Suggested Topics within your search.
Suggested Topics within your search.
Stock exchanges. Insider trading in securities
16
Investment, capital formation, speculation
15
Food security
10
Intrusion detection systems (Computer security). Computer network security. Hackers
9
Malaysia
7
Network security
7
Security
7
Cryptography
6
Digital storage
6
Securities. Fixed-income securities
5
Authentication
4
Bonds
4
Cloud computing
4
Cyber security
4
Data privacy
4
Encryption
4
Information security
4
Information systems
4
Information technology
4
Privacy
4
Security and privacy
4
Security of data
4
Trust
4
human
4
security
4
Article
3
Big data
3
Computer networks. General works. Traffic monitoring
3
Economic security
3
Food supply
3
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
11by Kamarudin, Nur Khairani, Bismi, Nur Syafiqa, Ahmad Zukri, Nurul Hidayah, Mohd Fuzi, Mohd Faris, Ramle, RashidahSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2020
Get fulltext
View Fulltext in UiTM IR
Article -
12by Abd Halim, Iman Hazwam, Abu Hassan, Nur Muhammad Irfan, Razak, Tajul Rosli, Jamaluddin, Muhammad Nabil Fikri, Ismail, Mohammad HafizSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2019
Get fulltext
View Fulltext in UiTM IR
Article -
13Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
14Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
15
-
16
-
17
-
18
-
19by Kamarudin, Nur Khairani, Md Hasani, Nur Nazifa, Ruslan, Rafiza, Ramle, Rashidah, Ahmad Zukri, Nurul Hidayah, Abd Halim, Iman HazwamSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2018
Get fulltext
View Fulltext in UiTM IR
Article -
20Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article