An evaluation of security features for preventing illegal distribution of digital content using quantitative methods
In the current digital landscape, safeguarding digital content from unauthorized sharing is of paramount importance. This study concerns three key issues: the prevalent unauthorized sharing of content, user dissatisfaction with existing security measures, and the lack of alignment between expert opi...
| Main Authors: | Muhammad Isma Farhan, Mohd Raza, Mazlina, Abdul Majid, Ajra, Husnul, Islam, Md. Shohidul, Aziman, Abdullah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2025
|
| Subjects: | |
| Online Access: | https://umpir.ump.edu.my/id/eprint/45877/ |
Similar Items
IoT-enabled smart cities towards green energy systems: A review
by: Ajra, Husnul, et al.
Published: (2024)
by: Ajra, Husnul, et al.
Published: (2024)
Design and analysis of smart lighting system for room environments using simulation supporting diverse light bulbs
by: Ajra, Husnul, et al.
Published: (2025)
by: Ajra, Husnul, et al.
Published: (2025)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Leaf disease detection in plant care using CNN architecture: AlexNet and ResNet-50 models
by: Ajra, Husnul, et al.
Published: (2024)
by: Ajra, Husnul, et al.
Published: (2024)
IoT-driven sustainable green energy systems in an organization: Issues and challenges
by: Ajra, Husnul, et al.
Published: (2023)
by: Ajra, Husnul, et al.
Published: (2023)
A Framework of universities' smart campus to detect and mitigate vulnerabilities for IoT devices
by: Mazlina, Abdul Majid, et al.
Published: (2023)
by: Mazlina, Abdul Majid, et al.
Published: (2023)
Fingerprint authentication-based traffic offence control and enforcement system on smart mobile devices for smart city
by: Parameswaran, Kirtika A. P. S., et al.
Published: (2022)
by: Parameswaran, Kirtika A. P. S., et al.
Published: (2022)
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024)
by: Islam, Md. Shohidul, et al.
Published: (2024)
Parameter selection of the G-IoT-enabled model for a sustainable campus
by: Ajra, Husnul, et al.
Published: (2024)
by: Ajra, Husnul, et al.
Published: (2024)
Healthcare-Chain: Blockchain-Enabled Decentralized Trustworthy System in Healthcare Management Industry 4.0 with Cyber Safeguard
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Analysis of illegal drug transmission model using fractional delay differential equations
by: Komal, Bansal, et al.
Published: (2022)
by: Komal, Bansal, et al.
Published: (2022)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Comparing Simulation Output Accuracy of Discrete Event and Agent Based Models: A Quantitative Approach
by: Mazlina, Abdul Majid, et al.
Published: (2009)
by: Mazlina, Abdul Majid, et al.
Published: (2009)
The use of multi-sensor for illegal human settlement detection / Arnis Asmat, S. Z. Zamzami and S. Mansor
by: Zamzami, S. Z, et al.
Published: (2012)
by: Zamzami, S. Z, et al.
Published: (2012)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Security alert framework using dynamic tweet-based features for phishing detection on twitter
by: Liew, Seow Wooi
Published: (2019)
by: Liew, Seow Wooi
Published: (2019)
Recent Advances in Big Data: Features, Classification, Analytics, Research Challenges, and Future Trends
by: Mahmood, Khalid, et al.
Published: (2020)
by: Mahmood, Khalid, et al.
Published: (2020)
Feature selection for content-based image retrieval using statistical discriminant analysis
by: Tee, Cheng Siew
Published: (2008)
by: Tee, Cheng Siew
Published: (2008)
Color Feature Embedded for Content-based Image Retrieval System.
by: Sumari, Putra, et al.
by: Sumari, Putra, et al.
A Secure Personal Identification System: Techniques of Fingerprint Image Enhancement, Feature Extraction and Template Protection
by: Islam, Md. Rajibul
Published: (2010)
by: Islam, Md. Rajibul
Published: (2010)
Human security and governance: Indonesian illegal migrant workers in Malaysia
by: Rahimi Ahmad,, et al.
Published: (2024)
by: Rahimi Ahmad,, et al.
Published: (2024)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Public Reporting System for Assessing Public Awareness on Vector Borne Diseases by Digital Crowdsourcing
by: Leong, Chin Jian, et al.
Published: (2016)
by: Leong, Chin Jian, et al.
Published: (2016)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
Local DTW coefficients and pitch feature for back-propagation NN digits recognition
by: Sudirman, R., et al.
Published: (2006)
by: Sudirman, R., et al.
Published: (2006)
Prevention of illegal marriages: a maqasid al-Shari'ah perspective
by: Saidon, Rafeah, et al.
Published: (2015)
by: Saidon, Rafeah, et al.
Published: (2015)
Texture Features Selection for Masses Detection In Digital Mammogram
by: A. M., Khuzi, et al.
Published: (2008)
by: A. M., Khuzi, et al.
Published: (2008)
Security enhancement of dynamic signature by utilizing local features with individual threshold
by: Suryanti, Awang, et al.
Published: (2018)
by: Suryanti, Awang, et al.
Published: (2018)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Shape feature representation in similarity measurement for content-based image retrieval
by: Chiew, Kang Leng
Published: (2003)
by: Chiew, Kang Leng
Published: (2003)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Influence Of Media Collaboration
With Stakeholders In The Prevention Of Illegal Gold Mining
In Zamfara, Nigeria
by: Naziru, Alhaji Tukur
Published: (2022)
by: Naziru, Alhaji Tukur
Published: (2022)
E-commerce solution for electronic tendering system using secure electronic transaction / Mazlina Abdul Majid
by: Mazlina , Abdul Majid
Published: (2004)
by: Mazlina , Abdul Majid
Published: (2004)
Exploring the use of crowd generated geospatial content in improving the quality of ecological feature mapping
by: Kinley, Laura Rhiannon
Published: (2016)
by: Kinley, Laura Rhiannon
Published: (2016)
Similar Items
-
IoT-enabled smart cities towards green energy systems: A review
by: Ajra, Husnul, et al.
Published: (2024) -
Design and analysis of smart lighting system for room environments using simulation supporting diverse light bulbs
by: Ajra, Husnul, et al.
Published: (2025) -
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023) -
Leaf disease detection in plant care using CNN architecture: AlexNet and ResNet-50 models
by: Ajra, Husnul, et al.
Published: (2024) -
IoT-driven sustainable green energy systems in an organization: Issues and challenges
by: Ajra, Husnul, et al.
Published: (2023)