Search Results - "Yusof, Yusnita"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Improving Environmental Performance Through Innovative Academic Citizenship Behaviour: Green Training and Development, Green Recruitment and Selection as Antecedents in Jordanian Government University by Alqudah, MohammadNoor Khaled m, Yusof, Yusnita

    Published in Economics (Bijeljina.) (01-04-2024)
    “…Education institutions are thought to be largely responsible for environmental pollution even though businesses of all shapes and sizes contribute to this…”
    Get full text
    Journal Article
  2. 2

    Elagolix treatment in women with heavy menstrual bleeding associated with uterine fibroid: a systematic review and meta-analysis by Muhammad, Juliawati, Yusof, Yusnita, Ahmad, Imran, Norhayati, Mohd Noor

    Published in BMC women's health (15-01-2022)
    “…Elagolix is effective and safe for treating menorrhagia in women with uterine fibroid. However, it is reported to be associated with hypoestrogenism that can…”
    Get full text
    Journal Article
  3. 3

    Organizational performance with disruptive factors and inventory control as a mediator in public healthcare of Punjab, Pakistan by Hashmi, Aamir Rashid, Amirah, Noor Aina, Yusof, Yusnita

    Published in Management science letters (2021)
    “…The organizational performance at Punjab healthcare is crucial and often faces stock-outs of critical medicines and equipment at emergency department of…”
    Get full text
    Journal Article
  4. 4
  5. 5
  6. 6

    Overview of Financial Fraud Digital Forensic Investigation Framework by Choong, Pei-Shan, Yusof, Yusnita

    “…Financial fraud cases are dangerously escalating. Industries and consumers are struggling to prevent being victims of fraud cases. Fraudsters typically aim to…”
    Get full text
    Conference Proceeding
  7. 7

    EAGLE: GUI-Based Penetration Testing Tool for Scanning and Enumeration by Singh, Ammrish Singh Beker, Yusof, Yusnita, Nathan, Yogeswaran

    “…Penetration testing is a security exercise that is carried out by penetration testers to identify and exploit vulnerabilities in a system. Many penetration…”
    Get full text
    Conference Proceeding
  8. 8

    DFBC Recon Tool: Digital Footprint and Breach Check Reconnaissance Tool by Ng, Chen Kai, Yusof, Yusnita, Aziz, Nik Sakinah Nik Ab

    “…Nowadays, Internet is no longer private. Web service providers are trying to extract every single piece of user data for analytics or advertising purposes so…”
    Get full text
    Conference Proceeding
  9. 9

    Automated Nmap Toolkit by Mohammed, Farzan, Rahman, Nor Azlina Abdul, Yusof, Yusnita, Juremi, Julia

    “…Information gathering is one of the most important methodologies within Cybersecurity allowing pen-testers and security researchers to find information about a…”
    Get full text
    Conference Proceeding
  10. 10

    CyberGeeksMY: Public Awareness on Website Vulnerability and Proposed Idea of 'Smuggy' Prototype by Seng, Kua Wee, Yusof, Yusnita, Rahman, Nor Azlina Abd, Nathan, Yogeswaran

    “…The needs on online-based activities are increasing tremendously as the worldwide is currently in COVID-19 pandemic situation and most people are being bounded…”
    Get full text
    Conference Proceeding
  11. 11

    State-of-the-art digital watermarking attacks by Khalifa, O. O., binti Yusof, Yusnita, Abdalla, Aisha-Hassan, Olanrewaju, R. F.

    “…Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis…”
    Get full text
    Conference Proceeding
  12. 12

    Performance evaluations of digital watermarking systems by Khalifa, O. O., binti Yusof, Yusnita, Olanrewaju, R. F.

    “…A description of performance evaluation methods according to imperceptibility and robustness properties is presented in this paper. Imperceptibility can be…”
    Get full text
    Conference Proceeding
  13. 13

    Digital watermarking for digital images using wavelet transform by Yusof, Y., Khalifa, O.O.

    “…The field of digital watermarking has recently seen vast interests covering theoretical studies, novel techniques, attacks and analysis. This is due to the…”
    Get full text
    Conference Proceeding
  14. 14

    SMS banking transaction as an alternative for information, transfer and payment at merchant shops in Malaysia by Bt Abd Rahman, Nor Azlina, Shajaratuddur Bt Harun, Khalida, Bt Yusof, Yusnita

    “…This paper discusses Mobile Banking and Payment Systems using Short Message Services (SMS). The main goal of this system is to make banking services available…”
    Get full text
    Conference Proceeding
  15. 15

    Imperceptibility and robustness analysis of DWT-based digital image watermarking by Yusof, Y., Khalifa, O.O.

    “…Digital watermarking is distinctive depending on the techniques used and its intended applications. This paper concentrates on invisible digital image…”
    Get full text
    Conference Proceeding
  16. 16

    An improved wavelet digital watermarking software implementation by Khalifa, O. O., binti Yusof, Yusnita, Abdalla, A., Olanrewaju, R. F.

    “…There are quite a number of researches in proposing digital image watermarking using Discrete Wavelet Transform (DWT). However, it is clearly observed that…”
    Get full text
    Conference Proceeding
  17. 17

    Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models by Yusof, Wan Su Emi Yusnita Wan, Zakaria, Omar, Zainol, Zuraini

    “…Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can…”
    Get full text
    Conference Proceeding