Intellectual property in education sector : analysis of copyright security issues and challenges
| Main Author: | Abdul Jabar, Dzulnizar |
|---|---|
| Format: | Thesis |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3416/ |
Similar Items
Secure And Effective Image Authentication And Copyright Protection Using Integer Wavelet Transform
by: Ng, Ching Onn
Published: (2023)
by: Ng, Ching Onn
Published: (2023)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023)
by: Lim, Chen Gen
Published: (2023)
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
by: Wong, Shu Jie
Published: (2023)
by: Wong, Shu Jie
Published: (2023)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Security issues in 5G device to device communication
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
T-Way Testing Strategies: Issues, Challenges, and Practices
by: Kamal Z., Zamli, et al.
Published: (2014)
by: Kamal Z., Zamli, et al.
Published: (2014)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Routing protocol design for secure WSN: Review and open research issues
by: Md Zin, Shazana, et al.
Published: (2014)
by: Md Zin, Shazana, et al.
Published: (2014)
Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection
by: Ernawan, Ferda
Published: (2019)
by: Ernawan, Ferda
Published: (2019)
On the issues and challenges of Fiber-Wireless (Fi-Wi) networks
by: Win, Harry Tin, et al.
Published: (2013)
by: Win, Harry Tin, et al.
Published: (2013)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
by: Muhammad, Ayaz, et al.
Published: (2009)
by: Muhammad, Ayaz, et al.
Published: (2009)
Open source Content Management Systems (CMS): Issues and
challenges
by: Elgharabawy, Mohamed Ahmed, et al.
Published: (2011)
by: Elgharabawy, Mohamed Ahmed, et al.
Published: (2011)
Issues and Challenges of Video Dissemination in VANET and Routing Protocol: Review
by: Hammood, Omar A., et al.
Published: (2017)
by: Hammood, Omar A., et al.
Published: (2017)
Issues and challenges in the development of electronic health records in Malaysia and Vietnam
by: Nguyen, Quynh T., et al.
Published: (2008)
by: Nguyen, Quynh T., et al.
Published: (2008)
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
Energy Efficient Routing in Wireless Sensor Network : Research Issues and
Challenges
by: Noor , Zaman, et al.
Published: (2010)
by: Noor , Zaman, et al.
Published: (2010)
A New Reliable Optimized Image Watermarking Scheme Based on the Integer Wavelet Transform and Singular Value Decomposition for Copyright Protection
by: Makbol, N.M., et al.
Published: (2017)
by: Makbol, N.M., et al.
Published: (2017)
Exploring manet security aspects: analysis of attacks and node misbehaviour issues
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
Security performance analysis in wireless LANs
by: Nurul Anis Anati, Saripudin
Published: (2018)
by: Nurul Anis Anati, Saripudin
Published: (2018)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
Can an electronic textbooks be part of K-12 education?: Challenges, technological solutions and open issues
by: Lee, Jasmine Hee Jeong, et al.
Published: (2013)
by: Lee, Jasmine Hee Jeong, et al.
Published: (2013)
Processing skyline queries in incomplete database: issues,
challenges and future trends
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Issues and challenges in providing quality ICT infrastructure service delivery in a university campus environment
by: Mohd. Nor, Sulaiman
Published: (2008)
by: Mohd. Nor, Sulaiman
Published: (2008)
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2025)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2025)
Wood Plastic Composites (WPC)-Challenges in Prediction of Properties
by: Gupta, Ritu, et al.
Published: (2017)
by: Gupta, Ritu, et al.
Published: (2017)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
MANET – A cogitation of its design and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
A Big Data Model for Education Sector
by: Abdulla Fairuzullah, Ahmad Tajuddin, et al.
Published: (2017)
by: Abdulla Fairuzullah, Ahmad Tajuddin, et al.
Published: (2017)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Similar Items
-
Secure And Effective Image Authentication And Copyright Protection Using Integer Wavelet Transform
by: Ng, Ching Onn
Published: (2023) -
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012) -
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014) -
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011) -
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)