The use of intrusion prevention system to increase computer security / Najib Limun
Network intrusion prevention systems provide an important proactive defense capability against security threats by detecting and blocking network attacks. This task can be highly complex and traditional firewall system are currently not capable of handling fast attack through the operating system. T...
| Main Author: | Limun, Najib |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Computer and Mathematical Sciences
2005
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/683/ |
Similar Items
Fire safety audit in library buildings / Mohd Najib Tomin
by: Tomin, Mohd Najib
Published: (2010)
by: Tomin, Mohd Najib
Published: (2010)
A study on computer viruses attacks and the way to cure them / Shukor Sanim Mohd Fauzi
by: Mohd Fauzi, Shukor Sanim
Published: (2003)
by: Mohd Fauzi, Shukor Sanim
Published: (2003)
Prototype Security Door Access System
by: Saharedan, Mohd Shahril
Published: (2005)
by: Saharedan, Mohd Shahril
Published: (2005)
Intrusion Alert Quality Framework For Security False Alert Reduction [TH9737. N162 2007 f rb].
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
A case study on the effect of Empty Fruit Bunch (EFB) and compost on oil palm plantation yield at Ladang LKPP Pulau Manis, Pahang / Nur Qurratuaini Mohd Najib
by: Mohd Najib, Nur Qurratuaini
Published: (2018)
by: Mohd Najib, Nur Qurratuaini
Published: (2018)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Prevention of crime in housing through environmental planning / Ida Noorjulianti Sugijanto
by: Sugijanto, Ida Noorjulianti
Published: (2004)
by: Sugijanto, Ida Noorjulianti
Published: (2004)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
The development of fire prevention basic learning application
by: Mohd Razali, Nur Syamimi, et al.
Published: (2020)
by: Mohd Razali, Nur Syamimi, et al.
Published: (2020)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018)
by: Al-Zarqawee, Aws Naser
Published: (2018)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Intrusion detection security system with IOT sensors
by: Chean, Vernon Lynn Chii
Published: (2021)
by: Chean, Vernon Lynn Chii
Published: (2021)
The effectiveness of safety and security at shopping malls / Mohd Haris Mustafar
by: Mustafar, Mohd Haris
Published: (2009)
by: Mustafar, Mohd Haris
Published: (2009)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Intrusion Response Systems: Foundations, Design, and Challenges
by: Zakira, Inayat, et al.
Published: (2016)
by: Zakira, Inayat, et al.
Published: (2016)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Controlling computers and electronics waste: toward solving environmental problems
by: Hameed, Shihab A.
Published: (2012)
by: Hameed, Shihab A.
Published: (2012)
Minimum separation between lightning protection system and non-integrated metallic structures
by: Fallah, Seyedeh Narjes
Published: (2014)
by: Fallah, Seyedeh Narjes
Published: (2014)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
by: Chan, Gaik Yee, et al.
Published: (2016)
by: Chan, Gaik Yee, et al.
Published: (2016)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Improving the Learning Experience of Power System Protection Students using Computer-based Simulations and Practical Experiments
by: Shahnia, Farhad, et al.
Published: (2014)
by: Shahnia, Farhad, et al.
Published: (2014)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
by: Leow, Yu Hong
Published: (2024)
by: Leow, Yu Hong
Published: (2024)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Similar Items
-
Fire safety audit in library buildings / Mohd Najib Tomin
by: Tomin, Mohd Najib
Published: (2010) -
A study on computer viruses attacks and the way to cure them / Shukor Sanim Mohd Fauzi
by: Mohd Fauzi, Shukor Sanim
Published: (2003) -
Prototype Security Door Access System
by: Saharedan, Mohd Shahril
Published: (2005) -
Intrusion Alert Quality Framework For Security False Alert Reduction [TH9737. N162 2007 f rb].
by: Abu Bakar, Najwa
Published: (2007) -
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)