Search Results for - Narrowed by: Abdul Hanan Abdullah - Closed Access BookSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qf$003dAUTHOR$002509Author$002509Abdul$002bHanan$002bAbdullah$002509Abdul$002bHanan$002bAbdullah$0026qf$003dITYPE$002509Material$002bType$0025091$00253ACLS_BK$002509Closed$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-22T08:00:48ZSecuring communication on active networkent://SD_ILS/0/SD_ILS:4077092024-05-22T08:00:48Z2024-05-22T08:00:48Zby Satria Mandala<br/>Author Satria Mandala, Abdul Hanan Abdullah, Md. Asri Ngadi, Konferensi Nasional Sistem Informasi (2005 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.5 S27 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Active web caching managementent://SD_ILS/0/SD_ILS:3802542024-05-22T08:00:48Z2024-05-22T08:00:48Zby Satria Mandala<br/>Author Satria Mandala, Abdul Hanan Abdullah, Seminar Nasional Informatika (2004 : Indonesia)<br/>Format: Books<br/>Call Number TK7871.58.F4 S27 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Detecting outlier on intrusion detection system using data set of system callsent://SD_ILS/0/SD_ILS:3965472024-05-22T08:00:48Z2024-05-22T08:00:48Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format: Books<br/>Call Number QA76.9.A25 D335 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Counting the number of system calls to detect intrusion using discriminant analysisent://SD_ILS/0/SD_ILS:3866162024-05-22T08:00:48Z2024-05-22T08:00:48Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, Seminar Quality in Research (2003 : Indonesia)<br/>Format: Books<br/>Call Number QA76.9.A25 D334 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Enforcing multilevel security policies for network firewallent://SD_ILS/0/SD_ILS:3521732024-05-22T08:00:48Z2024-05-22T08:00:48Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.59 C34 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Intrusion detection using system calls based on discriminant analysisent://SD_ILS/0/SD_ILS:3529682024-05-22T08:00:48Z2024-05-22T08:00:48Zby Dahliyusmanto<br/>Author Dahliyusmanto, Abdul Hanan Abdullah, Advanced Technology Congress (2003 : Universiti Putra Malaysia, Serdang, Selangor)<br/>Format: Books<br/>Call Number TH9739 D33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>A methodology to detect intrusion using system call base on discriminant analysisent://SD_ILS/0/SD_ILS:3534312024-05-22T08:00:48Z2024-05-22T08:00:48Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 D33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Access controlling firewall using Bell-LaPadula security modelent://SD_ILS/0/SD_ILS:3535492024-05-22T08:00:48Z2024-05-22T08:00:48Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.59 C33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>CBR technique for proxy agent (IC68)ent://SD_ILS/0/SD_ILS:3162292024-05-22T08:00:48Z2024-05-22T08:00:48Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Suraya Ibrahim, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number QA76.76.I58 F39 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Multi-agent solution in UMTS VHE concept : architecture reviewent://SD_ILS/0/SD_ILS:3214722024-05-22T08:00:48Z2024-05-22T08:00:48Zby Azrinda Hassan Mohamad<br/>Author Azrinda Hassan Mohamad, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.76.I58 A974 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Packet filtering personal firewall based on microsoft's internet protocol helper APIent://SD_ILS/0/SD_ILS:3267142024-05-22T08:00:48Z2024-05-22T08:00:48Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security of mobile agents in distributed environmentent://SD_ILS/0/SD_ILS:3214752024-05-22T08:00:48Z2024-05-22T08:00:48Zby Afzan Zaidi<br/>Author Afzan Zaidi, Mazleena Salleh, Abdul Hanan Abdullah, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.76.I58 A394 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security issues of mobile agentsent://SD_ILS/0/SD_ILS:3220712024-05-22T08:00:48Z2024-05-22T08:00:48Zby Afzan Zaidi<br/>Author Afzan Zaidi, Mazleena Salleh, Abdul Hanan Abdullah, Malaysia Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.76.I58 A39 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Interaction between agents : arguing and cooperation agentsent://SD_ILS/0/SD_ILS:3268162024-05-22T08:00:48Z2024-05-22T08:00:48Zby Ng, Kee Seng<br/>Author Ng, Kee Seng, Abdul Hanan Abdullah, Abdul Manan Ahmad, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.76.I58 N44 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Authentication protocol : methods reviewent://SD_ILS/0/SD_ILS:3268212024-05-22T08:00:48Z2024-05-22T08:00:48Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Application of speaker identification using discrete fourier transforment://SD_ILS/0/SD_ILS:3160102024-05-22T08:00:48Z2024-05-22T08:00:48Zby Jastiar<br/>Author Jastiar, Abdul Hanan Abdullah, Dzulkifli Mohamad, International Conference on Modelling, Indentification and Control (2002 : Austria)<br/>Format: Books<br/>Call Number TK7882.S65 J37 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Implementing advance encryption standard (AES) in virtual private network environmentent://SD_ILS/0/SD_ILS:3161932024-05-22T08:00:48Z2024-05-22T08:00:48Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number TK5105.59 N73 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Mobile agent in intrusion detection systement://SD_ILS/0/SD_ILS:3017022024-05-22T08:00:48Z2024-05-22T08:00:48Zby Azrinda Hassan Mohamad<br/>Author Azrinda Hassan Mohamad, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number QA76.76.I58 A97 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Virtual private network securityent://SD_ILS/0/SD_ILS:3017072024-05-22T08:00:48Z2024-05-22T08:00:48Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, Shamsul Sahibuddin, International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number TK5105.59 V57 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Rekabentuk rangkaian dan keselamatanent://SD_ILS/0/SD_ILS:3122012024-05-22T08:00:48Z2024-05-22T08:00:48Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah<br/>Format: Books<br/>Call Number QA76.9.A25 A32 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Virtual private network tunneling protocolent://SD_ILS/0/SD_ILS:3221342024-05-22T08:00:48Z2024-05-22T08:00:48Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2001 : Universiti Sains Malaysia, Pulau Pinang)<br/>Format: Books<br/>Call Number TK5105.59 N74 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>iPRO agentent://SD_ILS/0/SD_ILS:1465912024-05-22T08:00:48Z2024-05-22T08:00:48Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Improving the effectiveness of a firewall authentication management /Abdul Hanan Abdullah, Kamarulnizam Abu Bakar, Ismandy Alient://SD_ILS/0/SD_ILS:1225672024-05-22T08:00:48Z2024-05-22T08:00:48Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Kamarulnizam Abu Bakar, Ismandy Ali, IASTED International Conference of a Firewall Authentication Management (1999 : Santa Barbara, California)<br/>Format: Books<br/>Call Number QA76.9.A25 A324 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>