Assessing Malacca wireless security implementation in government and private sector companies in – A case study
Wireless local area networks (WLAN) have become a common technology in our everyday life. The use of WLAN can be seen among home users who use it to access the Internet and play games to business users who conduct daily business activities over the WLAN. The main objective of this...
| Main Authors: | Othman, Mohd Fairuz Iskandar, Bahaman, Nazrulazhar, Muslim, Z., Nahar, Haniza, Md Khambari, Mohd Najwan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/110/ http://eprints.utem.edu.my/id/eprint/110/1/Final_paper_SCORED2008.pdf |
Similar Items
DIFS modifications to support QoS in IEEE 802.11g DCF ad-hoc networks
by: Md Khambari, Mohd Najwan, et al.
Published: (2009)
by: Md Khambari, Mohd Najwan, et al.
Published: (2009)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
Congestive Loss in Wireless Ad hoc Network: Network Performance Analysis
by: Nahar, H., et al.
Published: (2011)
by: Nahar, H., et al.
Published: (2011)
Security performance analysis in wireless LANs
by: Nurul Anis Anati, Saripudin
Published: (2018)
by: Nurul Anis Anati, Saripudin
Published: (2018)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Wireless security assessment on the FTMSK2 building / Zainurzaman Mah Sangit @ Kasmat
by: Mah Sangit @ Kasmat, Zainurzaman
Published: (2007)
by: Mah Sangit @ Kasmat, Zainurzaman
Published: (2007)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
BITS 3423-Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Improving IEEE 802.11 to Support Quality of Service in Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2007)
by: Md Khambari, M. N., et al.
Published: (2007)
Secured wireless LAN using IPSec case study in Jabatan Agama Islam Selangor (JAIS) / Rozita Masiran
by: Masiran, Rozita
Published: (2006)
by: Masiran, Rozita
Published: (2006)
Achieving Stable Throughput to Support QoS in IEEE 802.11 Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
Intellectual property in education sector : analysis of copyright security issues and challenges
by: Abdul Jabar, Dzulnizar
Published: (2007)
by: Abdul Jabar, Dzulnizar
Published: (2007)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Improving IEEE 802.11g Mac to Support Quality of Service for Multimedia Applications in Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
by: Modares, Hero
Published: (2013)
by: Modares, Hero
Published: (2013)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
A Novel Approach on Teaching Network Security for ICT Courses
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
Secure open wireless LAN using point to point protocol
by: Guay, Wei Lin
Published: (2007)
by: Guay, Wei Lin
Published: (2007)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
An efficient PKC-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Energy-efficient secure routing in heavily deployed wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Wireless access point with location based awareness / Mohd Izuddin Ibrahim
by: Ibrahim, Mohd Izuddin
Published: (2007)
by: Ibrahim, Mohd Izuddin
Published: (2007)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
A secure and efficient way of node membership verification in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Security management in wireless sensor networks with a public key based scheme
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Similar Items
-
DIFS modifications to support QoS in IEEE 802.11g DCF ad-hoc networks
by: Md Khambari, Mohd Najwan, et al.
Published: (2009) -
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014) -
Congestive Loss in Wireless Ad hoc Network: Network Performance Analysis
by: Nahar, H., et al.
Published: (2011) -
Security performance analysis in wireless LANs
by: Nurul Anis Anati, Saripudin
Published: (2018) -
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)