Search Results - "Intrusion detection systems (Computer security)"
Search alternatives:
- "Intrusion detection systems Computer security " »
- intrusion »
-
1
Prevention of man-in-the-middle attack against HTTPS website / Nur Syahirah Zainalabidin
Published 2020Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Thesis -
2
Real time and auto triggered facial recogition entrance system / Muhammad Raez Zahari
Published 2013Subjects: Get full text
Get full text
Thesis -
3
Intrusion notification via SMS / Aziz Kasmir Mat Yunos
Published 2006Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Student Project -
4
Password based door lock system using PIC microcontroller / Mohamad Hairy Zulfahmy Rosli and Muhammad Syazwan Hamzah
Published 2015Subjects: Get full text
Get full text
Student Project -
5
QR tag scanner / Dr. Mohd Afizi Mohd Shukran
Published 2013Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Book Section -
6
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Student Project -
7
Security assessment of FTMSK web server / Md Nazri Hashim
Published 2005Subjects: Get full text
Get full text
Thesis -
8
Investigation on anonymous email in online social networking / Fatma Husna M Mazlin
Published 2016Subjects: Get full text
Get full text
Thesis -
9
Intrusion identification system using domain name service
Published 2008Subjects: Get full text
Get full text
Thesis -
10
Cyber security awareness among employees of MSC Cyberport Sdn. Bhd. Johor / Nurul Hazirah Azali
Published 2018Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Student Project -
11
User's view on information security in government sector / Siti Asmah Ibrahim
Published 2015Subjects: Get full text
Get full text
Thesis -
12
IPv6 tunneling through multiple layers of NATs using XTeredo / Noor Jeehan Amat Jamji
Published 2009Subjects: Get full text
Get full text
Thesis -
13
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
Published 2016Subjects: Get full text
Get full text
Thesis -
14
Image capturing fake user of mobile phone using front camera / Dr Mohd Afizi Mohd Shukran
Published 2013Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Book Section -
15
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024Subjects: “…Intrusion detection systems (Computer security)…”
thesis::master thesis -
16
DeDePro Wireless Intruder Detection System (WIDS) against de-authentication/ disassociation attacks in 802.11 A/B/G/N / Norzaidi Baharudin
Published 2014Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Thesis -
17
Systematic monitoring attack repulsion total detection (SMART) detection / Khairunnisa Halim Azman
Published 2011Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Thesis -
18
Analysing the potential vulnerabilities in online voting protocols: homomorphic encryption approach
Published 2025Subjects: “…Intrusion detection systems (Computer security). Computer network security. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
