Showing 1 - 20 results of 142 for search '"Security"', query time: 0.60s Refine Results
  1. 1
    by Alam, MM, Fawzi, AM, Islam, MM, Said, J
    Published 2021
    Subjects: ...Economic security...
    View Fulltext in Publisher
    Article
  2. 2
    by Alam, M.M, Fawzi, A.M, Islam, M.M, Said, J.
    Published 2021
    Subjects: ...Economic security...
    View Fulltext in Publisher
    View in Scopus
    Article
  3. 3
    by Adamu, J., Hamzah, R., Rosli, M.M
    Published 2020
    Subjects: ...CodeIgniter security...
    View Fulltext in Publisher
    View in Scopus
    Article
  4. 4
    by Jalli, N, Sualman, I
    Published 2020
    Subjects: ...national security...
    View Fulltext in Publisher
    Article
  5. 5
    by Jalli, N., Sualman, I.
    Published 2020
    Subjects: ...National security...
    View Fulltext in Publisher
    View in Scopus
    Article
  6. 6
    Subjects: ...Cloud security...
    View Fulltext in Publisher
    View in Scopus
    Article
  7. 7
    Subjects: ...Information security...
    View Fulltext in Publisher
    View in Scopus
    Article
  8. 8
  9. 9
  10. 10
    Subjects: ...Intrusion detection systems (Computer security). Computer network security. Hackers...
    Get fulltext
    View Fulltext in UiTM IR
    Article
  11. 11
  12. 12
  13. 13
    Subjects: ...Intrusion detection systems (Computer security). Computer network security. Hackers...
    Get fulltext
    View Fulltext in UiTM IR
    Article
  14. 14
  15. 15
    by Fazlida, MR, Said, J
    Published 2015
    Subjects: ...Information security...
    View Fulltext in Publisher
    Article
  16. 16
    by Alias, NA, Nor, NM
    Published 2018
    Subjects: ...Food security...
    View Fulltext in Publisher
    Article
  17. 17
    by Alias, N.A, Nor, N.M
    Published 2018
    Subjects: ...Food security...
    View Fulltext in Publisher
    View in Scopus
    Article
  18. 18
  19. 19
    Subjects: ...Intrusion detection systems (Computer security). Computer network security. Hackers...
    Get fulltext
    View Fulltext in UiTM IR
    Article
  20. 20
    Subjects: ...Intrusion detection systems (Computer security). Computer network security. Hackers...
    Get fulltext
    View Fulltext in UiTM IR
    Article