Security alert through path analysis
| Main Author: | Lo, Kelvin, Yir Siang |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/1079/ http://eprints.utar.edu.my/1079/1/CSA%2D2013%2D1007395%2D1.pdf |
Similar Items
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015)
by: Norhidayah, Masstor
Published: (2015)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Student academic alert system / Lee Foo Yee
by: Lee , Foo Yee
Published: (2003)
by: Lee , Foo Yee
Published: (2003)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Study and Implementation of Internet of Things (IoT) Based Vehicle Safety
Alert and Tracking System
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011)
by: el-Taj, Homam Reda Kamel
Published: (2011)
Modeling and querying alternative paths in Kuantan
by: Mohamad Salleh, Mazlina
Published: (2007)
by: Mohamad Salleh, Mazlina
Published: (2007)
The Requirement Analysis of An Offline Automated Invigilation System with Gmail Alert Integration
by: A., Eenaja, et al.
Published: (2025)
by: A., Eenaja, et al.
Published: (2025)
Optimal path planning algorithms in virtual environments
by: Hassan, Rohayanti
Published: (2006)
by: Hassan, Rohayanti
Published: (2006)
Security performance analysis in wireless LANs
by: Nurul Anis Anati, Saripudin
Published: (2018)
by: Nurul Anis Anati, Saripudin
Published: (2018)
Availability Analysis Of Shared Backup Path Protection Under Multiple-Link Failure Scenario In WDM Networks
by: Mohamed Mostafa, A. Azim, et al.
Published: (2015)
by: Mohamed Mostafa, A. Azim, et al.
Published: (2015)
Learning management system through assignment box alert
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
An efficient virtual tour : a merging of path planning and optimization
by: Abd Latiff, Muhammad Shafie, et al.
Published: (2004)
by: Abd Latiff, Muhammad Shafie, et al.
Published: (2004)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
Geofence alerts application with gps tracking for children monitoring
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
by: Nurul Hani , Nortaja
Published: (2004)
by: Nurul Hani , Nortaja
Published: (2004)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Intellectual property in education sector : analysis of copyright security issues and challenges
by: Abdul Jabar, Dzulnizar
Published: (2007)
by: Abdul Jabar, Dzulnizar
Published: (2007)
Improvements Over Two Phase Shortest Path Algorithm
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Paraphrase Detection using Semantic Relatedness based on Synset Shortest Path in WordNet
by: Lee, Jun Choi, et al.
Published: (2016)
by: Lee, Jun Choi, et al.
Published: (2016)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Security of present s-box
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
by: Zahari, Ammar, et al.
Published: (2015)
by: Zahari, Ammar, et al.
Published: (2015)
Optimal path planning for urban vehicles using
Internet of Things: a new navigation perspective
by: Alawadhi, Nayef, et al.
Published: (2019)
by: Alawadhi, Nayef, et al.
Published: (2019)
Intelligent responsive indoor system (Iris): A potential shoplifter security alert system
by: Mohd Zahari, Mohamad Kuzahier, et al.
Published: (2017)
by: Mohd Zahari, Mohamad Kuzahier, et al.
Published: (2017)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Similar Items
-
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013) -
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015) -
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008) -
Student academic alert system / Lee Foo Yee
by: Lee , Foo Yee
Published: (2003) -
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)