Search Results - "Computer security"
-
1
Kesedaran dan Amalan Keselamatan Komputer dan Internet di Kalangan Pegawai dan Penolong Pegawai Sistem Maklumat di Lima Kementerian Persekutuan di Malaysia
Published 2002Subjects: “…Computer security - Malaysia…”
Get full text
Get full text
-
2
-
3
A comparison of different technique in flow based anomaly detection
Published 2017Subjects: “…Anomaly detection (Computer security)…”
Get full text
Get full text
-
4
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
Published 2016Subjects: “…Anomaly detection (Computer security)…”
Get full text
Get full text
-
5
A tool for modeling software security requirements using security patterns
Published 2016Subjects: “…Computer security…”
Get full text
Get full text
-
6
Secure block cipher inspired by the human immune system
Published 2012Subjects: Get full text
Get full text
-
7
An improved hybrid learning approach for better anomaly detection
Published 2011Subjects: “…Anomaly detection (Computer security)…”
Get full text
Get full text
-
8
PiWall as a home traffic controller: enabling parental control and monitoring
Published 2024Subjects: Get full text
Get full text
-
9
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017Subjects: “…Access control. Computer security…”
Get full text
-
10
-
11
-
12
Operating system kernel malware characterization using data-centric approach
Published 2018Subjects: Get full text
Get full text
-
13
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019Subjects: “…Computer security…”
Get full text
Get full text
-
14
-
15
A XML based, user-centered privacy model in pervasive computing systems
Published 2009Subjects: Get full text
Get full text
-
16
-
17
Development of DNA-based dynamic key-dependent block cipher
Published 2015Subjects: “…Computer security…”
Get full text
Get full text
-
18
Design of a lightweight virtual honeynet based on linux container virtualization
Published 2014Subjects: “…Computer security…”
Get full text
Get full text
-
19
Alternative discrete variable protocol for point to point Quantum Key Distribution system
Published 2012Subjects: “…Public key distribution (Computer security)…”
Get full text
Get full text
-
20
Enhanced cuckoo malware analysis performance using cloud computing
Published 2013Subjects: Get full text
Get full text