-
1
SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSIS /
Published 2007“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
2
Security in grid computing : study and design a new model of authentication scheme /
Published 2007“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
3
Security in grid computing : study and design a new model of authentication scheme /
Published 2007“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
4
DATA VERIFICATION METHOD FOR MALAYSIA BRAND ANDROID DEVICE : AN ENHANCEMENT FOR MOBILE PHONE FORENSIC GUIDELINE /
Published 2014“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
5
DATA VERIFICATION METHOD FOR MALAYSIA BRAND ANDROID DEVICE : AN ENHANCEMENT FOR MOBILE PHONE FORENSIC GUIDELINE /
Published 2014“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
6
SECURED ACCESS CONTROL MODEL FOR KNOWLEDGE MANAGEMENT SYSTEM /
Published 2014“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
7
SECURED ACCESS CONTROL MODEL FOR KNOWLEDGE MANAGEMENT SYSTEM /
Published 2014“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
8
ANALYSIS ON BGP PREFIX HIJACKING IN A SIMULATED ENVIRONMENT /
Published 2015“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
9
Integration of verification in otp cryptography for highly critical embedded system /
Published 2015“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
10
Performance evaluation of snort intrusion detection system over IPV4/IPV6 networks using PF_ring cluster /
Published 2015“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
11
A FAPA BASED MODEL FOR PROTECTION FLOODING ATTACK IN A CLOUD SYSTEM /
Published 2015“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
12
A FAPA BASED MODEL FOR PROTECTION FLOODING ATTACK IN A CLOUD SYSTEM /
Published 2015“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
13
ANALYSIS ON BGP PREFIX HIJACKING IN A SIMULATED ENVIRONMENT /
Published 2015“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
14
Integration of verification in otp cryptography for highly critical embedded system /
Published 2015“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
15
Performance evaluation of snort intrusion detection system over IPV4/IPV6 networks using PF_ring cluster /
Published 2015“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
16
ANALYZING LOG FILES FOR UNIVERSITY WEB INTRUSION INVESTIGATION USING HADOOP /
Published 2016“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
17
ENHANCED DATA INTEGRITY CHECKING IN BIG DATA ENVIRONMENT USING MD5 AND SHA1 ALGORITHM IN HADOOP ARCHITECTURE /
Published 2016“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
18
ENHANCED DATA INTEGRITY CHECKING IN BIG DATA ENVIRONMENT USING MD5 AND SHA1 ALGORITHM IN HADOOP ARCHITECTURE /
Published 2016“…Kuala Lumpur : Universiti Teknologi Malaysia, …”
-
19
ANALYZING LOG FILES FOR UNIVERSITY WEB INTRUSION INVESTIGATION USING HADOOP /
Published 2016“…Kuala Lumpur : Universiti Teknologi Malaysia, …”