Items where Subject is "Software protection"

Group by: Creators | Item Type
Jump to: A | D | L | M | N | O | R | S | Z
Number of items at this level: 17.

A

Monitoring and evaluating open wireless LAN using hybrid IDS / Mohd Mirza Abdul Malik, Mohd Nizam Osman and Mushahadah Maghribi. (2019) Journal of Computing Research and Innovation (JCRINN), 4 (2): 7. pp. 60-67. ISSN 2600-8793

Image authentication using Scale Invariant Feature Transform (SIFT) / Nurul Anis Suriana Adnan. (2017) Degree thesis, thesis, Universiti Teknologi MARA, Terengganu.

User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop. (2017) [Student Project] (Unpublished)

D

Comparing the vulnerability of password security on Windows XP Professional and Red Hat Linux 9 / Mohamad Yusof Darus and Norkhushaini Awang. (2003) [Research Reports] (Unpublished)

L

The use of intrusion prevention system to increase computer security / Najib Limun. (2005) [Student Project] (Unpublished)

M

User centered design principle: safety mobile application / Siti Nurasyikin Mohamad Tamin. (2015) Masters thesis, thesis, Universiti Teknologi MARA.

A study on computer viruses attacks and the way to cure them / Shukor Sanim Mohd Fauzi. (2003) Degree thesis, thesis, Universiti Teknologi MARA.

SafeSearch: obfuscated VPN server using raspberry Pi for secure network / Mohd Faris Mohd Fuzi ... [et al.]. (2021) Journal of Computing Research and Innovation (JCRINN), 6 (4): 10. pp. 90-101. ISSN 2600-8793

Folder data storage authentication using graphical password / Muhamad Haziq Mohd Rosdi. (2021) Degree thesis, thesis, Universiti Teknologi MARA, Terengganu.

Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof. (2021) Masters thesis, thesis, Universiti Teknologi MARA.

N

Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari. (2017) Degree thesis, thesis, Universiti Teknologi MARA, Terengganu.

O

Enhancing security and privacy in local area network (LAN) with TORVPN using raspberry PI as access point: a design and implementation / Mohd Nizam Osman ... [et al.]. (2021) Journal of Computing Research and Innovation (JCRINN), 6 (2): 4. pp. 29-40. ISSN 2600-8793

R

Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi. (2017) Degree thesis, thesis, Universiti Teknologi MARA, Terengganu.

An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]. (2022) Journal of Computing Research and Innovation (JCRINN), 7 (1): 11. pp. 124-137. ISSN 2600-8793

S

Student Luggage Storage System (SLSS) / Sofea Aida Sallehan. (2020) Degree thesis, thesis, Universiti Teknologi MARA, Terengganu.

Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin. (2017) Degree thesis, thesis, Universiti Teknologi MARA, Terengganu.

Z

The relationships between information security management practices and organisational agility in Malaysia information technology business organisations / Muhamad Khairulnizam Zaini. (2019) PhD thesis, thesis, Universiti Teknologi MARA (UiTM).

This list was generated on Sun May 26 21:03:17 2024 UTC.