-
1
EVIDENCE MODELING COMPONENTS AND INFLUENTIAL FACTORS AT DIGITAL FORENSIC ENVIRONMENT /
Published 2011“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
2
DIGITAL IMAGE WATERMARKING SYSTEM FOR CHECK IMAGE AUTHENTICITY BASED-ON DWT TECHNIQUES /
Published 2010“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
3
DIGITAL IMAGE WATERMARKING SYSTEM FOR CHECK IMAGE AUTHENTICITY BASED-ON DWT TECHNIQUES /
Published 2010“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
4
DETECTION OF COPY-MOVE FORGERY IN DIGITAL IMAGES /
Published 2010“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
5
FORENSIC ANALYSIS TOOL FOR MALICIOUS PDF FILES AND SHELLCODE ANALYSIS /
Published 2011“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
6
A CONFIDENTIAL RFID MODEL TO PREVENT UNAUTHORIZED ACCESS /
Published 2012“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
7
FORENSIC RESEARCH SYSTEM FOR WEB APPLICATION ATTACKS BASED ON HONEYPOT TECHNOLOGY /
Published 2011“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
8
ANTI-PHISHING ALGORITHM DESIGN OF PHISHING EMAIL DETECTION /
Published 2011“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
9
ANTI-PHISHING ALGORITHM DESIGN OF PHISHING EMAIL DETECTION /
Published 2011“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
10
IMPROVED CAPACITY FOR REAL-TIME VIDEO WATERMARKING /
Published 2012“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
11
IMPROVED CAPACITY FOR REAL-TIME VIDEO WATERMARKING /
Published 2012“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
12
ONLINE BANKING SECURITY PERCEPTION AND AWEARNESS OF ONLINE TRANSCTIONS /
Published 2012“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
13
ONLINE BANKING SECURITY PERCEPTION AND AWEARNESS OF ONLINE TRANSCTIONS /
Published 2012“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
14
ROGUE ACCESS POINT DETECTION ON THE CLIENT-SIDE /
Published 2012“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
15
ROGUE ACCESS POINT DETECTION ON THE CLIENT-SIDE /
Published 2012“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
16
Analysis and enhancement of elliptic curve cryptography /
Published 2012“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
17
ENHANCING KEY MANAGEMENT OF ZIGBEE NETWORK BY STEGANOGRAPHY METHOD /
Published 2013“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
18
ENHANCING KEY MANAGEMENT OF ZIGBEE NETWORK BY STEGANOGRAPHY METHOD /
Published 2013“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
19
-
20