-
1by Kamarudin, Nazhatul Hafizah“... threatened by security attacks. It is noted that the use of username and password as an authentication scheme...”
Published 2018
Get full text
Thesis -
2by Azman, Nor Fazalina“... to login to the web page. The proposed technique is proven to mitigate few types of attacks such as Man...”
Published 2016
Get full text
Thesis -
3by Aziz, Syaidahtul Badriyah“... are motivated by their different background and need. Physical attack, such as node cloning gives...”
Published 2015
Get full text
Thesis