Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks
Personal data is constantly being compromised not just by the normal identity thefts but also abnormal attacks. The Islamic concept of Al-Mu’awwidhah inspired the discovery of non-parametric cryptographs for personal data protection against abnormal (paranormal and asymmetric) cyber-attacks. A conti...
| Main Authors: | Shamsudin, Ahmad Faizul, Ibrahim, Jamaludin, Sembok, Tengku Mohd, Noordin, Mohamad Fauzan, Hashim, Jamil, Wan Yusof, Wan Sabri |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/30843/ http://irep.iium.edu.my/30843/1/Table_of_Content.pdf http://irep.iium.edu.my/30843/2/88.pdf |
Similar Items
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
Big data storage, collection, & protection with Islamic perspective
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
Automatic knowledge base constructor for Al-Quran
retrieval system
by: Noordin, Mohamad Fauzan, et al.
Published: (2015)
by: Noordin, Mohamad Fauzan, et al.
Published: (2015)
Logical-linguistic semantic in search engine
by: Tengku Sembok, Tengku Mohd, et al.
Published: (2012)
by: Tengku Sembok, Tengku Mohd, et al.
Published: (2012)
Logical-linguistic semantic in search engine
by: Tengku Sembok, Tengku Mohd, et al.
Published: (2012)
by: Tengku Sembok, Tengku Mohd, et al.
Published: (2012)
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010)
by: Abdul-Latip, S. F., et al.
Published: (2010)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Abnormal Event Detection in Surveillance Videos Using Spatiotemporal Autoencoder
by: Chong, Yong Shean
Published: (2019)
by: Chong, Yong Shean
Published: (2019)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
MuStServ: A Lightweight Multimedia Streaming Server
by: Low, Tan Jung, et al.
Published: (2007)
by: Low, Tan Jung, et al.
Published: (2007)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Digital archiving of traditional songket motifs using image processing tool
by: Jamil, Nursuriati, et al.
Published: (2012)
by: Jamil, Nursuriati, et al.
Published: (2012)
Digital archiving of traditional songket motifs using image processing tool
by: Jamil, Nursuriati, et al.
Published: (2012)
by: Jamil, Nursuriati, et al.
Published: (2012)
Unsupervised Abnormalities Extraction and Brain Segmentation
by: Tong Hau, Lee, et al.
Published: (2008)
by: Tong Hau, Lee, et al.
Published: (2008)
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
by: Suleman , Khan
Published: (2017)
by: Suleman , Khan
Published: (2017)
Similar Items
-
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015) -
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020) -
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011) -
Big data storage, collection, & protection with Islamic perspective
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)