Robiah Yusof

1.1k total citations · 1 hit paper
37 papers, 672 citations indexed

About

Robiah Yusof is a scholar working on Computer Networks and Communications, Signal Processing and Information Systems. According to data from OpenAlex, Robiah Yusof has authored 37 papers receiving a total of 672 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Computer Networks and Communications, 19 papers in Signal Processing and 17 papers in Information Systems. Recurrent topics in Robiah Yusof's work include Advanced Malware Detection Techniques (19 papers), Network Security and Intrusion Detection (17 papers) and Digital and Cyber Forensics (6 papers). Robiah Yusof is often cited by papers focused on Advanced Malware Detection Techniques (19 papers), Network Security and Intrusion Detection (17 papers) and Digital and Cyber Forensics (6 papers). Robiah Yusof collaborates with scholars based in Malaysia, Iraq and Indonesia. Robiah Yusof's co-authors include Siti Rahayu Selamat, Salama A. Mostafa, Nazrulazhar Bahaman, Cik Feresa Mohd Foozy, Shahrin Sahib, Aswami Ariffin, Mohd Faizal Abdollah, Bander Ali Saleh Al‐rimy, Samer Ali Al–shami and Baidaa Al‐Bander and has published in prestigious journals such as IEEE Access, Computers, materials & continua/Computers, materials & continua (Print) and International Journal of Advanced Computer Science and Applications.

In The Last Decade

Robiah Yusof

34 papers receiving 612 citations

Hit Papers

Benchmarking of Machine Learning for Anomaly Based Intrus... 2021 2026 2022 2024 2021 50 100 150 200 250

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Robiah Yusof Malaysia 9 458 384 311 261 44 37 672
Abdullah Asım Yılmaz Türkiye 5 280 0.6× 231 0.6× 171 0.5× 173 0.7× 39 0.9× 9 453
Krzysztof Cabaj Poland 13 449 1.0× 392 1.0× 205 0.7× 324 1.2× 85 1.9× 48 704
Dave Tian United States 16 344 0.8× 353 0.9× 311 1.0× 322 1.2× 28 0.6× 44 701
Adel Alshamrani Saudi Arabia 10 483 1.1× 254 0.7× 204 0.7× 292 1.1× 29 0.7× 22 680
Mohd. Yazid Idris Malaysia 14 574 1.3× 336 0.9× 412 1.3× 197 0.8× 14 0.3× 60 768
Giovanni Apruzzese Liechtenstein 14 602 1.3× 463 1.2× 505 1.6× 198 0.8× 16 0.4× 32 811
Dan Lo United States 12 317 0.7× 283 0.7× 158 0.5× 291 1.1× 33 0.8× 73 597
Michael Cheng Yi Cho Taiwan 3 392 0.9× 177 0.5× 144 0.5× 223 0.9× 58 1.3× 6 529
Qiang Zeng United States 14 197 0.4× 265 0.7× 224 0.7× 245 0.9× 46 1.0× 55 542

Countries citing papers authored by Robiah Yusof

Since Specialization
Citations

This map shows the geographic impact of Robiah Yusof's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Robiah Yusof with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Robiah Yusof more than expected).

Fields of papers citing papers by Robiah Yusof

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Robiah Yusof. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Robiah Yusof. The network helps show where Robiah Yusof may publish in the future.

Co-authorship network of co-authors of Robiah Yusof

This figure shows the co-authorship network connecting the top 25 collaborators of Robiah Yusof. A scholar is included among the top collaborators of Robiah Yusof based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Robiah Yusof. Robiah Yusof is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yusof, Robiah, et al.. (2025). Boards and Value Creation: Unveiling the Drivers of Corporate Reputation. International Journal of Research and Innovation in Social Science. IX(II). 1592–1605.
3.
Yusof, Robiah, et al.. (2023). IOT Based Integrated COVID-19 Self-Monitoring Tool (COV-SMT) for Quarantine. International Journal of Interactive Mobile Technologies (iJIM). 17(9). 141–149. 3 indexed citations
4.
Ahmad, Rabiah, et al.. (2023). Development of Cybersecurity Competency and Professional Talent for Cyber Ummah. International Journal of Sustainable Construction Engineering and Technology (Universiti Tun Hussein Onn Malaysia). 4(2).
5.
Yusof, Robiah, et al.. (2023). Analysis of Machine Learning Techniques on URL Phishing Dataset. 5(1). 57–70.
6.
Yusof, Robiah, et al.. (2021). Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset. IEEE Access. 9. 22351–22370. 266 indexed citations breakdown →
7.
Yusof, Robiah, et al.. (2019). Code Pocket: Development of Interactive Online Learning of STEM’s Subject. International Journal of Recent Technology and Engineering (IJRTE). 8(2). 5537–5542. 4 indexed citations
8.
Yusof, Robiah, et al.. (2018). A Review Study on Cloud Computing Issues. Journal of Physics Conference Series. 1018. 12006–12006. 18 indexed citations
9.
Selamat, Siti Rahayu, et al.. (2016). Discovering Cyber Terrorism Using Trace Pattern.. International journal of network security. 18(6). 1034–1040. 1 indexed citations
10.
Amin, Anang Hudaya Muhamad, et al.. (2016). A passive and privacy-friendly area based localization for wireless indoor networks. Siti Hasmah Digital Library-MMU Institutiona Repository (Multimedia University). 213–218. 2 indexed citations
11.
Abdollah, Mohd Faizal, et al.. (2015). Recognizing API Features for Malware Detection Using Static Analysis. 5. 6–12. 4 indexed citations
12.
Yusof, Robiah, et al.. (2015). Organisation Readiness Factors Towards IPv6 Migration: Expert Review. Procedia - Social and Behavioral Sciences. 195. 1882–1889. 4 indexed citations
13.
Amin, Anang Hudaya Muhamad, et al.. (2014). A RSSI-based rogue access point detection framework for Wi-Fi hotspots. 104–109. 4 indexed citations
14.
Sahib, Shahrin, et al.. (2014). Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection. 1–5. 45 indexed citations
15.
Yusof, Robiah, et al.. (2013). Evaluation of Pipelines in Industrial Radiography Using Image Processing Techniques. Advanced Science Engineering and Medicine. 6(1). 81–85. 2 indexed citations
16.
Sahib, Shahrin, et al.. (2013). Profiling mobile malware behaviour through hybrid malware analysis approach. 7 indexed citations
17.
Abdollah, Mohd Faizal, et al.. (2010). Statistical Approach for Validating Static Threshold in Fast Attack Detection. 4 indexed citations
18.
Yusof, Robiah, et al.. (2009). A New Generic Taxonomy on Hybrid Malware Detection Technique. 1 indexed citations
19.
Abdollah, Mohd Faizal, et al.. (2009). Threshold verification using statistical approach for fast attack detection. Universiti Utara Malaysia Institutional Repository (Universiti Utara Malaysia). 3 indexed citations
20.
Yusof, Robiah, Siti Rahayu Selamat, & Shahrin Sahib. (2008). Intrusion Alert Correlation Technique Analysis for Heterogeneous Log. 27 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026