Search Results - "Yusoff, Yunus"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Software Project Management Using Machine Learning Technique—A Review by Mahdi, Mohammed Najah, Mohamed Zabil, Mohd Hazli, Ahmad, Abdul Rahim, Ismail, Roslan, Yusoff, Yunus, Cheng, Lim Kok, Azmi, Muhammad Sufyian Bin Mohd, Natiq, Hayder, Happala Naidu, Hushalini

    Published in Applied sciences (01-06-2021)
    “…Project management planning and assessment are of great significance in project performance activities. Without a realistic and logical plan, it isn’t easy to…”
    Get full text
    Journal Article
  2. 2

    Data Encryption-Enabled Cloud Cost Optimization and Energy Efficiency-Based Border Security Model by Alomari, Mohammed F., Mahmoud, Moamin A., Yusoff, Yunus Bin, Gharaei, Niayesh, Abdalla, Reema Ahmed, Gunasekaran, Saraswathy Shamini

    Published in IEEE access (2023)
    “…Effective monitoring of illegal border crossings is a complex problem. Therefore, Border Security Systems (BSS) are deployed at border crossings to detect…”
    Get full text
    Journal Article
  3. 3

    Refinement of gravimetric geoid model by incorporating terrestrial, marine, and airborne gravity using KTH method by Pa’suya, Muhammad Faiz, Din, Ami Hassan Md, Yusoff, Mohd Yunus Mohd, Abbak, Ramazan Alpay, Hamden, Mohammad Hanif

    Published in Arabian journal of geosciences (01-10-2021)
    “…We compute a new gravimetric geoid model for Peninsular Malaysia (PMGG2020) based on the Royal Institute of Technology (KTH) method. The PMGG2020 was computed…”
    Get full text
    Journal Article
  4. 4

    Regional Mean Sea Surface and Mean Dynamic Topography Models Around Malaysian Seas Developed From 27 Years of Along-Track Multi-Mission Satellite Altimetry Data by Hamden, Mohammad Hanif, Din, Ami Hassan Md, Wijaya, Dudy Darmawan, Yusoff, Mohd Yunus Mohd, Pa’suya, Muhammad Faiz

    Published in Frontiers in earth science (Lausanne) (09-09-2021)
    “…Contemporary Universiti Teknologi Malaysia 2020 Mean Sea Surface (UTM20 MSS) and Mean Dynamic Topography (UTM20 MDT) models around Malaysian seas are…”
    Get full text
    Journal Article
  5. 5

    A systematic literature review on advanced persistent threat behaviors and its detection strategy by Che Mat, Nur Ilzam, Jamil, Norziana, Yusoff, Yunus, Mat Kiah, Miss Laiha

    Published in Journal of cybersecurity (Oxford) (02-01-2024)
    “…Abstract Advanced persistent threats (APTs) pose significant security-related challenges to organizations owing to their sophisticated and persistent nature,…”
    Get full text
    Journal Article
  6. 6

    A review of security attacks on IEC61850 substation automation system network by Rashid, Muhammad Talha Abdul, Yussof, Salman, Yusoff, Yunus, Ismail, Roslan

    “…Although IEC61850 substations can provide various advantages over traditional substations, the power supplier companies are being cautious about its…”
    Get full text
    Conference Proceeding
  7. 7

    Smart Grid Digital Forensics Investigation Framework by Mohd Abdullah, Haris Iskandar, Mustaffa, Muhammad Zulhusni, Rahim, Fiza Abdul, Ibrahim, Zul-Azri, Yusoff, Yunus, Yussof, Salman, Bakar, Asmidar Abu, Ismail, Roslan, Ramli, Ramona

    “…The advancement in the development of smart grids may be carrying the risk of increased security vulnerabilities of the grid and allowing attackers to easily…”
    Get full text
    Conference Proceeding
  8. 8

    Financial impacts of smart meter security and privacy breach by Yussof, Salman, Rusli, Mohd Ezanee, Yusoff, Yunus, Ismail, Roslan, Ghapar, Azimah Abdul

    “…Many power utility companies around the world are moving towards smart grid, which integrates power delivery infrastructure with information and communication…”
    Get full text
    Conference Proceeding
  9. 9

    Issues and challenges of forensics analysis of agents' behavior in multi-agent systems: A critical review by Musa, Nurul Ai'zah, Yusoff, Mohd Zaliman Mohd, Ismail, Roslan, Yusoff, Yunus

    “…This paper presents the review of issues and challenges of forensic analysis to monitor agent behavior in Multi-agent systems from various different…”
    Get full text
    Conference Proceeding
  10. 10

    Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents by Musa, Nurul Ai'zah, Yusoff, Mohd Zaliman Mohd, Yusoff, Yunus, Ismail, Roslan

    “…This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to…”
    Get full text
    Conference Proceeding
  11. 11

    Comparative Study on Applicability of WEBMO in Web Application Cost Estimation within Klang Valley in Malaysia by Hooi, T.C., Yusoff, Y., Hassan, Z.

    “…Parametric Web application cost estimation is referred to the usage of mathematical model to derive the estimated effort and duration of Web application…”
    Get full text
    Conference Proceeding