A review of feature selection and sentiment analysis technique in issues of propaganda SR Ahmad, MZM Rodzi, NS Shapiei, NMM Yusop, S Ismail International Journal of Advanced Computer Science and Applications 10 (11), 2019 | 23 | 2019 |
Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study S Ismail, E Sitnikova, J Slay 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery …, 2014 | 16 | 2014 |
Towards developing scada systems security measures for critical infrastructures against cyber-terrorist attacks S Ismail, E Sitnikova, J Slay ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 12 | 2014 |
New Method of Forensic Computing in a Small Organization S Ismail, A Ahmad, MAM Shukran Australian Journal of Basic and Applied Sciences 5 (9), 2019-2025, 2011 | 8 | 2011 |
Identifying priority antecedents of educational data mining acceptance using importance-performance matrix analysis M Wook, S Ismail, NMM Yusop, SR Ahmad, A Ahmad Education and Information Technologies 24 (2), 1741-1752, 2019 | 7 | 2019 |
Managing data using neighbor replication on triangular-grid structure A Mamat, MM Deris, JH Abawajy, S Ismail International Conference on Computational Science, 1071-1077, 2006 | 7 | 2006 |
A review on Unmanned Aerial Vehicle (UAV) threats assessments MS Ismail, A Ahmad, S Ismail, NMM Yusop AIP Conference Proceedings 2617 (1), 2022 | 6 | 2022 |
Basic of numerical computational using Scilab programming Z Salleh, MYM Yusop, SB Ismail the 2nd International Conference on Mathematical Applications in Engineering …, 2012 | 5 | 2012 |
A New Teaching Approach in Object Oriented Programming Subject in Learning Military Environment SR Ahmad, MAM Shukran, S Ismail, A Ahmad International Journal of Digital Content Technology and its Applications 6 (15), 2012 | 5 | 2012 |
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors S Ismail, E Sitnikova, J Slay International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 17, 2016 | 4* | 2016 |
SCADA systems cyber security for critical infrastructures: Case studies in the transport sector S Ismail, E Sitnikova, J Slay International Conference on Cyber Warfare and Security, 425, 2015 | 3 | 2015 |
Studying SCADA Organisations Information Security Goals: An Integrated System Theory Approach. S Ismail, E Sitnikova, J Slay PACIS, 77, 2015 | 3 | 2015 |
Hybrid Framework Model for Building Honeynet Laboratory for Computer Security Education in National Defence University Malaysia (NDUM). S Rohaidah Ahmad, Z Md Ali, A Ahmad, S Ismail, MA Mohd Shukran Australian Journal of Basic & Applied Sciences 6 (8), 2012 | 2 | 2012 |
Exploring the information security culture within industrial control systems organisations: Expert reviews S Ismail, MN Ismail, A Ahmad, MA Khairuddin AIP Conference Proceedings 2617 (1), 2022 | 1 | 2022 |
Survey on Clustering Techniques for Image Categorization Dataset MAM Shukran, MSFM Yunus, MN Abdullah, MRM Isa, MA Khairuddin, ... Journal of Computer and Communications 10 (6), 177-185, 2022 | 1 | 2022 |
Initial investigation on privacy preferences: A preliminary study on user priority, concern, perception and expectation NA Hasbullah, AA Aziz, S Ismail, NN Hamid International Journal on Advanced Science, Engineering and Information …, 2011 | 1 | 2011 |
Selangor Matriculation College Information Announcement and Notification System (SMC-IANS) NFS Kamarozaman, S Ismail, SR Ahmad, A Ahmad APS, 107, 2023 | | 2023 |
Determining Eligibility Criteria for Hostel Placement at National Defense University Malaysia using the Naïve Bayes Algorithm NHJA Ali, S Ismail, S Marzukhi, N Moziyana, M Yusop APS, 245, 2023 | | 2023 |
PetTag System MAMN Azam, S Ismail, SR Ahmad, ML Talib APS, 362, 2023 | | 2023 |
Smart Key MN Abdullah, SR Ahmad, NMM Yusop, ASN Mokhtar, S Ismail APS, 310, 2023 | | 2023 |