Roslan Ismail, PhD
Cited by
Cited by
A survey of trust and reputation systems for online service provision
A Jøsang, R Ismail, C Boyd
Decision support systems 43 (2), 618-644, 2007
The beta reputation system
A Josang, R Ismail
Proceedings of the 15th bled electronic commerce conference 5, 2502-2511, 2002
Common phases of computer forensics investigation models
Y Yusoff, R Ismail, Z Hassan
International Journal of Computer Science & Information Technology 3 (3), 17-31, 2011
A review of security attacks on IEC61850 substation automation system network
MTA Rashid, S Yussof, Y Yusoff, R Ismail
Proceedings of the 6th international conference on information technology …, 2014
A Survey of Arabic language Support in Semantic web
M Beseiso, AR Ahmad, R Ismail
International Journal of Computer Applications 9 (1), 35-40, 2010
A security architecture for reputation systems
R Ismail, C Boyd, A Josang, S Russell
International Conference on Electronic Commerce and Web Technologies, 176-185, 2003
A survey of SCADA testbed implementation approaches
Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ...
Indian Journal of Science and Technology 10 (26), 1-8, 2017
A Routing Protocol based on Trusted and shortest Path selection for Mobile Ad hoc Network
HS Jassim, S Yussof, TS Kiong, SP Koh, R Ismail
2009 IEEE 9th Malaysia International Conference on Communications (MICC …, 2009
Sign language to voice recognition: hand detection techniques for vision-based approach
NSM Salleh, J Jais, L Mazalan, R Ismail, S Yussof, A Ahmad, A Anuar, ...
Current Developments in Technology-Assisted Education 422, 2006
Strong privacy in reputation systems
R Ismail, C Boyd, A Josang, S Russel
Information security applications: proceedings of the 4th International …, 2003
Adopting hadith verification techniques in to digital evidence authentication
Y Yusoff, R Ismail, Z Hassan
Journal of Computer Science 6 (6), 613, 2010
An Arabic language framework for semantic web
M Beseiso, AR Ahmad, R Ismail
2011 International Conference on Semantic Technology and Information …, 2011
Private reputation schemes for p2p systems
R Ismail, C Boyd, A Josang, S Russell
Proceedings of the 2nd International Workshop on Security In Information …, 2004
Forming trust in mobile ad hoc network
AA Bakar, R Ismail, J Jais
2009 WRI International Conference on Communications and Mobile Computing 3 …, 2009
A review on extended role based access control (E-RBAC) model in pervasive computing environment
AA Bakar, R Ismail, J Jais
2009 First International Conference on Networked Digital Technologies, 533-535, 2009
Financial impacts of smart meter security and privacy breach
S Yussof, ME Rusli, Y Yusoff, R Ismail, AA Ghapar
Proceedings of the 6th International Conference on Information Technology …, 2014
Access control and privacy in MANET emergency environment
AA Bakar, AA Ghapar, R Ismail
2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014
A new architecture for email knowledge extraction
M Beseiso, AR Ahmad, R Ismail
International Journal of Web & Semantic Technology 3 (3), 1, 2012
Information Technology program students' awareness and perceptions towards personal data protection and privacy
LF Chen, R Ismail
2013 International Conference on Research and Innovation in Information …, 2013
Ensuring Data Privacy and Security in MANET: Case in Emergency Rescue Mission
A Bakar, R Ismail, AAR Hmad, JL Manan
Proceedings of the International Conference on Information and Knowledge …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20