-
1by Safiee, Mohd. Fauzan“...An Intrusion Detection System (IDS) is detects and blocks unwanted attacks to the civilian...”
Published 2007
Get full text
Thesis -
2by Mohamedali Abdalla, Ahmed Abdalla“...The growth of the Internet and networking has made securing networks against attacks a very...”
Published 2015
Get full text
Thesis -
3by Valashani, Pouya Bagherpour“... are studied: attacking cash machine, cashier’s attacking and making the store messy. In implementing...”
Published 2013
Get full text
Thesis -
4by Mousavi, Seyed Mojtaba Khorzoughi“...-based methods, while in automated methods the robustness against intentional or unintentional attacks...”
Published 2015
Get full text
Thesis -
5by Choong, Kai Bin“...”. Text-based CAPTCHA is the most common technique used across the internet to detect bot from attacking...”
Published 2018
Get full text
Thesis -
6by Chang, Yu Cheng“... scheme such that it is vulnerable to some form of attacks. Since Brand’s scheme is the basis of most E...”
Published 2004
Thesis -
7by Mat Sidek, Abd. Rahim“... to determine their characteristics. The analysis consists; statistical test, correlation attack, linear...”
Published 2006
Get full text
Thesis -
8by Fahmi Ariaff, Mohd. Faizz“... stroke, heart attack and heart disease. In this case, accurate blood pressure measurement and prediction...”
Published 2013
Get full text
Thesis -
9by Ahmad, Ashraf Adamu“..., threat detection, and as a support to electronic attack system. Its main feature is to determine...”
Published 2014
Thesis -
10by Hew, Kean Yung“... testability and reliability, which in turn will protect the system from attack and will incur less testing...”
Published 2008
Get full text
Thesis -
11by Paraman, Norlina“...Software development for network monitoring is very important to discover new ways of attacking...”
Published 2005
Get full text
Thesis -
12by Al-Hasan, Waleed S. Hasan“... the security problem but proposed technique can withstand attacks....”
Published 2015
Get full text
Thesis -
13by Raja Mohd. Radzi, Raja Zahilah“... applications, such as target identification and tracking. WSN are prone to failure and malicious user attack...”
Published 2007
Get full text
Thesis -
14by Ismail, Mohd. Izuan“... but exposes to attackers. Cryptography services are essential in order to provide the authentication, privacy...”
Published 2006
Get full text
Thesis -
15by Abdul Halim, Abdul Jaafar“... as the number of the terrorist attacks keep increasing from time to time and the technology knowledge...”
Published 2007
Get full text
Thesis -
16by Khalaf, Mohammed Abdullah“... to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI...”
Published 2016
Get full text
Thesis -
17by Tijjani, Auwal Shehu“... the cell is vulnerable to virus and bacteria attack. In future, the technique will supplement the present...”
Published 2015
Get full text
Thesis -
18by Jabas, Hatem Nabih“... attack system. Its main feature is to determine the Pulse Descriptor Words (PDWs) which consists of: 1...”
Published 2018
Get full text
Thesis -
19by Yeap, Yong Yew“... geometrical attacks. With the proposed technique, an overall accuracy rate of 84.33% and 82.79% is obtained...”
Published 2018
Get full text
Thesis