Search Results - open secure software selection

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Moreover, at present, the control plane has no built-in security mechanism that prevents malicious SDN agents from sending authorized but forged flows to corrupt the controller state or bring the entire network down, in the worst case, even if the OpenFlow is Transport Layer Security (TLS) enabled. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Catalogue-based guideline for misuse case by Khairuddin, Muhammad Asyraf, Abd Ghani, Abdul Azim, Zulzalil, Hazura, Hassan, Saadah

    Published 2022
    “…The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. …”
    Get full text
    Get full text
    Article
  5. 5

    Electronic automatic door / Siti Nurshaline Mohd Saadon and Muhammad Hafizi Zakaria by Mohd Saadon, Siti Nurshaline, Zakaria, Muhammad Hafizi

    Published 2015
    “…Generally, this security code lock is able to increase the security level such as to the ordinary password based lock, since the sequence of buttons to key in the security code is not fixed and security code is not based on alpha numeric number. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…Although there were numerous ways to improve the performance speed of blockchain technology in software implementations, hardware implementation of the blockchain algorithms was a more preferred choice due to the emerging open-source computer architecture, RISC-V. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Analysis and design of intrusion detection system implementation / Chia Fook Keong by Chia, Fook Keong

    Published 2003
    “…The IDS chosen was Snort, which is a free, open source, lightweight, multi-platform and customizable software. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Rekabentuk Dan Sintesis Suatu Cip Inkripsi Menggunakan Algoritma Blowfish by Md. Nasiri, Siti Zarina

    Published 2001
    “…The founding of cryptography as an obscuring method in ensuring the security of any information, has opened a new era in cyberspace information security. …”
    Get full text
    Get full text
    Thesis
  10. 10

    CATALOGUE-BASED GUIDELINE FOR MISUSE CASE by Muhammad Asyraf, Khairuddin, Abdul Azim, Abd Ghani, Hazura, Zulzalil, Sa’adah, Hassan

    Published 2022
    “…The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Factors contributing to Volunteer Smartphone Patrol app adoption in community policing / Ghazila Ghazi, Wan Hartini Wan Zainodin and Azizul Halim Yahya by Ghazi, Ghazila, Wan Zainodin, Wan Hartini, Yahya, Azizul Halim

    Published 2022
    “…Using a case study design, salient discoveries were obtained through in-depth interviews with 9 VSP users in Klang Valley. The NVivo 12.0 software was used in the process of open, axial and selective coding. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19