scispace - formally typeset
S

Salman Yussof

Researcher at Universiti Tenaga Nasional

Publications -  110
Citations -  1014

Salman Yussof is an academic researcher from Universiti Tenaga Nasional. The author has contributed to research in topics: Routing protocol & Computer science. The author has an hindex of 15, co-authored 100 publications receiving 671 citations. Previous affiliations of Salman Yussof include College of Information Technology & Universiti Putra Malaysia.

Papers
More filters
Proceedings ArticleDOI

Social Distancing Detection with Deep Learning Model

TL;DR: The result shows that the proposed method is able to determine the social distancing measures between multiple people in the video and can be further developed as a detection tool in realtime application.
Proceedings ArticleDOI

A review of security attacks on IEC61850 substation automation system network

TL;DR: A review of security attacks that can be launched on IEC61850 substation network in terms of how the attacks are conducted and the subsequent damages that they may cause.
Proceedings ArticleDOI

A systematic literature review: Information security culture

TL;DR: There is a need for more studies to identity the security knowledge that needs to be incorporated into organizations and to find instances of best practice for building an information security culture within organizations.
Journal ArticleDOI

Online handwritten signature verification using neural network classifier based on principal component analysis.

TL;DR: This paper proposes a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features, which can be significant in attaining reduced error rates.
Journal ArticleDOI

Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography

TL;DR: The proposed cloud–IoT architecture supported by multifactor authentication and lightweight cryptography encryption schemes to protect big data system is implemented and evaluated using metrics such as computational time, security strength, encryption time, and decryption time.