Camouflage cursor anti-shoulder surfing technique
| Main Author: | Teng, Sin Liang |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/1835/ http://eprints.utar.edu.my/1835/1/CN%2D2015%2D1200642%2D1.pdf |
Similar Items
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
Accelerating FPGA-surf feature detection module by memory access reduction
by: Mohd. Yamani Idna, Idris, et al.
Published: (2019)
by: Mohd. Yamani Idna, Idris, et al.
Published: (2019)
The Camouflage That Grapples Our Perception
by: Luqman Hakim, Ahmad Shah
Published: (2021)
by: Luqman Hakim, Ahmad Shah
Published: (2021)
Comparative study for cursor detection at endoscopic images for telepointer
by: Rohana, Abdul Karim, et al.
Published: (2022)
by: Rohana, Abdul Karim, et al.
Published: (2022)
Anti-jamming capabilities of UWB-OFDM SAR
by: Hossain, Md Anowar, et al.
Published: (2011)
by: Hossain, Md Anowar, et al.
Published: (2011)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)
by: Rassem, Taha H., et al.
Published: (2018)
Automotive anti-theft system using fuzzy logic method
by: Kahtan, Hasan, et al.
Published: (2017)
by: Kahtan, Hasan, et al.
Published: (2017)
Computer aided preoperative planning application for shoulder hemiarthroplasty
by: Lee, Thian Seng, et al.
Published: (2009)
by: Lee, Thian Seng, et al.
Published: (2009)
Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking
by: Kahtan, Hasan, et al.
Published: (2018)
by: Kahtan, Hasan, et al.
Published: (2018)
The practice and poetics of fieldwork: Hugh Cott and the study of camouflage
by: Forsyth, Isla
Published: (2014)
by: Forsyth, Isla
Published: (2014)
Visual tracking: detecting and mapping occlusion and camouflage using process-behaviour charts
by: Chandesa, Tissa
Published: (2013)
by: Chandesa, Tissa
Published: (2013)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Estimation of Glance from EEG using cursor control
by: Tan, Tele, et al.
Published: (2013)
by: Tan, Tele, et al.
Published: (2013)
Risk mitigation techniques in agile development processes
by: Rafeek, Muhammad Akil, et al.
Published: (2019)
by: Rafeek, Muhammad Akil, et al.
Published: (2019)
Security of NFC payment on mobile payment application
by: Wong, Wen Teng
Published: (2018)
by: Wong, Wen Teng
Published: (2018)
The efficiency of hidden naïve bayes technique compared with data mining techniques in early diagnosis of diabetes and prediction system
by: Bassam Abdo, Al-Hameli, et al.
Published: (2020)
by: Bassam Abdo, Al-Hameli, et al.
Published: (2020)
Text segmentation techniques: A critical review
by: Pak, Irina *, et al.
Published: (2017)
by: Pak, Irina *, et al.
Published: (2017)
Multiple watermarking technique using optimal threshold
by: Noruhida, Alias, et al.
Published: (2020)
by: Noruhida, Alias, et al.
Published: (2020)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Spatial information-based multimodal integration technique
by: Lee, Bee Wah
Published: (2006)
by: Lee, Bee Wah
Published: (2006)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Event organizer application
by: Tai, Yik Teng
Published: (2018)
by: Tai, Yik Teng
Published: (2018)
Computer Aided Instructions (CAI) Mathematics Using Learner Centered Approach
by: Teng, Sze Le
Published: (2017)
by: Teng, Sze Le
Published: (2017)
A simplified computational technique for an LSF-based speed decoder
by: Mabrouk, Ahmed Abbas, et al.
Published: (2011)
by: Mabrouk, Ahmed Abbas, et al.
Published: (2011)
The use of genetic algorithm in improving medical image segmentation techniques
by: Hassan, Raini, et al.
Published: (2011)
by: Hassan, Raini, et al.
Published: (2011)
Talk and surf more for less
Published: (2008)
Published: (2008)
Comparative analysis between FPA and COCOMO techniques for software cost estimation
by: Ali Moftah, Abu Baker
Published: (2014)
by: Ali Moftah, Abu Baker
Published: (2014)
Anti-theft security system using face recognition
by: Chong, Guang Yu
Published: (2018)
by: Chong, Guang Yu
Published: (2018)
A Literature Review on Gold Price Predictive Techniques
by: Nurul Asyikin, Zainal, et al.
Published: (2015)
by: Nurul Asyikin, Zainal, et al.
Published: (2015)
A Preliminary Study of Adaptive Random Testing Techniques
by: Roslina, Mohd Sidek, et al.
Published: (2015)
by: Roslina, Mohd Sidek, et al.
Published: (2015)
Customer intent prediction using sentiment analysis techniques
by: Lye, Say Hong *, et al.
Published: (2021)
by: Lye, Say Hong *, et al.
Published: (2021)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Similar Items
-
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012) -
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018) -
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016) -
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017) -
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)