Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Kamaruddin Malik Mohammad"'
Publikováno v:
2019 2nd International Conference on Applied Information Technology and Innovation (ICAITI).
Security of a system is a factor that needs to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct due to any system damage. Various techniques used for hacking such as Att
Publikováno v:
2018 International Conference on Sustainable Information Engineering and Technology (SIET).
Data Packages containing malware can perform attacks on network protocols such as SMTP, TCP, UDP, POP, HTTP protocols. One way to detect attacks is to install the Intrusion Detection System. IDS can be installed either on the Host's side of the Netwo