Suggested Topics within your search.
Suggested Topics within your search.
Intrusion detection systems (Computer security). Computer network security. Hackers
9
Network security
7
Computer networks. General works. Traffic monitoring
5
Cryptography
4
Detectors. Sensors. Sensor networks
4
Security
4
Cloud computing
3
Digital storage
3
Electronic Computers. Computer Science
3
Encryption
3
Intrusion detection
3
IoT
3
Pattern recognition
3
Security of data
3
Adaptive routing
2
Authentication
2
BYOD
2
Big data
2
Computer networks. Electronic information resources . Including the Internet
2
Decision making
2
Distributed computer systems
2
Distributed systems
2
Electronic commerce
2
Entropy
2
Genetic algorithm
2
Information services. Information centers
2
Internet of things
2
Lightweight
2
Malaysia
2
Mobile computing
2
-
1by Abdullah M.H.R.O, Baba, M.D, Bashar N.A.M, Min Y.H, Nasir S.M.F.S.A, Rohmad, M.S, Yusoff, R.Subjects: “...4G Network...”
Published 2016
View Fulltext in Publisher
View in Scopus
Article -
2
-
3
-
4
-
5
-
6Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
7Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
8by Kamarudin, Nur Khairani, Bismi, Nur Syafiqa, Ahmad Zukri, Nurul Hidayah, Mohd Fuzi, Mohd Faris, Ramle, RashidahSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2020
Get fulltext
View Fulltext in UiTM IR
Article -
9by Abd Halim, Iman Hazwam, Abu Hassan, Nur Muhammad Irfan, Razak, Tajul Rosli, Jamaluddin, Muhammad Nabil Fikri, Ismail, Mohammad HafizSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2019
Get fulltext
View Fulltext in UiTM IR
Article -
10Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
11
-
12
-
13by Hashim, Muhamad Arif, Abd Halim, Iman Hazwam, Ismail, Mohammad Hafiz, Mohd Noor, Norfaizalfarid, Mohd Fuzi, Mohd Faris, Mohammed, Abdul Hapes, JM. Gining, Ray AdderleySubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2017
Get fulltext
View Fulltext in UiTM IR
Article -
14by Osman, Mohd Nizam, Sedek, Khairul Anwar, Othman, Nor Arzami, Rosli, Muhammad Afiqhakimi, Maghribi, MushahadahSubjects: “...Local area networks (Computer networks)...”
Published 2021
Get fulltext
View Fulltext in UiTM IR
Article -
15by Kamarudin, Nur Khairani, Md Hasani, Nur Nazifa, Ruslan, Rafiza, Ramle, Rashidah, Ahmad Zukri, Nurul Hidayah, Abd Halim, Iman HazwamSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2018
Get fulltext
View Fulltext in UiTM IR
Article -
16Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
17
-
18
-
19Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
20by Adnan, L., Hamzah, A.H, Hamzah, M.M.A.M, Hashim, H., Isa, M.A.M, Mahmod, R., Manan, J.-L.A, Mazalan, L., Othman, H., Rohmad, M.SSubjects: “...Secure system...”
Published 2012
View Fulltext in Publisher
View in Scopus
Article