-
1by Mohd Jaafar, Fatin Haziqah“...This study is about termite attack at historical building, where it is involves a conservation work...”
Published 2013
Get full text
Thesis -
2by Azali, Muhamad Rizal“...This project is using a honeypot as a tool to detect internal network attack at Faculty...”
Published 2005
Get full text
Thesis -
3by Roslan, Fairuzan“... of the greatest problems the security community faces is lack of information on the attacker. This is one...”
Published 2004
Get full text
Thesis -
4by Harun, Zati Bayani“... (DDoS) attack which is jamming attack. Almost 81% of jamming attacks are initiated at the MAC layer due...”
Published 2019
Get full text
Thesis -
5by Nordin, Norfarina“...The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has...”
Published 2020
Get full text
Thesis -
6by Mohd Fauzi, Shukor Sanim“... of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems...”
Published 2003
Get full text
Thesis -
7by Yusri, Muhammad Syamil“...DDoS attacks represent a substantial danger to network availability and security. Because...”
Published 2024
Get full text
Thesis -
8by Md Ilyas, Siti Sarah“...The number of phishing attacks involving online banking has records an increase percentage over...”
Published 2017
Get full text
Thesis -
9by Mohamad Fauzi, Noor Shafiqa Fazlien“... of attackers which publicly embarrasses the victim by sharing some personal information of the victim...”
Published 2020
Get full text
Thesis -
10by Hussein, Safwan Mawlood“...The vast amount of attacks over the Internet makes the computer users and many organizations under...”
Published 2012
Get full text
Thesis -
11by Mohamad Alias, Mohd Azuan“...Port knocking is technique first introduce in the Black Hat to prevent attackers from discovering...”
Published 2012
Get full text
Thesis -
12by Ahmad Tarmizi Lim, Siti Naquiah“... password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without...”
Published 2016
Get full text
Thesis -
13by Marbukhari, Norhaflyza“... remotely and unattended has exposed itself to node impersonation attack. This kind of attack can be further...”
Published 2018
Get full text
Thesis -
14by Ahmad, Zaid“.... Unfortunately, the AODV protocol is vulnerable to attacks due to the lack of security. Among various kinds...”
Published 2014
Get full text
Thesis -
15by Mohd Nordin, Ahmad Nasreen Aqmal“... of network intrusion attacks, particularly Remote to Local (R2L) attacks. The problem statement underscores...”
Published 2024
Get full text
Thesis -
16by Daim, Siti Baroroh“... of this research is to analyze chronology of Bukit Kepong Police Station attack using 3D model of Bukit Kepong...”
Published 2019
Get full text
Thesis -
17by Ametefe, Divine Senanu“... widespread use, AFIS is highly vulnerable to presentation attacks involving the fabrication and presentation...”
Published 2023
Get full text
Thesis -
18by Abdul Rahman, Muhamad Nazri“... Center (WTC) Attack: Its Impact to the Kuala Lumpur Stock Exchange (KLSE) and Malaysia Foreign Exchange...”
Published 2002
Get full text
Thesis -
19by Mohd Yusof, Mohd Azahari“...DDoS attacks are one of the most serious threats nowadays. It is an attack launched by an attacker...”
Published 2019
Get full text
Thesis -
20by Sapri, Nurnadia“..., it is unsecure because the attacker can break security parameters to obtain access to the data that currently...”
Published 2015
Get full text
Thesis