Showing
1 - 15
results of
15
for search '
"computer security"
'
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Page will reload when a filter is removed.
Reset Filters
Applied Filters:
Genre:
Remove Filter
Article
Page will reload when a filter is removed.
Reset Filters
Show filters (1)
Genre:
Remove Filter
Article
Search Results - "computer security"
Showing
1 - 15
results of
15
for search '
"computer security"
'
, query time: 0.05s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
by
Hashim, Muhamad Arif
,
Abd Halim, Iman Hazwam
,
Ismail, Mohammad Hafiz
,
Mohd Noor, Norfaizalfarid
,
Mohd Fuzi, Mohd Faris
,
Mohammed, Abdul Hapes
,
JM. Gining, Ray Adderley
Published 2017
Link Metadata
Book
Save to List
Saved in:
2
Adaptation of online training in UiTM during Covid-19 pandemic: experience of ILD UiTM / Mohd Rafizi Rahmad and Siti Zalipah Ibrahim
by
Rahmad, Mohd Rafizi
,
Ibrahim, Siti Zalipah
Published 2021
Link Metadata
Book
Save to List
Saved in:
3
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by
Yazid, Nur Azien
,
Abdullah, Kamilah
,
Abd Halim, Suhaila
Published 2019
Link Metadata
Book
Save to List
Saved in:
4
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
by
Suhaimi, Hamizan
,
Suliman, Saiful Izwan
,
Musirin, Ismail
Published 2021
Link Metadata
Book
Save to List
Saved in:
5
The determinants of user satisfaction of engineering maintenance system (EMESYS) in the Malaysian army / Nurul Shahnaz Mahdzan ...[et al.]
by
Mahdzan, Nurul Shahnaz
,
Mokhtar, Marzuki
,
M. Nayan, Amran
,
Idris, Mohd Razif
Published 2021
Link Metadata
Book
Save to List
Saved in:
6
Cybercrime awareness: development and evaluation of an adventure game / Aznoora Osman and Nurul Syarafina Azizan
by
Osman, Aznoora
,
Azizan, Nurul Syarafina
Published 2017
Link Metadata
Book
Save to List
Saved in:
7
Intrusion detection system (IDS) : Investigating snort performance in windows and Ubuntu due to flooding attack / Abidah Mat Taib and Nur Syahirah Shayuthi
by
Mat Taib, Abidah
,
Shayuthi, Nur Syahirah
Published 2017
Link Metadata
Book
Save to List
Saved in:
8
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
by
Mohd Fuzi, Mohd Faris
,
Mohd Shahirudin, Syamir
,
Abd Halim, Iman Hazwam
,
Jamaluddin, Muhammad Nabil Fikri
Published 2023
Link Metadata
Book
Save to List
Saved in:
9
Safety and security practices among hotels in Terengganu: perspectives from hotel managers / Jazira Anuar
by
Anuar, Jazira
,
Musa, Mushaireen
,
Khalid, Khazainah
,
Abu Bakar, Siti Khuzaimah
Published 2018
Link Metadata
Book
Save to List
Saved in:
10
Network security performance analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger / Nur Khairani Kamarudin ... [et al.]
by
Kamarudin, Nur Khairani
,
Bismi, Nur Syafiqa
,
Ahmad Zukri, Nurul Hidayah
,
Mohd Fuzi, Mohd Faris
,
Ramle, Rashidah
Published 2020
Link Metadata
Book
Save to List
Saved in:
11
The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
by
Kamarudin, Nur Khairani
,
Md Hasani, Nur Nazifa
,
Ruslan, Rafiza
,
Ramle, Rashidah
,
Ahmad Zukri, Nurul Hidayah
,
Abd Halim, Iman Hazwam
Published 2018
Link Metadata
Book
Save to List
Saved in:
12
RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim
by
Osman, Mohd Nizam
,
Mohammad Zulrahim, Mohd Syafiq Aiman
Published 2016
Link Metadata
Book
Save to List
Saved in:
13
Reducing honeypot log storage capacity consumption - cron job with perl-script approach / Iman Hazwam Bin Abd Halim ... [et al.]
by
Abd Halim, Iman Hazwam
,
Abu Hassan, Nur Muhammad Irfan
,
Razak, Tajul Rosli
,
Jamaluddin, Muhammad Nabil Fikri
,
Ismail, Mohammad Hafiz
Published 2019
Link Metadata
Book
Save to List
Saved in:
14
Sinkhole attack in IDS: detection and performance analysis for agriculture-based WSN using cooja network simulator / Iman Hazwam Abd Halim, Mohamad Hafiz Abdul Azziz and Mohd Faris...
by
Abd Halim, Iman Hazwam
,
Abdul Azziz, Mohamad Hafiz
,
Mohd Fuzi, Mohd Faris
Published 2021
Link Metadata
Book
Save to List
Saved in:
15
Performance analysis of open-source network monitoring software in wireless network / Mohd Faris Mohd Fuzi ... [et al.]
by
Mohd Fuzi, Mohd Faris
,
Mohd Mahdzir, Mohd Firdaus
,
Abd Halim, Iman Hazwam
,
Ruslan, Rafiza
Published 2023
Link Metadata
Book
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Institution
Universiti Teknologi Mara
15 results
15
Library
Repository UiTM
15 results
15
Author
Abd Halim, Iman Hazwam
6 results
6
Mohd Fuzi, Mohd Faris
5 results
5
Ahmad Zukri, Nurul Hidayah
2 results
2
Ismail, Mohammad Hafiz
2 results
2
Jamaluddin, Muhammad Nabil Fikri
2 results
2
Kamarudin, Nur Khairani
2 results
2
Ramle, Rashidah
2 results
2
Ruslan, Rafiza
2 results
2
Abd Halim, Suhaila
1 results
1
Abdul Azziz, Mohamad Hafiz
1 results
1
Abdullah, Kamilah
1 results
1
Abu Bakar, Siti Khuzaimah
1 results
1
Abu Hassan, Nur Muhammad Irfan
1 results
1
Anuar, Jazira
1 results
1
Azizan, Nurul Syarafina
1 results
1
Bismi, Nur Syafiqa
1 results
1
Hashim, Muhamad Arif
1 results
1
Ibrahim, Siti Zalipah
1 results
1
Idris, Mohd Razif
1 results
1
JM. Gining, Ray Adderley
1 results
1
Khalid, Khazainah
1 results
1
M. Nayan, Amran
1 results
1
Mahdzan, Nurul Shahnaz
1 results
1
Mat Taib, Abidah
1 results
1
Md Hasani, Nur Nazifa
1 results
1
Mohammad Zulrahim, Mohd Syafiq Aiman
1 results
1
Mohammed, Abdul Hapes
1 results
1
Mohd Mahdzir, Mohd Firdaus
1 results
1
Mohd Noor, Norfaizalfarid
1 results
1
Mohd Shahirudin, Syamir
1 results
1
see all…
Genre
Article
PeerReviewed
15 results
15
Year of Publication
From:
To: