Detecting and preventing unauthorised computer access on a physical network system
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal threats may come from...
| Main Author: | Mohd. Shariff, Muhammad Reza |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9572/ http://eprints.utm.my/9572/1/SuhaizaMdSaadMFS2008.pdf |
Similar Items
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018)
by: Al-Zarqawee, Aws Naser
Published: (2018)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
by: Shamshirband, Shahaboddin
Published: (2014)
by: Shamshirband, Shahaboddin
Published: (2014)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Prevention of Unauthorized Access to Electronic Health Records using Docker
by: Deepa Vishnu, Kodiya, et al.
Published: (2024)
by: Deepa Vishnu, Kodiya, et al.
Published: (2024)
Adaptive Concurrent Medium Access Control for Wireless Mesh Network
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Study and Implementation of Internet of Things (IoT) Based Forest Fire Automation System to Detect and Prevent Wildfire
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
On the vital areas of intrusion detection systems in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2012)
by: Abduvaliyev, Abror, et al.
Published: (2012)
On the medium access control protocols suitable for wireless sensor networks – a survey
by: Guerroumi, Mohamed, et al.
Published: (2014)
by: Guerroumi, Mohamed, et al.
Published: (2014)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Enhancing generic code clone detection model through protected access modifier rule and weightage
by: Siti An Nasihah, Mohd Napi
Published: (2016)
by: Siti An Nasihah, Mohd Napi
Published: (2016)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Performance analysis of RTS/CTS protocol over basic access in wireless networks: Study of protocol impact on performance in wireless networks
by: Kuruvilla, Mathew, et al.
Published: (2015)
by: Kuruvilla, Mathew, et al.
Published: (2015)
TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Pornography addiction detection based on Neurophysiological computational approach
by: Kamaruddin, Norhaslinda, et al.
Published: (2018)
by: Kamaruddin, Norhaslinda, et al.
Published: (2018)
Door Access System via Fingerprint with GSM (ReSMART)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013)
by: Abawajy, Jemal H., et al.
Published: (2013)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
A recommender of physical games for learning programming and computational thinking / Mohammad Ahsan Habib
by: Mohammad Ahsan , Habib
Published: (2019)
by: Mohammad Ahsan , Habib
Published: (2019)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
Internal structure of computer systems
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Introduction of computer systems and applications
Published: (2011)
Published: (2011)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
CIT 505 - COMPUTER SYSTEM AND NETWORKS - OKT. 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CIT 505 - COMPUTER SYSTEMS AND NETWORKS - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CIT505 – COMPUTER SYSTEMS AND NETWORKS - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
Similar Items
-
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013) -
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018) -
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018) -
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)