Search Results for Communication - Narrowed by: Computer networks -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dCommunication$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-10T19:55:41ZSecurity of information and communication networksent://SD_ILS/0/SD_ILS:2821112024-06-10T19:55:41Z2024-06-10T19:55:41Zby Kartalopoulos, Stamatios V.<br/>Author Kartalopoulos, Stamatios V.<br/>Format: Books<br/>Call Number TK5105.59 K37 2009<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2009<br/>ISBN 9780470290255<br/>Introduction to communication electronic warfare systemsent://SD_ILS/0/SD_ILS:3003812024-06-10T19:55:41Z2024-06-10T19:55:41Zby Poisel, Richard A.<br/>Author Poisel, Richard A.<br/>Format: Books<br/>Call Number UG590 P64 2008<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2008<br/>ISBN 9781596934528<br/>Introduction to communication electronic warfare systemsent://SD_ILS/0/SD_ILS:3170832024-06-10T19:55:41Z2024-06-10T19:55:41Zby Poisel, Richard<br/>Author Poisel, Richard<br/>Format: Books<br/>Call Number UG590 P65 2002<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580533447<br/>A study of trusted computing implementation in public sector information, communication and technology (ICT) domainent://SD_ILS/0/SD_ILS:6040732024-06-10T19:55:41Z2024-06-10T19:55:41Zby Rusnita Isnin @ Hamdan<br/>Author Rusnita Isnin @ Hamdan, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 025045 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>A study of trusted computing implementation in public sector information, communication and technology (ICT) domainent://SD_ILS/0/SD_ILS:3964402024-06-10T19:55:41Z2024-06-10T19:55:41Zby Rusnita Isnin @ Hamdan<br/>Author Rusnita Isnin @ Hamdan, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 R87 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:3913992024-06-10T19:55:41Z2024-06-10T19:55:41Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2002<br/>Edition 2nd ed.<br/>Publisher Prentice Hall PTR,<br/>Publication Date 2002<br/>ISBN 9780130460196<br/>Wireless network securityent://SD_ILS/0/SD_ILS:1970622024-06-10T19:55:41Z2024-06-10T19:55:41Zby Xiao, Yang<br/>Author Xiao, Yang, Shen, X. (Xuemin), 1958-, Du, Ding-Zhu<br/>Format: Books<br/>Call Number TK5103.2 W579 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387280400<br/>A Benchmarking methodology for NPU-based stateful firewallent://SD_ILS/0/SD_ILS:3526122024-06-10T19:55:41Z2024-06-10T19:55:41Zby Lee, Eng Kean<br/>Author Lee, Eng Kean, Sulaiman Mohd. Nor, IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format: Books<br/>Call Number TK5105.59 L44 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Detection of DoS attacks using intrusion detection sensorsent://SD_ILS/0/SD_ILS:3220342024-06-10T19:55:41Z2024-06-10T19:55:41Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format: Books<br/>Call Number TK5105.59 P37 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>A secure model to mitigate bypassing web-based wireless authenticationent://SD_ILS/0/SD_ILS:8310212024-06-10T19:55:41Z2024-06-10T19:55:41Zby Jamil Salem Bajamil, 1987-, author<br/>Author Jamil Salem Bajamil, 1987-, author, Mazdak Zamani, 1979-, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5103.2 B35 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A secure model to mitigate bypassing web-based wireless authenticationent://SD_ILS/0/SD_ILS:8310222024-06-10T19:55:41Z2024-06-10T19:55:41Zby Jamil Salem Bajamil, 1987-, author<br/>Author Jamil Salem Bajamil, 1987-, author<br/>Format: Books<br/>Call Number CP 033623 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Security, privacy, trust, and resource management in mobile and wireless communicationsent://SD_ILS/0/SD_ILS:8412642024-06-10T19:55:41Z2024-06-10T19:55:41Zby Rawat, Danda B., 1977-, editor<br/>Author Rawat, Danda B., 1977-, editor, Bista, Bhed B., 1967-, editor, Yan, Gongjun, 1976-, editor<br/>Format: Books<br/>Call Number TK5103.2 S435 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466646919<br/>Security awareness framework of mobile phones from users' perspectiveent://SD_ILS/0/SD_ILS:7784152024-06-10T19:55:41Z2024-06-10T19:55:41Zby Mohamed Hagi Abdulkadir, 1985-<br/>Author Mohamed Hagi Abdulkadir, 1985-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5103.2 M644 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Security awareness framework of mobile phones from users' perspectiveent://SD_ILS/0/SD_ILS:7784162024-06-10T19:55:41Z2024-06-10T19:55:41Zby Mohamed Hagi Abdulkadir, 1985-<br/>Author Mohamed Hagi Abdulkadir, 1985-<br/>Format: Books<br/>Call Number CP 027523 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Kajian pengumpukkan saluran menggunakan partial sharing scheme (PSS) terhadap pelbagai kelas trafik GSM dan GPRSent://SD_ILS/0/SD_ILS:7653412024-06-10T19:55:41Z2024-06-10T19:55:41Zby Nur Farhana Jalalluddin<br/>Author Nur Farhana Jalalluddin<br/>Format: Books<br/>Call Number CP 026419 ra<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Cognitive radio networking and security : a game-theoretic viewent://SD_ILS/0/SD_ILS:7612732024-06-10T19:55:41Z2024-06-10T19:55:41Zby Liu, K. J. Ray, 1961-<br/>Author Liu, K. J. Ray, 1961-, Wang, Beibei<br/>Format: Books<br/>Call Number TK5103.4815 L58 2011<br/>Publisher Cambridge University Press,<br/>Publication Date 2011<br/>ISBN 9780521762311<br/>Kajian pengumpukkan saluran menggunakan partial sharing scheme (PSS) terhadap pelbagai kelas trafik GSM dan GPRSent://SD_ILS/0/SD_ILS:7653382024-06-10T19:55:41Z2024-06-10T19:55:41Zby Nur Farhana Jalalluddin<br/>Author Nur Farhana Jalalluddin, Syed Othmawi Abd. Rahman, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N43 2011 raf<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Analysis and implementation of security algorithms for wireless communicationsent://SD_ILS/0/SD_ILS:6041092024-06-10T19:55:41Z2024-06-10T19:55:41Zby Abdinasir Hassan Ali, 1977-<br/>Author Abdinasir Hassan Ali, 1977-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 020848 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Analysis of wired network security facilities in securing wireless networkent://SD_ILS/0/SD_ILS:8361602024-06-10T19:55:41Z2024-06-10T19:55:41Zby Abdul Kadir Ali Husein<br/>Author Abdul Kadir Ali Husein, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5103.2 A238 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Makumat)) - Universiti Teknologi Malaysia, 2010<br/>Analysis and implementation of security algorithms for wireless communicationsent://SD_ILS/0/SD_ILS:3967102024-06-10T19:55:41Z2024-06-10T19:55:41Zby Abdinasir Hassan Ali, 1977-<br/>Author Abdinasir Hassan Ali, 1977-, Maslin Masrom, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 A22 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Security in wireless mesh networksent://SD_ILS/0/SD_ILS:2975562024-06-10T19:55:41Z2024-06-10T19:55:41Zby Zhang, Yan<br/>Author Zhang, Yan, Zheng, Jun, Hu, Honglin, 1975-<br/>Format: Books<br/>Call Number TK5103.2 S44 2009<br/>Publisher CRC,<br/>Publication Date 2009<br/>ISBN 9780849382505<br/>Security in an IPv6 environmentent://SD_ILS/0/SD_ILS:3395992024-06-10T19:55:41Z2024-06-10T19:55:41Zby Minoli, Daniel<br/>Author Minoli, Daniel, Kouns, Jake<br/>Format: Books<br/>Call Number TK5105.59 M56 2009<br/>Publisher Auerbach Publication,<br/>Publication Date 2009<br/>ISBN 9781420092295<br/>Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computingent://SD_ILS/0/SD_ILS:2107802024-06-10T19:55:41Z2024-06-10T19:55:41Zby Buttyan, Levente<br/>Author Buttyan, Levente, Hubaux, Jean-Pierre<br/>Format: Books<br/>Call Number TK5102.85 B87 2008<br/>Publisher Cambridge University Press,<br/>Publication Date 2008<br/>ISBN 9780521873710<br/>Network-aware security for group communicationsent://SD_ILS/0/SD_ILS:2258862024-06-10T19:55:41Z2024-06-10T19:55:41Zby Sun, Yan (Yan Lindsay)<br/>Author Sun, Yan (Yan Lindsay), Trappe, Wade, Liu, K. J. Ray, 1961-<br/>Format: Books<br/>Call Number TK5105.59 S86 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9780387688466<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2828922024-06-10T19:55:41Z2024-06-10T19:55:41Zby WIllett, Keith D.<br/>Author WIllett, Keith D.<br/>Format: Books<br/>Call Number QA76.9.A25 W54 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9780849380679<br/>Digital privacy : theory, technologies and practicesent://SD_ILS/0/SD_ILS:2480712024-06-10T19:55:41Z2024-06-10T19:55:41Zby Acquisti, Alessandro<br/>Author Acquisti, Alessandro<br/>Format: Books<br/>Call Number QA76.9.A25 D58 2008<br/>Publisher Auerbach Publications,<br/>Publication Date 2008 2007<br/>ISBN 9781420052176<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-06-10T19:55:41Z2024-06-10T19:55:41Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>Foundations of communications electronic warfareent://SD_ILS/0/SD_ILS:2635772024-06-10T19:55:41Z2024-06-10T19:55:41Zby Poisel, Richard<br/>Author Poisel, Richard<br/>Format: Books<br/>Call Number UG590 P66 2008<br/>Publisher Artech House,<br/>Publication Date 2008<br/>ISBN 9781596933910<br/>Securing information and communications systems : principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:2637952024-06-10T19:55:41Z2024-06-10T19:55:41Zby Furnell, Steven M.<br/>Author Furnell, Steven M.<br/>Format: Books<br/>Call Number QA76.9.A25 S4244 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932289<br/>CWSP guide to wireless securityent://SD_ILS/0/SD_ILS:1226602024-06-10T19:55:41Z2024-06-10T19:55:41Zby Ciampa, Mark<br/>Author Ciampa, Mark<br/>Format: Books<br/>Call Number TK5105.78 C52 2007<br/>Publisher Thomson Course Technology,<br/>Publication Date 2007<br/>ISBN 9781418836375<br/>Network security policies and proceduresent://SD_ILS/0/SD_ILS:1581672024-06-10T19:55:41Z2024-06-10T19:55:41Zby Frye, Douglas W.<br/>Author Frye, Douglas W.<br/>Format: Books<br/>Call Number HF5548.37 F79 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9780387309378<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">FullText</a><br/>Data communications and network securityent://SD_ILS/0/SD_ILS:3015242024-06-10T19:55:41Z2024-06-10T19:55:41Zby Carr, Houston<br/>Author Carr, Houston, Snyder, Charles A.<br/>Format: Books<br/>Call Number TK5105.59 C373 2007<br/>Publisher McGraw-Hill/Irwin,<br/>Publication Date 2007<br/>ISBN 9780072976045<br/>Security for mobile networks and platformsent://SD_ILS/0/SD_ILS:1045732024-06-10T19:55:41Z2024-06-10T19:55:41Zby Aissi, Selim<br/>Author Aissi, Selim, Dabbous, Nora, Prasad, Anand<br/>Format: Books<br/>Call Number TK5103.2 A374 2006<br/>Publisher Artech House,<br/>Publication Date 2006<br/>ISBN 9781596930087<br/>Wireless networks : multiuser detection in cross-layer designent://SD_ILS/0/SD_ILS:4638712024-06-10T19:55:41Z2024-06-10T19:55:41Zby Comaniciu, Christina<br/>Author Comaniciu, Christina, Mandayam, Narayan B., Poor, H. Vincent<br/>Format: Books<br/>Call Number TK5103.2 C65 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9780387236971<br/>Applying mobile agent in distributed speech recognition using JADEent://SD_ILS/0/SD_ILS:4615142024-06-10T19:55:41Z2024-06-10T19:55:41Zby Emrul Hamide Md. Saaim<br/>Author Emrul Hamide Md. Saaim, Abdul Manan Ahmad, Mohamad Ashari Alias, Mohd. Fauzi Othman, International Conference on Computer, Communications and Signal Processing with Special Track on Biomedical Engineering (1st. : 2005 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.76.I58 A66 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Protocols for secure electronic commerceent://SD_ILS/0/SD_ILS:1539962024-06-10T19:55:41Z2024-06-10T19:55:41Zby Sherif, Mostafa Hashem<br/>Author Sherif, Mostafa Hashem<br/>Format: Books<br/>Call Number HF5548.3 S534 2003<br/>Edition 2nd<br/>Publisher CRC Press,<br/>Publication Date 2004<br/>ISBN 9780849315091<br/>UMTS securityent://SD_ILS/0/SD_ILS:3942292024-06-10T19:55:41Z2024-06-10T19:55:41Zby Niemi, Valtteri<br/>Author Niemi, Valtteri, Nyberg, Kaisa, 1948-<br/>Format: Books<br/>Call Number QA76.9.A25 N53 2003<br/>Publisher John Wiley & Sons,<br/>Publication Date 2003<br/>ISBN 9780470847947<br/>Security in fixed and wireless networks : an introduction to securing data communicationsent://SD_ILS/0/SD_ILS:3955422024-06-10T19:55:41Z2024-06-10T19:55:41Zby Schafer, Gunter<br/>Author Schafer, Gunter, Von Schmoeger, Hedwig Jourdan<br/>Format: Books<br/>Call Number TK5105.59 S32 2003<br/>Publisher John Wiley & Sons,<br/>Publication Date 2003<br/>ISBN 9780470863701<br/>Internet and wireless securityent://SD_ILS/0/SD_ILS:4755892024-06-10T19:55:41Z2024-06-10T19:55:41Zby Temple, Robert, 1963-<br/>Author Temple, Robert, 1963-, Regnault, John<br/>Format: Books<br/>Call Number TK5105.59 I55 2002<br/>Publisher Institution of Electrical Engineers,<br/>Publication Date 2002<br/>ISBN 9780852961971<br/>Implementation of Brands' digital cash system in TCP/IP networking environmentent://SD_ILS/0/SD_ILS:3277442024-06-10T19:55:41Z2024-06-10T19:55:41Zby Teo, Pock Chueng<br/>Author Teo, Pock Chueng, Ahmad Zuri Sha'ameri, Zulkarnain Mohd. Yusof, International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format: Books<br/>Call Number HG1710 T46 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Authentication protocol : methods reviewent://SD_ILS/0/SD_ILS:3268212024-06-10T19:55:41Z2024-06-10T19:55:41Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Secure electronic commerce : building the infrastructure for digital signatures and encryptionent://SD_ILS/0/SD_ILS:1638772024-06-10T19:55:41Z2024-06-10T19:55:41Zby Ford, Warwick<br/>Author Ford, Warwick, Baum, Michael S.<br/>Format: Books<br/>Call Number QA76.9.A25 F67 2001<br/>Edition 2nd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2001<br/>ISBN 9780130272768<br/>Securing e-business applications and communicationsent://SD_ILS/0/SD_ILS:3131872024-06-10T19:55:41Z2024-06-10T19:55:41Zby Held, Jonathan S.<br/>Author Held, Jonathan S., Bowers, John R.<br/>Format: Books<br/>Call Number QA76.9.A25 H44 2001<br/>Publisher Auerbach Publications,<br/>Publication Date 2001<br/>ISBN 9780849309632<br/>Fundamental steps for fixed-font character recognition in image processing ... [et al.]ent://SD_ILS/0/SD_ILS:130912024-06-10T19:55:41Z2024-06-10T19:55:41Zby Khor, Sock Choo<br/>Author Khor, Sock Choo, Mohamad Azlie Mohamad Yusof, Tan, Yee Fei, Teo, Lu Ling, Thoo, Wei Ping<br/>Format: Visual Materials<br/>Call Number MFL 9464<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>ENHANCEMENT OF WIRELESS LOCAL AREA NETWORK SECURITY AT PUBLIC SERVICE DEPARTMENTent://SD_ILS/0/SD_ILS:8390212024-06-10T19:55:41Z2024-06-10T19:55:41Zby Zulkarnain Kamaruddin, 1977-, author<br/>Author Zulkarnain Kamaruddin, 1977-, author, Abdul Hanan Abdullah, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 Z85 2007 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ROGUE ACCESS POINT DETECTION ON THE CLIENT-SIDEent://SD_ILS/0/SD_ILS:8390902024-06-10T19:55:41Z2024-06-10T19:55:41Zby Somayeh Nikbakhsh, 1982-, author<br/>Author Somayeh Nikbakhsh, 1982-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Mazdak Zamani, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.85 S66 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>SECURE WIRELESS IMPLEMENTATION BASED ON IEEE 802.1X NETWORK STANDARDent://SD_ILS/0/SD_ILS:8395972024-06-10T19:55:41Z2024-06-10T19:55:41Zby al-Slakhi, Mahmoud H.R., 1982-, author<br/>Author al-Slakhi, Mahmoud H.R., 1982-, author, Zailani Mohamed Sidek, Assoc.Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 S535 2007 raf<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>AN AUTOMATED MECHANISM TO DETECT AND MITIGATE DEAUTHENTICATION AND DISASSOCIATION DOS ATTACK IN WIRELESS 802.11 NETWORKSent://SD_ILS/0/SD_ILS:8708302024-06-10T19:55:41Z2024-06-10T19:55:41Zby Haitham Ameen Noman, 1986-, author<br/>Author Haitham Ameen Noman, 1986-, author, Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.85 H35 2017 raf<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>AN AUTOMATED MECHANISM TO DETECT AND MITIGATE DEAUTHENTICATION AND DISASSOCIATION DOS ATTACK IN WIRELESS 802.11 NETWORKSent://SD_ILS/0/SD_ILS:8710742024-06-10T19:55:41Z2024-06-10T19:55:41Zby Haitham Ameen Noman, 1986-, author<br/>Author Haitham Ameen Noman, 1986-, author, Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064022 ra<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>A high-speed wireless secure model-real time software system perspectiveent://SD_ILS/0/SD_ILS:8365002024-06-10T19:55:41Z2024-06-10T19:55:41Zby Shamsul Bahry Amirudin<br/>Author Shamsul Bahry Amirudin, Othman B. Mohd Yusop, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5103.2 S536 2004 raf<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering) - Universiti Teknologi Malaysia, 2004<br/>ENHANCEMENT OF WIRELESS LOCAL AREA NETWORK SECURITY AT PUBLIC SERVICE DEPARTMENTent://SD_ILS/0/SD_ILS:8390292024-06-10T19:55:41Z2024-06-10T19:55:41Zby Zulkarnain Kamaruddin, 1977-, author<br/>Author Zulkarnain Kamaruddin, 1977-, author, Abdul Hanan Abdullah, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034566 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ROGUE ACCESS POINT DETECTION ON THE CLIENT-SIDEent://SD_ILS/0/SD_ILS:8390912024-06-10T19:55:41Z2024-06-10T19:55:41Zby Somayeh Nikbakhsh, 1982-, author<br/>Author Somayeh Nikbakhsh, 1982-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Mazdak Zamani, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034559 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>SECURE WIRELESS IMPLEMENTATION BASED ON IEEE 802.1X NETWORK STANDARDent://SD_ILS/0/SD_ILS:8395992024-06-10T19:55:41Z2024-06-10T19:55:41Zby al-Slakhi, Mahmoud H.R., 1982-<br/>Author al-Slakhi, Mahmoud H.R., 1982-, Zailani Mohamed Sidek, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034563 ra<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Security, Privacy and Reliability in Computer Communications and Networksent://SD_ILS/0/SD_ILS:8669672024-06-10T19:55:41Z2024-06-10T19:55:41Zby Sha, Kewei<br/>Author Sha, Kewei, Striegel, Aaron, Song, Min<br/>Format: Books<br/>Call Number TK5105.59 S43 2017<br/>ISBN 9788793379893<br/>