Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
Many organizations nowadays use wireless networks or Wi-Fi (Wireless Fidelity) networks. This is because of the resilience and flexibility, simplicity in installing, and lower costs when compared to fixing wired cables all over an organization’s infrastructure. The Wi-Fi technology are not only inst...
| Main Authors: | Ponkoodalingam, Kannan, Nitashine, Baskaran, Deshinta, Arrova Dewi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
INTI International University
2018
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1144/ http://eprints.intimal.edu.my/1144/1/v1_2018_9.pdf |
Similar Items
A PROTOTYPE OF STORM WATER CHANNEL IOT (SWCI) TO PREVENT FLOOD DAMAGE IN MALAYSIA
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Study on Security Testing-as-a-Service (TaaS) in Cloud Environment
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
The Air and Sound Pollution Monitoring System using Internet of Things and Cloud Based Data Analysis
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
A Review of Data Analytics Adoption in Business Industry
by: Chong, Fong Kim, et al.
Published: (2019)
by: Chong, Fong Kim, et al.
Published: (2019)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Android Application for Managing Urgent Convalescent Plasma Blood Request for Covid19 Treatment
by: Olid, Nasir, et al.
Published: (2022)
by: Olid, Nasir, et al.
Published: (2022)
Design and Implementation of Online Examination System for a Higher Educational Institution
by: Nyamupanemunda, Larry, et al.
Published: (2022)
by: Nyamupanemunda, Larry, et al.
Published: (2022)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Utilize Medical Text Data to Estimate Disease Types by Using Naïve Bayes and ANN Classifier
by: Mujiono, Sadikin, et al.
Published: (2021)
by: Mujiono, Sadikin, et al.
Published: (2021)
DEVELOPMENT OF CLOUD-BASED MEDIA PLAYER USING MICROSOFT AZURE SERVICES
by: Chong, Fong Kim, et al.
Published: (2018)
by: Chong, Fong Kim, et al.
Published: (2018)
Cloud based Heartbeat Rate Monitoring System with Location Tracking
by: Malathy, Batumalay*, et al.
Published: (2020)
by: Malathy, Batumalay*, et al.
Published: (2020)
A Computational System Approach
To Develop Students’ Emotion Oriented System as Feedback Tool for
Lecturers to Enhance Teaching and Learning
by: Deshinta, Arrova Dewi, et al.
Published: (2012)
by: Deshinta, Arrova Dewi, et al.
Published: (2012)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Planning Application with Voice Recognition to Assist Procrastinators in Managing Time
by: Kayalvily, Tabianan, et al.
Published: (2018)
by: Kayalvily, Tabianan, et al.
Published: (2018)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Sentiment Analytics for Monitoring and Analyzing Fan Page Posts
by: Harprith Kaur*, Randhawa, et al.
Published: (2020)
by: Harprith Kaur*, Randhawa, et al.
Published: (2020)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Integrated Car Park System for Smart Parking Solution
by: Harprith Kaur, Randhawa, et al.
Published: (2019)
by: Harprith Kaur, Randhawa, et al.
Published: (2019)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Security mechanisms and data access protocols in innovative wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
Simplified link reliability enhancement schemes for wireless networks
by: Boon, Hoi Lim, et al.
Published: (2009)
by: Boon, Hoi Lim, et al.
Published: (2009)
Monitoring Social Distancing Compliance Using Image Processing Algorithm
by: Lai, Yi Lun, et al.
Published: (2022)
by: Lai, Yi Lun, et al.
Published: (2022)
Mobile-Based Digital Car Plate Number for Future Automotive Industry
by: Malathy, Batumalay, et al.
Published: (2019)
by: Malathy, Batumalay, et al.
Published: (2019)
A computational system approach to develop student's based emotion system: An alternative feedback tool for lecturers to enhance teaching and learning
by: Dewi, Deshinta Arrova, et al.
Published: (2011)
by: Dewi, Deshinta Arrova, et al.
Published: (2011)
Security performance analysis in wireless LANs
by: Nurul Anis Anati, Saripudin
Published: (2018)
by: Nurul Anis Anati, Saripudin
Published: (2018)
QR-code based E-wallet System using Android platform
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Uncovering Relationship between Sleep Disorder and Lifestyle using Predictive Analytics
by: Ying, Sham Fang, et al.
Published: (2022)
by: Ying, Sham Fang, et al.
Published: (2022)
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
by: Khalaf, Osamah Ibrahem
Published: (2017)
by: Khalaf, Osamah Ibrahem
Published: (2017)
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks
by: Guerroumi, Mohamed, et al.
Published: (2013)
by: Guerroumi, Mohamed, et al.
Published: (2013)
Algorithm for enhancing the QoS of video traffic over wireless mesh networks
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
An enhanced group mobility management method in wireless body area networks
by: Mohamed Abdullah, Radhwan, et al.
Published: (2019)
by: Mohamed Abdullah, Radhwan, et al.
Published: (2019)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Multidimensional indicator for data quality assessment in wireless sensor networks: challenges and opportunities
by: Nurul Aqilah, Zamri, et al.
Published: (2024)
by: Nurul Aqilah, Zamri, et al.
Published: (2024)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Enhanced Network Connectivity And Node Lifetime Techniques In Wireless Sensor Networks
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
An enhanced energy efficient routing protocol in wireless sensor networks / Jacky Even Junis
by: Jacky Even , Junis
Published: (2019)
by: Jacky Even , Junis
Published: (2019)
Energy Efficient Technique for Cluster Head Selection and Data gathering in Wireless Sensor Network
by: Asfandyar, khan, et al.
Published: (2008)
by: Asfandyar, khan, et al.
Published: (2008)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Similar Items
-
A PROTOTYPE OF STORM WATER CHANNEL IOT (SWCI) TO PREVENT FLOOD DAMAGE IN MALAYSIA
by: Deshinta, Arrova Dewi, et al.
Published: (2018) -
Study on Security Testing-as-a-Service (TaaS) in Cloud Environment
by: Ponkoodalingan, Kannan, et al.
Published: (2018) -
The Air and Sound Pollution Monitoring System using Internet of Things and Cloud Based Data Analysis
by: Deshinta, Arrova Dewi, et al.
Published: (2018) -
A Review of Data Analytics Adoption in Business Industry
by: Chong, Fong Kim, et al.
Published: (2019) -
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)