Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
The Onion Router (Tor) service is one of the ways to surf out over the internet without being worried too much about the internet data theft and privacy of the information inside data packet. This service uses an Onion Routing technique to serve the encryption and anonymity for data packet that need...
| Main Author: | Rosli, Mohamad AfiqHakimi |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/26068/ |
Similar Items
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
SafeSearch – Microcomputer based VPN / Mohamad Ridzuan Mohd Alias
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Tahfiz AI-Muqarrabin school website /Aisyah Fathiah Othman
by: Othman, Aisyah Fathiah
Published: (2012)
by: Othman, Aisyah Fathiah
Published: (2012)
Predicting online safety behavior based on health belief model with internet literacy and gender as moderators
by: Abkooh, Elaheh Taheri
Published: (2016)
by: Abkooh, Elaheh Taheri
Published: (2016)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
The validation and application of a new learning environment instrument to evaluate online learning in higher education
by: Chang, Vanessa, et al.
Published: (2001)
by: Chang, Vanessa, et al.
Published: (2001)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
by: Pitchan, Muhammad Adnan
Published: (2017)
by: Pitchan, Muhammad Adnan
Published: (2017)
Intrusion notification via SMS / Aziz Kasmir Mat Yunos
by: Mat Yunos, Aziz Kasmir
Published: (2006)
by: Mat Yunos, Aziz Kasmir
Published: (2006)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
A qualitative study of Internet use comparing the experiences of people with physical disabilities and early onset dementia
by: Young, Alexandra L.
Published: (2020)
by: Young, Alexandra L.
Published: (2020)
A study of interference between bluetooth and 802.11b (WIFI) / Mazani Manaf, Md Jamil Abu Sari and Jamaludin Md Yusof
by: Manaf, Mazani, et al.
Published: (2005)
by: Manaf, Mazani, et al.
Published: (2005)
A security transmission and storage solution about sensing image for blockchain in the internet of things
by: Li, Yunfa, et al.
Published: (2020)
by: Li, Yunfa, et al.
Published: (2020)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Chronic disease, geographic location and socioeconomic disadvantage as obstacles to equitable access to e-health
by: Han, J., et al.
Published: (2010)
by: Han, J., et al.
Published: (2010)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
'You get the quickest and the cheapest stuff you can': Food security issues among low-income earners living with diabetes
by: Cuesta-Briand, Briand, et al.
Published: (2011)
by: Cuesta-Briand, Briand, et al.
Published: (2011)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Web-based learning environments for the vision impaired
by: Permvattana, Ruchi, et al.
Published: (2010)
by: Permvattana, Ruchi, et al.
Published: (2010)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Open access books: an international collaboration to explore the practical implications for librarians of increasing access to scholarly research outputs
by: Zhou, Elsie, et al.
Published: (2018)
by: Zhou, Elsie, et al.
Published: (2018)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Open access to scholarly communications: advantages, policy and advocacy
by: FURNIVAL, Ariadne Chloe
Published: (2010)
by: FURNIVAL, Ariadne Chloe
Published: (2010)
DRIVER: Building the Network for Accessing Digital Repositories across Europe
by: Feijen, Martin, et al.
Published: (2007)
by: Feijen, Martin, et al.
Published: (2007)
Public resource or private sanctuary?: access patterns and narratives from the woodland of North East Derbyshire
by: Lisewski-Hobson, Vivyan
Published: (2019)
by: Lisewski-Hobson, Vivyan
Published: (2019)
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
by: Rusli, Julie Roslita
Published: (2011)
by: Rusli, Julie Roslita
Published: (2011)
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
by: Mat Isa, Masnita
Published: (2012)
by: Mat Isa, Masnita
Published: (2012)
Similar Items
-
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010) -
SafeSearch – Microcomputer based VPN / Mohamad Ridzuan Mohd Alias
by: Mohd Alias, Mohamad Ridzuan
Published: (2020) -
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022) -
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012) -
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)