Search Results - open secure software selection
Search alternatives:
- secure software »
- selection »
-
1
-
2
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Moreover, at present, the control plane has no built-in security mechanism that prevents malicious SDN agents from sending authorized but forged flows to corrupt the controller state or bring the entire network down, in the worst case, even if the OpenFlow is Transport Layer Security (TLS) enabled. …”
Get full text
Get full text
Thesis -
3
-
4
Catalogue-based guideline for misuse case
Published 2022“…The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. …”
Get full text
Get full text
Article -
5
Electronic automatic door / Siti Nurshaline Mohd Saadon and Muhammad Hafizi Zakaria
Published 2015“…Generally, this security code lock is able to increase the security level such as to the ordinary password based lock, since the sequence of buttons to key in the security code is not fixed and security code is not based on alpha numeric number. …”
Get full text
Get full text
Student Project -
6
Human-Technology Centric in Cyber Security Maintenance for Digital Transformation Era
Published 2024journal::journal article -
7
RISC-V instruction set extension on blockchain application
Published 2024“…Although there were numerous ways to improve the performance speed of blockchain technology in software implementations, hardware implementation of the blockchain algorithms was a more preferred choice due to the emerging open-source computer architecture, RISC-V. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Analysis and design of intrusion detection system implementation / Chia Fook Keong
Published 2003“…The IDS chosen was Snort, which is a free, open source, lightweight, multi-platform and customizable software. …”
Get full text
Get full text
Thesis -
9
Rekabentuk Dan Sintesis Suatu Cip Inkripsi Menggunakan Algoritma Blowfish
Published 2001“…The founding of cryptography as an obscuring method in ensuring the security of any information, has opened a new era in cyberspace information security. …”
Get full text
Get full text
Thesis -
10
CATALOGUE-BASED GUIDELINE FOR MISUSE CASE
Published 2022“…The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. …”
Get full text
Get full text
Get full text
Article -
11
Advancing security measures: A brainwave-based biometric system for user identification and authentication
Published 2024“…This research underscores the potential of EEG-based authentication systems in fortifying organizational security protocols.…”
Get full text
Get full text
Get full text
Article -
12
A review of cloud computing implementation in ASEAN countries
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Sustainable Growth Rate, Capital Structure, Dividend Policy And Share Price Performance: The Case Of Malaysian Public-Listed Shariah-Compliant Firms
Published 2024thesis::doctoral thesis -
14
Factors contributing to Volunteer Smartphone Patrol app adoption in community policing / Ghazila Ghazi, Wan Hartini Wan Zainodin and Azizul Halim Yahya
Published 2022“…Using a case study design, salient discoveries were obtained through in-depth interviews with 9 VSP users in Klang Valley. The NVivo 12.0 software was used in the process of open, axial and selective coding. …”
Get full text
Get full text
Get full text
Article -
15
-
16
UniEase
Published 2023“…Join the UniEase community today and open up a world of opportunities.…”
Get full text
Get full text
Get full text
Article -
17
-
18
تحليل الخطاب الإعلامي للدبلوماسية الرقمية الإسرائيلية تجاه الشرق الأوسط دراسة تطبيقية على منصة فيسبو ك...
Published 2026thesis::doctoral thesis -
19
