An Action Arcade Web Based Game-Slime Attack Plus (Slime Invader)
| Main Author: | Ong, Hui Huang |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/2659/ http://eprints.utar.edu.my/2659/1/CS%2D2017%2D1204824%2D1.pdf |
Similar Items
An Action Arcade Web-Based Game – Slime Attack Plus (Stack-O-Slime)
by: Chan, Hoong Wai
Published: (2017)
by: Chan, Hoong Wai
Published: (2017)
An Action Arcade Web Based Game –Slime Attack Plus (Backend Integration)
by: Cheah, Kean Huang
Published: (2017)
by: Cheah, Kean Huang
Published: (2017)
Hagfish predatory behaviour and slime defence mechanism
by: Zintzen, V., et al.
Published: (2011)
by: Zintzen, V., et al.
Published: (2011)
Levy slime mould algorithm for solving numerical and engineering optimization problems
by: J. J., Jui, et al.
Published: (2022)
by: J. J., Jui, et al.
Published: (2022)
Parameter identification of thermoelectric modules using enhanced slime mould algorithm (ESMA)
by: Ponnalagu, Dharswini, et al.
Published: (2024)
by: Ponnalagu, Dharswini, et al.
Published: (2024)
Identifying and estimating solar cell parameters using an enhanced slime mould algorithm
by: Logeswaary, Devarajah, et al.
Published: (2024)
by: Logeswaary, Devarajah, et al.
Published: (2024)
Fabrication and characterization of
polyvinyl acetate slime phantom for
magnetic resonance spectroscopy
by: Baharudin, Siti Sarah
Published: (2020)
by: Baharudin, Siti Sarah
Published: (2020)
A study of human computer interaction in arcade game design
by: Chin, Kah Yean
Published: (2014)
by: Chin, Kah Yean
Published: (2014)
Fabrication and characterization of polyvintl acetate slime phantom for T1-weighted, T2-weighted, and diffusion tensor magnetic resonance imaging
by: Chaw, Nurbranda
Published: (2020)
by: Chaw, Nurbranda
Published: (2020)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Evolution strategies for evolving artificial neural networks in an arcade game
by: Tse, Guan Tan, et al.
Published: (2010)
by: Tse, Guan Tan, et al.
Published: (2010)
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
by: Shamsuddin, Nurul Afiqah
Published: (2014)
by: Shamsuddin, Nurul Afiqah
Published: (2014)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Azimuthal solar synchronization and aerodynamic neuro-optimization: an empirical study on slime-mold-inspired neural networks for solar UAV range optimization
by: Graheeth, Hazare, et al.
Published: (2024)
by: Graheeth, Hazare, et al.
Published: (2024)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Web-Based Company Enquiry System / Ong Yook Hong
by: Ong, Yook Hong
Published: (2004)
by: Ong, Yook Hong
Published: (2004)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017)
by: Zakira, Inayat
Published: (2017)
Web-Based Directory of Libraries and Information Centers in Malaysia / Law Hui Sheng
by: Law, Hui Sheng
Published: (2005)
by: Law, Hui Sheng
Published: (2005)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
Web-based AHP system
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Kamus Bahasa Arab Plus! untuk kanak-kanak / Siti Khadijah Rosdan
by: Siti Khadijah, Rosdan
Published: (2002)
by: Siti Khadijah, Rosdan
Published: (2002)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010)
by: Abdul-Latip, S. F., et al.
Published: (2010)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
It’s no game
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
Similar Items
-
An Action Arcade Web-Based Game – Slime Attack Plus (Stack-O-Slime)
by: Chan, Hoong Wai
Published: (2017) -
An Action Arcade Web Based Game –Slime Attack Plus (Backend Integration)
by: Cheah, Kean Huang
Published: (2017) -
Hagfish predatory behaviour and slime defence mechanism
by: Zintzen, V., et al.
Published: (2011) -
Levy slime mould algorithm for solving numerical and engineering optimization problems
by: J. J., Jui, et al.
Published: (2022) -
Parameter identification of thermoelectric modules using enhanced slime mould algorithm (ESMA)
by: Ponnalagu, Dharswini, et al.
Published: (2024)