Internet - Based Security and Monitoring System
This study describes a remote monitoring and security system based on the Internt. It is intended to investigate the possibilities of using the integration of the Internet and telephone lines in providing solution to security problems by conveying alarm signals from remote monitored locations. de...
| Main Author: | Suliman, Isameldin Mohammed |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
1998
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/10189/ http://psasir.upm.edu.my/id/eprint/10189/1/FK_1998_10_A.pdf |
Similar Items
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
by: Syed Nor Azlan, Syarifah Ezdiani
Published: (2006)
by: Syed Nor Azlan, Syarifah Ezdiani
Published: (2006)
Internet Addiction: An Exploratory Study on Malaysian Internet Users
by: Sinnappan, Sukunesan
Published: (1999)
by: Sinnappan, Sukunesan
Published: (1999)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Predicting online safety behavior based on health belief model with internet literacy and gender as moderators
by: Abkooh, Elaheh Taheri
Published: (2016)
by: Abkooh, Elaheh Taheri
Published: (2016)
A security transmission and storage solution about sensing image for blockchain in the internet of things
by: Li, Yunfa, et al.
Published: (2020)
by: Li, Yunfa, et al.
Published: (2020)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
Remote Control and Monitoring Via Internet on Distributed Data Acquisition
by: Mohd Hanapi, Zurina
Published: (2004)
by: Mohd Hanapi, Zurina
Published: (2004)
Water security and sustainable tourism as antecedents of local community’s quality of life in Mabul Island, Malaysia
by: Khairuddin, Fatin Nornajla
Published: (2019)
by: Khairuddin, Fatin Nornajla
Published: (2019)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
by: Pitchan, Muhammad Adnan
Published: (2017)
by: Pitchan, Muhammad Adnan
Published: (2017)
Development of an Internet–Based System to Measure Thermal Comfort in Indoor Environments
by: Sanbasivam, Sivasankar
Published: (2006)
by: Sanbasivam, Sivasankar
Published: (2006)
An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor
by: Ayad, Mustafa Abdsalam
Published: (2002)
by: Ayad, Mustafa Abdsalam
Published: (2002)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Faktor Berkaitan Dengan Penerimaan Guna Perbankan Internet Dalam Kalangan Kakitangan Universiti Tunku Abdul Rahman
by: Yong, Kun Hing
Published: (2009)
by: Yong, Kun Hing
Published: (2009)
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007)
by: Mohammed Alaidaros, Hashem
Published: (2007)
The experience of connectivity: results from a survey of Australian Internet users
by: Allen, Matthew
Published: (2010)
by: Allen, Matthew
Published: (2010)
Interent Usage among Female Undergraduates in Ferdowsi Univrsity, Iran
by: Joorabchi, Toktam Namayandeh
Published: (2009)
by: Joorabchi, Toktam Namayandeh
Published: (2009)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Keselamatan Internet
Published: (2008)
Published: (2008)
An Integrated Firewall System Model In A Multiclient-Server Environment
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Internet jargon simplified
Published: (2008)
Published: (2008)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
Avoiding the internet of insecure industrial things
by: Urquhart, Lachlan, et al.
Published: (2018)
by: Urquhart, Lachlan, et al.
Published: (2018)
Internet penyumbang bunuh diri
Published: (2008)
Published: (2008)
Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system
by: Hibshi, Hanan, et al.
Published: (2016)
by: Hibshi, Hanan, et al.
Published: (2016)
Utilization of the dynamic laser scanning technology for monitoring, locating and classification of the city trees.
by: Al-Hader, Mahmoud, et al.
Published: (2011)
by: Al-Hader, Mahmoud, et al.
Published: (2011)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Tahap ketagihan internet dan hubungannya dengan pencapaian serta aktiviti akademik, pengurusan masa dan harga diri dalam kalangan pelajar institusi pengajian tinggi
by: Wan Hamid, Wan Hamzari
Published: (2013)
by: Wan Hamid, Wan Hamzari
Published: (2013)
Pembangunan Koswer Fizik Gelombang Dalam Persekitaran Internet
by: Loh, Shin King
Published: (2002)
by: Loh, Shin King
Published: (2002)
Development Of An Internet Based Rating System For Ecotourism Sites
by: Shokouhi, Mohammad
Published: (2003)
by: Shokouhi, Mohammad
Published: (2003)
A beginner's guide to internet forums
Published: (2008)
Published: (2008)
Similar Items
-
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004) -
Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
by: Syed Nor Azlan, Syarifah Ezdiani
Published: (2006) -
Internet Addiction: An Exploratory Study on Malaysian Internet Users
by: Sinnappan, Sukunesan
Published: (1999) -
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)