A Novel Approach on Teaching Network Security for ICT Courses
This paper discusses a curriculum approach that will give emphasis on practical sessions of teaching network security subjects in information and communication technology courses. As we are well aware, the need to use a practice and application oriented approach in education is paramount [1]. Resear...
| Main Authors: | Md Khambari, M. N., Othman, M. F. I., Motsidi, M. R., Abdollah, M. F. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/112/ http://eprints.utem.edu.my/id/eprint/112/1/PID1046531.pdf |
Similar Items
Improving IEEE 802.11 to Support Quality of Service in Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2007)
by: Md Khambari, M. N., et al.
Published: (2007)
Achieving Stable Throughput to Support QoS in IEEE 802.11 Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
DIFS Modifications to Support QoS in IEEE 802.11g DCF Ad-hoc Networks
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
Improving IEEE 802.11g Mac to Support Quality of Service for Multimedia Applications in Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Assessing Malacca wireless security implementation in government and private sector companies in – A case study
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Novel Direct and Self-Regulating Approaches to Determine Optimum Growing Multi-Experts Network Structure
by: Loo, C.K., et al.
Published: (2004)
by: Loo, C.K., et al.
Published: (2004)
Predictions of isolate and normal pentene of debutanizer catalytic reforming unit by using artificial neural network
by: S., Sulaiman, et al.
Published: (2008)
by: S., Sulaiman, et al.
Published: (2008)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
A novel map-matching algorithm to improve vehicle tracking system accuracy
by: A.M., Said, et al.
Published: (2007)
by: A.M., Said, et al.
Published: (2007)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Integrating security services into active network
by: Mandala, Satria
Published: (2005)
by: Mandala, Satria
Published: (2005)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
An efficient PKC-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Performance Enhancements in IEEE 802.11 DCF MANET through Variation of SIFS Values in Distance Vector Routing Environment
by: Md Khambari, M. N., et al.
Published: (2011)
by: Md Khambari, M. N., et al.
Published: (2011)
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
by: Shamsudin, Ahmad Faizul, et al.
Published: (2010)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2010)
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
by: Nur Fadhilah , Mohd Shari
Published: (2018)
by: Nur Fadhilah , Mohd Shari
Published: (2018)
Enhanced SEA-MAC: An efficient MAC protocol for wireless sensor networks for environmental monitoring applications
by: M.I., Shukur, et al.
Published: (2009)
by: M.I., Shukur, et al.
Published: (2009)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Similar Items
-
Improving IEEE 802.11 to Support Quality of Service in Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2007) -
Achieving Stable Throughput to Support QoS in IEEE 802.11 Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2009) -
DIFS Modifications to Support QoS in IEEE 802.11g DCF Ad-hoc Networks
by: Md Khambari, M. N., et al.
Published: (2009) -
Improving IEEE 802.11g Mac to Support Quality of Service for Multimedia Applications in Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2009) -
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)