Search

Your search keyword '"Rossilawati Sulaiman"' showing total 50 results

Search Constraints

Start Over You searched for: Author "Rossilawati Sulaiman" Remove constraint Author: "Rossilawati Sulaiman"
50 results on '"Rossilawati Sulaiman"'

Search Results

1. An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things

2. Social Engineering Attacks Prevention: A Systematic Literature Review

3. Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications

4. A Review on Text Steganography Techniques

5. A Conceptual and Systematics for Intelligent Power Management System-Based Cloud Computing: Prospects, and Challenges

11. VARIANTS OF NEURAL NETWORKS: A REVIEW

13. Optimized leaky ReLU for handwritten Arabic character recognition using convolution neural networks

21. Machine Learning-Based Technique to Detect SQL Injection Attack

23. A Conceptual and Systematics for Intelligent Power Management System-Based Cloud Computing: Prospects, and Challenges

24. A Review of Modern DNA-based Steganography Approaches

25. High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm

26. Issues and Trends in Information Security Policy Compliance

27. JPEG image classification in digital forensic via DCT coefficient analysis

28. Instrumenting API Hooking for a Realtime Dynamic Analysis

29. Evaluation of Peer Robot Communications using CryptoROS

30. A Two-stage Malware Detection Architecture Inspired by Human Immune System

31. Enhancement of Text Steganography Technique Using Lempel-Ziv-Welch Algorithm and Two-Letter Word Technique

32. Implementation of AES algorithm in QGIS software

33. Information leakage preventive training

34. A Framework for a Multi-Layered Security of an Automated Programming Code Assessment Tool

35. DESIGN AND IMPLEMENTATION OF THE TPM USER AUTHENTICATION MODEL

36. A USER PROTECTION MODEL FOR THE TRUSTED COMPUTING ENVIRONMENT

37. Secure Architecture for m-Health Communications Using Multi-agent Approach

38. Enhancing Security in E-Health Communications using Multi-Agent System

39. A New Security Model using Multilayer Approach for E-Health Services

40. Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool

41. Following the Wi-Fi breadcrumbs: Network based mobile application privacy threats

42. E-health Services with Secure Mobile Agent

43. A Multi-agent Security Architecture

44. A Multi-agent Security Framework for e-Health Services

45. Security Architecture for Mobile Agent-based Shari’ah Compliant e-Auction Marketplace

46. Systematic Literature Review on Data Carving in Digital Forensic

47. Students’ Perception of Mobile Augmented Reality Applications in Learning Computer Organization

Catalog

Books, media, physical & digital resources