Search Results - "Yusoff, Yunus"
-
1
Software Project Management Using Machine Learning Technique—A Review
Published in Applied sciences (01-06-2021)“…Project management planning and assessment are of great significance in project performance activities. Without a realistic and logical plan, it isn’t easy to…”
Get full text
Journal Article -
2
Data Encryption-Enabled Cloud Cost Optimization and Energy Efficiency-Based Border Security Model
Published in IEEE access (2023)“…Effective monitoring of illegal border crossings is a complex problem. Therefore, Border Security Systems (BSS) are deployed at border crossings to detect…”
Get full text
Journal Article -
3
Refinement of gravimetric geoid model by incorporating terrestrial, marine, and airborne gravity using KTH method
Published in Arabian journal of geosciences (01-10-2021)“…We compute a new gravimetric geoid model for Peninsular Malaysia (PMGG2020) based on the Royal Institute of Technology (KTH) method. The PMGG2020 was computed…”
Get full text
Journal Article -
4
Regional Mean Sea Surface and Mean Dynamic Topography Models Around Malaysian Seas Developed From 27 Years of Along-Track Multi-Mission Satellite Altimetry Data
Published in Frontiers in earth science (Lausanne) (09-09-2021)“…Contemporary Universiti Teknologi Malaysia 2020 Mean Sea Surface (UTM20 MSS) and Mean Dynamic Topography (UTM20 MDT) models around Malaysian seas are…”
Get full text
Journal Article -
5
A systematic literature review on advanced persistent threat behaviors and its detection strategy
Published in Journal of cybersecurity (Oxford) (02-01-2024)“…Abstract Advanced persistent threats (APTs) pose significant security-related challenges to organizations owing to their sophisticated and persistent nature,…”
Get full text
Journal Article -
6
A review of security attacks on IEC61850 substation automation system network
Published in Proceedings of the 6th International Conference on Information Technology and Multimedia (01-11-2014)“…Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its…”
Get full text
Conference Proceeding -
7
Smart Grid Digital Forensics Investigation Framework
Published in 2020 8th International Conference on Information Technology and Multimedia (ICIMU) (24-08-2020)“…The advancement in the development of smart grids may be carrying the risk of increased security vulnerabilities of the grid and allowing attackers to easily…”
Get full text
Conference Proceeding -
8
Financial impacts of smart meter security and privacy breach
Published in Proceedings of the 6th International Conference on Information Technology and Multimedia (01-11-2014)“…Many power utility companies around the world are moving towards smart grid, which integrates power delivery infrastructure with information and communication…”
Get full text
Conference Proceeding -
9
Issues and challenges of forensics analysis of agents' behavior in multi-agent systems: A critical review
Published in 2015 International Symposium on Agents, Multi-Agent Systems and Robotics (ISAMSR) (01-08-2015)“…This paper presents the review of issues and challenges of forensic analysis to monitor agent behavior in Multi-agent systems from various different…”
Get full text
Conference Proceeding -
10
Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents
Published in Proceedings of the 6th International Conference on Information Technology and Multimedia (01-11-2014)“…This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to…”
Get full text
Conference Proceeding -
11
Comparative Study on Applicability of WEBMO in Web Application Cost Estimation within Klang Valley in Malaysia
Published in 2008 IEEE 8th International Conference on Computer and Information Technology Workshops (01-07-2008)“…Parametric Web application cost estimation is referred to the usage of mathematical model to derive the estimated effort and duration of Web application…”
Get full text
Conference Proceeding