S
Salman Yussof
Researcher at Universiti Tenaga Nasional
Publications - 110
Citations - 1014
Salman Yussof is an academic researcher from Universiti Tenaga Nasional. The author has contributed to research in topics: Routing protocol & Computer science. The author has an hindex of 15, co-authored 100 publications receiving 671 citations. Previous affiliations of Salman Yussof include College of Information Technology & Universiti Putra Malaysia.
Papers
More filters
Proceedings ArticleDOI
Social Distancing Detection with Deep Learning Model
TL;DR: The result shows that the proposed method is able to determine the social distancing measures between multiple people in the video and can be further developed as a detection tool in realtime application.
Proceedings ArticleDOI
A review of security attacks on IEC61850 substation automation system network
TL;DR: A review of security attacks that can be launched on IEC61850 substation network in terms of how the attacks are conducted and the subsequent damages that they may cause.
Proceedings ArticleDOI
A systematic literature review: Information security culture
TL;DR: There is a need for more studies to identity the security knowledge that needs to be incorporated into organizations and to find instances of best practice for building an information security culture within organizations.
Journal ArticleDOI
Online handwritten signature verification using neural network classifier based on principal component analysis.
Vahab Iranmanesh,Sharifah Mumtazah Syed Ahmad,Wan Azizun Wan Adnan,Salman Yussof,Olasimbo Ayodeji Arigbabu,Fahad Layth Malallah +5 more
TL;DR: This paper proposes a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features, which can be significant in attaining reduced error rates.
Journal ArticleDOI
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
Saleh Atiewi,Amer Al-Rahayfeh,Muder Almiani,Salman Yussof,Omar Alfandi,Ahed Abugabah,Yaser Jararweh +6 more
TL;DR: The proposed cloud–IoT architecture supported by multifactor authentication and lightweight cryptography encryption schemes to protect big data system is implemented and evaluated using metrics such as computational time, security strength, encryption time, and decryption time.