PiWall as a home traffic controller: enabling parental control and monitoring
The movement control order (MCO) has led to a surge in internet usage among children, becoming the new normal. Most countries heavily rely on online platforms for education, granting children more freedom to explore the internet using electronic devices. Yet, it is challenging for parents to monitor...
| Main Authors: | Abd Razak, Nurul Imanina, Kamarudin, Shafinah, M. Shuhud, Mohd Ilias, Mahamad Zakaria, Muhammad Luqman, Mohd, Siti Munirah, Abdul Wahab, Amelia Natasya |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Institute of Advanced Engineering and Science
2024
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/114373/ http://psasir.upm.edu.my/id/eprint/114373/1/114373.pdf |
Similar Items
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Towards developing a web application with text filtering for FTMSK : A case study for electronic exchange board / Sumardi Shukor
by: Shukor, Sumardi
Published: (2006)
by: Shukor, Sumardi
Published: (2006)
Development of web based tutorial system using fuzzy expert / Suzierawati Said
by: Said, Suzierawati
Published: (2006)
by: Said, Suzierawati
Published: (2006)
A development of E-Learning website for driving
school / Hariyani Wadzir
by: Wadzir, Hariyani
Published: (2006)
by: Wadzir, Hariyani
Published: (2006)
Web-based medicine inventory using decision support system (DDS) approach / Junaini Harshah
by: Harshah, Junaini
Published: (2005)
by: Harshah, Junaini
Published: (2005)
The development and implementation of web content adaptation and negotiation based on user, device and network profiles / Harizah Sazali
by: Sazali, Harizah
Published: (2006)
by: Sazali, Harizah
Published: (2006)
E-Tazkirah Video Streaming Web Portal: a prototype / Sabrina Ahamat
by: Ahamat, Sabrina
Published: (2006)
by: Ahamat, Sabrina
Published: (2006)
A prototype of mobile info system portal web-based system / Rashidah Abd Aziz
by: Abd Aziz, Rashidah
Published: (2005)
by: Abd Aziz, Rashidah
Published: (2005)
A study of myFTMSK web portal visitor behavior using visitor tacking system / Mohd Rosli Ab Sukor
by: Ab Sukor, Mohd Rosli
Published: (2005)
by: Ab Sukor, Mohd Rosli
Published: (2005)
Content management systems : an introduction / Mohamad Noorman Masrek
by: Masrek, Mohamad Noorman
Published: (2005)
by: Masrek, Mohamad Noorman
Published: (2005)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Web Agent Event Finder (WAEF) / Masita Mohamed Shah
by: Mohamed Shah, Masita
Published: (2006)
by: Mohamed Shah, Masita
Published: (2006)
Ciri muka hadapan laman web e-komuniti di malaysia
by: Mat Salleh, Suzila
Published: (2008)
by: Mat Salleh, Suzila
Published: (2008)
A model for assessing personal blog quality
by: Muhammad Zain, Zuhaira
Published: (2012)
by: Muhammad Zain, Zuhaira
Published: (2012)
A Prototype of Web-Based Simulation Environment (WEBSIM)
by: Tan, Kee Leong
Published: (2000)
by: Tan, Kee Leong
Published: (2000)
Evaluating local first page university site using 'U' tool
by: Abd Aziz, Zalilah
Published: (2003)
by: Abd Aziz, Zalilah
Published: (2003)
Garis panduan reka bentuk untuk meningkatkan kebolehgunaan tapak web
by: Abdullah, Muhammad Ihsan Lim
Published: (2001)
by: Abdullah, Muhammad Ihsan Lim
Published: (2001)
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
IDC : VoIP players must adapt to challenges
Published: (2008)
Published: (2008)
Internet visionaries betting on green tech
Published: (2008)
Published: (2008)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
D’Bridal Boutique website and online customer reservation system / Aziatul Azna Mohd Isa
by: Mohd Isa, Aziatul Azna
Published: (2012)
by: Mohd Isa, Aziatul Azna
Published: (2012)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Maintainability Evaluation for Web Applications
by: Zaini, Zaida
Published: (2006)
by: Zaini, Zaida
Published: (2006)
Perceived usefulness and ease of use of websites : evidence of the impact of website design features / Dennis Taylor and Nicky Brownfield
by: Dennis, Taylor, et al.
Published: (2002)
by: Dennis, Taylor, et al.
Published: (2002)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Design and implementation of a web-based replacement for the manual system of moderating exams
by: Oladokun, Adeola Asiat
Published: (2014)
by: Oladokun, Adeola Asiat
Published: (2014)
Google targets Excel
Published: (2008)
Published: (2008)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
by: Hasheminejad, Hamidreza
Published: (2015)
by: Hasheminejad, Hamidreza
Published: (2015)
Tourism's destination dominance and marketing website usefulness
by: Woodside, Arch, et al.
Published: (2011)
by: Woodside, Arch, et al.
Published: (2011)
Laman sesawang UTM terbaik
by: Berita Harian , Sabri Ahmad
Published: (2012)
by: Berita Harian , Sabri Ahmad
Published: (2012)
Development of a Web Access Control Technique Based User Access Behavior
by: Abdelrahman, Selmaelsheikh
Published: (2004)
by: Abdelrahman, Selmaelsheikh
Published: (2004)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
and Yahoo! Messenger get updated
Published: (2008)
Published: (2008)
Google looking for adWords, AdSense resellers
Published: (2008)
Published: (2008)
Similar Items
-
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015) -
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024) -
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005) -
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022) -
Towards developing a web application with text filtering for FTMSK : A case study for electronic exchange board / Sumardi Shukor
by: Shukor, Sumardi
Published: (2006)