WINPCAP : design and development of covert channel for secure communication
| Main Author: | Omar, Syaril Nizam |
|---|---|
| Format: | Thesis |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/7016/ |
Similar Items
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019)
by: Mohamed Azran , Aziz
Published: (2019)
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010)
by: Abdul-Latip, S. F., et al.
Published: (2010)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Security issues in 5G device to device communication
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
An efficient channel coding and short preamble design for mission critical machine-type communication over wireless networks / Najib Ahmed Mohammed Ahmed
by: Najib Ahmed , Mohammed Ahmed
Published: (2022)
by: Najib Ahmed , Mohammed Ahmed
Published: (2022)
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Design and development of a secured electronic fingerprint voting system
by: Foo, Hong Zee
Published: (2021)
by: Foo, Hong Zee
Published: (2021)
Covert channel: network steganography deployment
by: Md Ali, Nurul Majdi
Published: (2005)
by: Md Ali, Nurul Majdi
Published: (2005)
Network security architecture design for Malaysian maritime enforcement agency
by: Abdul Hamid, Mahathir
Published: (2007)
by: Abdul Hamid, Mahathir
Published: (2007)
Routing protocol design for secure WSN: Review and open research issues
by: Md Zin, Shazana, et al.
Published: (2014)
by: Md Zin, Shazana, et al.
Published: (2014)
Designing a logical security framework for enterprise service oriented architecture (ESOA)
by: Kalantari, Alaeddin
Published: (2009)
by: Kalantari, Alaeddin
Published: (2009)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
IoT Enabled Intra-Vehicular Communication for Designing A Smart Car
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Security of present s-box
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
A robust and effective fuzzy adaptive equalizer for powerline communication channels
by: WONG, W, et al.
Published: (2007)
by: WONG, W, et al.
Published: (2007)
Influence of Developing Professional Communication on the Success of Postgraduate Research Supervisory
by: Balsam, A. Mustafa
Published: (2015)
by: Balsam, A. Mustafa
Published: (2015)
CST334 – Network Monitoring & Security (Pengawasan & Keselamatan Rangkaian) CST338 – Network & Communication Security (Keselamatan Rangkaian & Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
by: Mr, Handrizal, et al.
Published: (2012)
by: Mr, Handrizal, et al.
Published: (2012)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Rivisit grid computing security
by: Ismail, Saiful Adli, et al.
Published: (2008)
by: Ismail, Saiful Adli, et al.
Published: (2008)
Autonomous reconnaissance mission: development of an algorithm for collaborative multi robot communication
by: Ahmed, Mohiuddin, et al.
Published: (2010)
by: Ahmed, Mohiuddin, et al.
Published: (2010)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Numerical construction of deformation field in converging channel
by: N A, Damanhuri, et al.
Published: (2021)
by: N A, Damanhuri, et al.
Published: (2021)
CST334 – Network Monitoring & Security
(Pengawasan & Keselamatan Rangkaian)
CST338 – Network And Communication Security
(Keselamatan Rangkaian Dan Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
The web: its utilisation, evaluation and security
Published: (2011)
Published: (2011)
Similar Items
-
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019) -
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010) -
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013) -
Security issues in 5G device to device communication
by: Khan, A.S., et al.
Published: (2017) -
An efficient channel coding and short preamble design for mission critical machine-type communication over wireless networks / Najib Ahmed Mohammed Ahmed
by: Najib Ahmed , Mohammed Ahmed
Published: (2022)