Tailgating/Piggybacking detection security system
| Main Author: | Chan, Tjun Wern |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/933/ http://eprints.utar.edu.my/933/1/Tailgating_Piggybacking_Detection_Security_System_10AGM07483_ChanTjunWern.pdf |
Similar Items
Transmission Power Adaption Technique for VANET by Using Piggyback Information
by: Nurul Shafiqa, Ahmad Zabidi, et al.
Published: (2015)
by: Nurul Shafiqa, Ahmad Zabidi, et al.
Published: (2015)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
A secure quantum telephone system
by: Said, Ressa Suhardiman, et al.
Published: (2009)
by: Said, Ressa Suhardiman, et al.
Published: (2009)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Secure E - Medical record system
by: Law, Jennifer
Published: (2005)
by: Law, Jennifer
Published: (2005)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
BITS 3423-Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Visual Inspection System To Detect
Connector Tilts In Pcbas
by: Retnasamy, Vithyacharan
Published: (2005)
by: Retnasamy, Vithyacharan
Published: (2005)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
A Secured Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Action detection system for alerting driver using computer vision
by: Khoo, Chia Hong
Published: (2020)
by: Khoo, Chia Hong
Published: (2020)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Virtual physical therapist application with human pose detection
by: Chan, Jia Yi
Published: (2022)
by: Chan, Jia Yi
Published: (2022)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Intrusion detection security system with IOT sensors
by: Chean, Vernon Lynn Chii
Published: (2021)
by: Chean, Vernon Lynn Chii
Published: (2021)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
by: Liew, Siau-Chuin, et al.
Published: (2015)
by: Liew, Siau-Chuin, et al.
Published: (2015)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Embedded processor security
by: d'Auriol, Brian J., et al.
Published: (2007)
by: d'Auriol, Brian J., et al.
Published: (2007)
Propose a new Firefly-Fast Learning Network model based Intrusion-Detection System
by: Mohammed Falih, Badran, et al.
Published: (2019)
by: Mohammed Falih, Badran, et al.
Published: (2019)
Detection of temperature using fiber bragg grating system
by: Ahmed Tahir, Bashir, et al.
Published: (2006)
by: Ahmed Tahir, Bashir, et al.
Published: (2006)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Detection of pathogenic bacteria in pigeon faecal samples
by: Chan, Wen Jun
Published: (2023)
by: Chan, Wen Jun
Published: (2023)
Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication
by: Senan, Shayma, et al.
Published: (2015)
by: Senan, Shayma, et al.
Published: (2015)
Blockchain technology can improve food supply chain security
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020)
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020)
Violent scene detection in videos
by: Yew, Kynn Man
Published: (2019)
by: Yew, Kynn Man
Published: (2019)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
A New Router Certification Authority
Protocol For Securing Mobile Internet
Protocol Version 6
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Tumor detection in medical imaging: a survey
by: Mohd. Azhari, Ed-Edily, et al.
Published: (2014)
by: Mohd. Azhari, Ed-Edily, et al.
Published: (2014)
Detection of heavy metals in sediment and biological samples
by: Sa'ari, Anies Aznida, et al.
Published: (2011)
by: Sa'ari, Anies Aznida, et al.
Published: (2011)
Isolation and detection of Burkholderia species in Soil Sample
by: Pangau, Lua Viana
Published: (2015)
by: Pangau, Lua Viana
Published: (2015)
Ethernet Based Optical Tomography System
by: Abdul Rahim, Ruzairi, et al.
Published: (2005)
by: Abdul Rahim, Ruzairi, et al.
Published: (2005)
Driver Drowsiness Detection System
by: Ranjitha, M.M., et al.
Published: (2024)
by: Ranjitha, M.M., et al.
Published: (2024)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Similar Items
-
Transmission Power Adaption Technique for VANET by Using Piggyback Information
by: Nurul Shafiqa, Ahmad Zabidi, et al.
Published: (2015) -
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010) -
A secure quantum telephone system
by: Said, Ressa Suhardiman, et al.
Published: (2009) -
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006) -
Secure E - Medical record system
by: Law, Jennifer
Published: (2005)