Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3
-
4
-
5by Ali, Siti Hajar Aminah“... by cybersecurity field. Another different case of cybersecurity is the Distributed Denial of Services (DDoS...”
Published 2015
Get full text
Thesis -
6
-
7by Mohammed, Idi“...The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity...”
Published 2019
Get full text
Thesis -
8
-
9by Noor Suhani, Sulaiman“.... Responsibility norms are integrated into the model as a means to assess employees‘ behaviors toward cybersecurity...”
Published 2023
Get full text
Thesis -
10by Mohammed Abali, Aliyu“... security learning and a general support for cybersecurity protection. The project is a case study based...”
Published 2013
Get full text
Thesis -
11
-
12by Mohamed, Siti Hajar“... by CyberSecurity Malaysia shows that the computer crimes recorded an increase every year. Since the Malaysian...”
Published 2017
Get full text
Thesis -
13by Tan, Toh Hao“..., Readiness and Cybersecurity. Then, by using the SmartPLS 3.0, these constructs have been given the weightage...”
Published 2021
Get full text
Thesis -
14by Ahmad, Roshdi“... involving 213 respondents who were existing customers of CyberSecurity Malaysia (CSM), the results...”
Published 2017
Get full text
Thesis -
15by Rafsanjani, Ahmad Sahban“...Malicious Uniform Resource Locators (URLs) are one of the major threats in cybersecurity. Cyber...”
Published 2023
Get full text
Thesis -
16
-
17by Md Tahir, Mohamad Afizal“... CyberSecurity Malaysia (CSM) to deal and lead in computer forensic evidence. Malaysian Administrative...”
Published 2016
Get full text
Thesis -
18by Mohamed, Kartini“... using a uSign-Mf+ module containing the proposed improvements and sent for evaluation by CyberSecurity...”
Published 2017
Get full text
Thesis -
19
-
20by Mohammad, Nur Ameera Natasha“...An insider threat has become one of the most challenging malicious activities in cybersecurity...”
Published 2022
Get full text
Get full text
Thesis