Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)
The purpose of this project is to study the available literature about the usage of CCTV systems as crime prevention tools and subsequently, make feasible analysis and findings for proposing a secure framework of system implementation. The field of the study covers the crime prevention technique whi...
| Main Author: | Achin, Hamidi |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9559/ http://eprints.utm.my/9559/5/HamidiAchinMFSKSM2008TOC.pdf |
Similar Items
Face recognition using faster R-CNN with inception-V2 architecture for CCTV camera
by: Halawa, Lavin J., et al.
Published: (2019)
by: Halawa, Lavin J., et al.
Published: (2019)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
The Implementation of Framework for Edutainment: Educational Games Customization Tool
by: Che Embi, Zarina
Published: (2008)
by: Che Embi, Zarina
Published: (2008)
Disability in television crime drama: Transgression and access
by: Ellis, Katie
Published: (2015)
by: Ellis, Katie
Published: (2015)
Close circuit television camera applications in Abu Dhabi United Arab Emirates: surveillance system effectiveness assessment
by: Salem Al Neyadi, Ali Hamad
Published: (2021)
by: Salem Al Neyadi, Ali Hamad
Published: (2021)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
Real time monitoring of surveillance CCTV
by: Nadhirah, Ali
Published: (2010)
by: Nadhirah, Ali
Published: (2010)
UNIMAS to install more CCTV cameras
by: The Borneo, Post
Published: (2015)
by: The Borneo, Post
Published: (2015)
Bangunan Pentadbiran UPM dilengkapi CCTV
by: Universiti Putra Malaysia, .
Published: (2006)
by: Universiti Putra Malaysia, .
Published: (2006)
Implementation and self-checking of different adder circuits
by: Hassan, Hasliza
Published: (2020)
by: Hassan, Hasliza
Published: (2020)
A social network of crime : A review of the use of social networks for crime and the detection of crime
by: Drury, Brett, et al.
Published: (2022)
by: Drury, Brett, et al.
Published: (2022)
Edge assisted crime prediction and evaluation framework for machine learning algorithms
by: Adhikary, Apurba, et al.
Published: (2022)
by: Adhikary, Apurba, et al.
Published: (2022)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
UTM hasilkan CCTV imej 3D
Published: (2010)
Published: (2010)
Internet financial crime security prevention and criminal law regulation optimization path
by: Xinxin, Mao, et al.
Published: (2023)
by: Xinxin, Mao, et al.
Published: (2023)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al.
by: Yasir Abdelgadir , Mohamed, et al.
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
The effectiveness of CCTV implementation by municipal council for public safety / Mohd Noor Adam Mohd Nordin
by: Mohd Nordin, Mohd Noor Adam
Published: (2008)
by: Mohd Nordin, Mohd Noor Adam
Published: (2008)
Circuit description and circuit simulation using C++ / Rozita Othman
by: Rozita , Othman
Published: (2005)
by: Rozita , Othman
Published: (2005)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Automatic Identification Of Close Languages: Case Of Malay And Indonesian.
by: Ranaivo, Bali, et al.
Published: (2002)
by: Ranaivo, Bali, et al.
Published: (2002)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
An evaluation of security features for preventing illegal distribution of digital content using quantitative methods
by: Muhammad Isma Farhan, Mohd Raza, et al.
Published: (2025)
by: Muhammad Isma Farhan, Mohd Raza, et al.
Published: (2025)
Design and hardware implementation of conditioning circuit for accurate reading from transducers with nonlinear responses
by: Hasan, Khairul, et al.
Published: (2011)
by: Hasan, Khairul, et al.
Published: (2011)
PESAT application Personal Security Administrator Tool / Law Yong Jin
by: Law , Yong Jin
Published: (2004)
by: Law , Yong Jin
Published: (2004)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Implementation of a MIS tool based on open XML
by: Baniani, Behdad
Published: (2009)
by: Baniani, Behdad
Published: (2009)
Automatic Identification of Close Languages – Case Study: Malay and Indonesian.
by: Bali, Ranaivo-Malançon
Published: (2006)
by: Bali, Ranaivo-Malançon
Published: (2006)
Assessing Malacca wireless security implementation in government and private sector companies in – A case study
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Similar Items
-
Face recognition using faster R-CNN with inception-V2 architecture for CCTV camera
by: Halawa, Lavin J., et al.
Published: (2019) -
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018) -
The Implementation of Framework for Edutainment: Educational Games Customization Tool
by: Che Embi, Zarina
Published: (2008) -
Disability in television crime drama: Transgression and access
by: Ellis, Katie
Published: (2015) -
Close circuit television camera applications in Abu Dhabi United Arab Emirates: surveillance system effectiveness assessment
by: Salem Al Neyadi, Ali Hamad
Published: (2021)