Search Results - "Intrusion detection systems (Computer security). Computer network security. Hackers"
Search alternatives:
- "Intrusion detection systems Computer security . Computer network security. Hackers" »
- intrusion »
-
1
Prevention of man-in-the-middle attack against HTTPS website / Nur Syahirah Zainalabidin
Published 2020Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
2
Real time and auto triggered facial recogition entrance system / Muhammad Raez Zahari
Published 2013Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
3
Intrusion notification via SMS / Aziz Kasmir Mat Yunos
Published 2006Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Student Project -
4
Password based door lock system using PIC microcontroller / Mohamad Hairy Zulfahmy Rosli and Muhammad Syazwan Hamzah
Published 2015Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Student Project -
5
QR tag scanner / Dr. Mohd Afizi Mohd Shukran
Published 2013Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Book Section -
6
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Student Project -
7
Security assessment of FTMSK web server / Md Nazri Hashim
Published 2005Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
8
Investigation on anonymous email in online social networking / Fatma Husna M Mazlin
Published 2016Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
9
Intrusion identification system using domain name service
Published 2008Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
10
Cyber security awareness among employees of MSC Cyberport Sdn. Bhd. Johor / Nurul Hazirah Azali
Published 2018Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Student Project -
11
User's view on information security in government sector / Siti Asmah Ibrahim
Published 2015Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
12
IPv6 tunneling through multiple layers of NATs using XTeredo / Noor Jeehan Amat Jamji
Published 2009Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
13
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
Published 2016Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
14
Image capturing fake user of mobile phone using front camera / Dr Mohd Afizi Mohd Shukran
Published 2013Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Book Section -
15
DeDePro Wireless Intruder Detection System (WIDS) against de-authentication/ disassociation attacks in 802.11 A/B/G/N / Norzaidi Baharudin
Published 2014Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
16
Systematic monitoring attack repulsion total detection (SMART) detection / Khairunnisa Halim Azman
Published 2011Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Thesis -
17
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Get full text
Book Section -
18
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Get full text
Book Section -
19
Penyalahgunaan teknologi internet di kalangan mahasiswa: satu kajian kes di UiTM / Mazlan Osman & Amri Abdul Rahman
Published 2008Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Research Reports -
20
Design and fabrication of IoT smart farm / Hazim Sharudin ... [et al.]
Published 2024Subjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Get full text
Get full text
Article
