Salman Yussof
Cited by
Cited by
A review of security attacks on IEC61850 substation automation system network
MTA Rashid, S Yussof, Y Yusoff, R Ismail
Proceedings of the 6th International Conference on Information Technologyá…, 2014
Online handwritten signature verification using neural network classifier based on principal component analysis
V Iranmanesh, SMS Ahmad, WAW Adnan, S Yussof, OA Arigbabu, ...
The Scientific World Journal 2014, 2014
A systematic literature review: Information security culture
A Mahfuth, S Yussof, AA Baker, N Ali
2017 International Conference on Research and Innovation in Informationá…, 2017
A Routing Protocol based on Trusted and shortest Path selection for Mobile Ad hoc Network
HS Jassim, S Yussof, TS Kiong, SP Koh, R Ismail
2009 IEEE 9th Malaysia International Conference on Communications (MICCá…, 2009
Integration of multiple soft biometrics for human identification
OA Arigbabu, SMS Ahmad, WAW Adnan, S Yussof
Pattern Recognition Letters 68, 278-287, 2015
A coarse-grained parallel genetic algorithm with migration for shortest path routing problem
S Yussof, RA Razali, OH See, AA Ghapar, MM Din
2009 11th IEEE International Conference on High Performance Computing andá…, 2009
A novel noncooperative game competing model using generalized simple additive weighting method to perform network selection in heterogeneous wireless networks
YK Salih, O Hang See, RW Ibrahim, S Yussof, A Iqbal
International Journal of Communication Systems 28 (6), 1112-1125, 2015
A robust GA-based QoS routing algorithm for solving multi-constrained path problem
S Yussof, OH See
Journal of Computers 5 (9), 1322-1334, 2010
A survey of scada testbed implementation approaches
Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ...
Indian Journal of Science and Technology 10 (26), 1-8, 2017
Algorithm for robot writing using character segmentation
S Yussof, A Anuar, K Fernandez
Third International Conference on Information Technology and Applicationsá…, 2005
A parallel genetic algorithm for shortest path routing problem
S Yussof, RA Razali, OH See
2009 International Conference on Future Computer and Communication, 268-273, 2009
A user-centric game selection model based on user preferences for the selection of the best heterogeneous wireless network
YK Salih, OH See, RW Ibrahim, S Yussof, A Iqbal
Annals of telecommunications-annales des tÚlÚcommunications 70 (5-6), 239-248, 2015
Recent advances in facial soft biometrics
OA Arigbabu, SMS Ahmad, WAW Adnan, S Yussof
The Visual Computer 31 (5), 513-525, 2015
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
FL Malallah, SMS Ahmad, WAW Adnan, OA Arigbabu, V Iranmanesh, ...
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 4 (1á…, 2015
Online signature verification using neural network and pearson correlation features
V Iranmanesh, SMS Ahmad, WAW Adnan, FL Malallah, S Yussof
2013 IEEE conference on open systems (ICOS), 18-21, 2013
Sign language to voice recognition: hand detection techniques for vision-based approach
NSM Salleh, J Jais, L Mazalan, R Ismail, S Yussof, A Ahmad, A Anuar, ...
Current Developments in Technology-Assisted Education 422, 2006
An effective approach for managing power consumption in cloud computing infrastructure
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
journal of computational science 21, 349-360, 2017
Energy-aware fault tolerant task offloading of mobile cloud computing
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
2017 5th IEEE International Conference on Mobile Cloud Computing, Servicesá…, 2017
A comparative analysis of task scheduling algorithms of virtual machines in cloud environment
S Atiewi, S Yussof, M Ezanee
Journal of Computer Science 11 (6), 804, 2015
A review energy-efficient task scheduling algorithms in cloud computing
S Atiewi, S Yussof, M Ezanee, M Almiani
2016 IEEE Long Island Systems, Applications and Technology Conference (LISATá…, 2016
The system can't perform the operation now. Try again later.
Articles 1–20