, S Yussof, A Ahmad, A Anuar, ... Current Developments in Technology-Assisted Education 422, 2006 | 24 | 2006 |
An Arabic language framework for semantic web M Beseiso, AR Ahmad, R Ismail 2011 International Conference on Semantic Technology and Information …, 2011 | 23 | 2011 |
Private reputation schemes for p2p systems R Ismail, C Boyd, A Josang, S Russell International Workshop on Security In Information Systems 2, 196-206, 2004 | 22 | 2004 |
Forming trust in mobile ad hoc network AA Bakar, R Ismail, J Jais 2009 WRI International Conference on Communications and Mobile Computing 3 …, 2009 | 19 | 2009 |
Financial impacts of smart meter security and privacy breach S Yussof, ME Rusli, Y Yusoff, R Ismail, AA Ghapar Proceedings of the 6th International Conference on Information Technology …, 2014 | 17 | 2014 |
A review on extended role based access control (E-RBAC) model in pervasive computing environment AA Bakar, R Ismail, J Jais 2009 First International Conference on Networked Digital Technologies, 533-535, 2009 | 16 | 2009 |
Leveling-index based variable rate seeding technique for paddy B Abu Bakar, MT Ahmad, MSS Ghazali, MNF Abd Rani, MA Mhd Bookeri, ... Precision Agriculture 21, 729-736, 2020 | 15 | 2020 |