Salman Yussof
Title
Cited by
Cited by
Year
A review of security attacks on IEC61850 substation automation system network
MTA Rashid, S Yussof, Y Yusoff, R Ismail
Proceedings of the 6th international conference on information technologyá…, 2014
562014
Online handwritten signature verification using neural network classifier based on principal component analysis
V Iranmanesh, SMS Ahmad, WAW Adnan, S Yussof, OA Arigbabu, ...
The Scientific World Journal 2014, 2014
502014
A systematic literature review: Information security culture
A Mahfuth, S Yussof, AA Baker, N Ali
2017 International Conference on Research and Innovation in Informationá…, 2017
472017
A survey of SCADA testbed implementation approaches
Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ...
Indian Journal of Science and Technology 10 (26), 1-8, 2017
322017
A Routing Protocol based on Trusted and shortest Path selection for Mobile Ad hoc Network
HS Jassim, S Yussof, TS Kiong, SP Koh, R Ismail
2009 IEEE 9th Malaysia International Conference on Communications (MICCá…, 2009
322009
Integration of multiple soft biometrics for human identification
OA Arigbabu, SMS Ahmad, WAW Adnan, S Yussof
Pattern Recognition Letters 68, 278-287, 2015
312015
A novel noncooperative game competing model using generalized simple additive weighting method to perform network selection in heterogeneous wireless networks
YK Salih, O Hang See, RW Ibrahim, S Yussof, A Iqbal
International Journal of Communication Systems 28 (6), 1112-1125, 2015
292015
A Robust GA-based QoS Routing Algorithm for Solving Multi-constrained Path Problem.
S Yussof, OH See
J. Comput. 5 (9), 1322-1334, 2010
262010
A coarse-grained parallel genetic algorithm with migration for shortest path routing problem
S Yussof, RA Razali, OH See, AA Ghapar, MM Din
2009 11th IEEE International Conference on High Performance Computing andá…, 2009
252009
A parallel genetic algorithm for shortest path routing problem
S Yussof, RA Razali, OH See
2009 International Conference on Future Computer and Communication, 268-273, 2009
242009
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
FL Malallah, SMS Ahmad, WAW Adnan, OA Arigbabu, V Iranmanesh, ...
Int. J. Cyber Secur. Digit. Foren 4, 302-13, 2015
232015
Sign language to voice recognition: hand detection techniques for vision-based approach
NSM Salleh, J Jais, L Mazalan, R Ismail, S Yussof, A Ahmad, A Anuar, ...
Current Developments in Technology-Assisted Education 422, 2006
232006
Algorithm for robot writing using character segmentation
S Yussof, A Anuar, K Fernandez
Third International Conference on Information Technology and Applicationsá…, 2005
232005
Recent advances in facial soft biometrics
OA Arigbabu, SMS Ahmad, WAW Adnan, S Yussof
The Visual Computer 31 (5), 513-525, 2015
222015
Internet of Things (IoT) architecture for flood data management
AA Ghapar, S Yussof, AA Bakar
Int. J. Future Gener. Commun. Netw 11 (1), 55-62, 2018
212018
Energy-aware fault tolerant task offloading of mobile cloud computing
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
2017 5th IEEE International Conference on Mobile Cloud Computing, Servicesá…, 2017
212017
A user-centric game selection model based on user preferences for the selection of the best heterogeneous wireless network
YK Salih, OH See, RW Ibrahim, S Yussof, A Iqbal
annals of telecommunications-annales des tÚlÚcommunications 70 (5), 239-248, 2015
212015
An effective approach for managing power consumption in cloud computing infrastructure
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
journal of computational science 21, 349-360, 2017
192017
An overview of intelligent selection and prediction method in heterogeneous wireless networks
YK Salih, OH See, RW Ibrahim, S Yussof, A Iqbal
Journal of Central South University 21 (8), 3138-3154, 2014
192014
Online signature verification using neural network and pearson correlation features
V Iranmanesh, SMS Ahmad, WAW Adnan, FL Malallah, S Yussof
2013 IEEE conference on open systems (ICOS), 18-21, 2013
192013
The system can't perform the operation now. Try again later.
Articles 1–20