Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Othman Mohd Yusop"'
Autor:
Abdul Ghafar Jaafar, Saiful Adli Ismail, Mohd Shahidan Abdullah, Nazri Kama, Azri Azmi, Othman Mohd Yusop
Publikováno v:
Sensors, Vol 20, Iss 14, p 3820 (2020)
Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect. The shortfall at the application layer allows formation of HTTP DDoS as the request headers are not compulsory to be attached in an HTTP request. Furthermo
Externí odkaz:
https://doaj.org/article/eb238614effa47fa80f0046b53767cb1
Autor:
Mohd Shahidan Abdullah, Othman Mohd Yusop, Saiful Adli Ismail, Abdul Ghafar Jaafar, Azri Azmi, Nazri Kama
Publikováno v:
Sensors
Volume 20
Issue 14
Sensors (Basel, Switzerland)
Sensors, Vol 20, Iss 3820, p 3820 (2020)
Volume 20
Issue 14
Sensors (Basel, Switzerland)
Sensors, Vol 20, Iss 3820, p 3820 (2020)
Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect. The shortfall at the application layer allows formation of HTTP DDoS as the request headers are not compulsory to be attached in an HTTP request. Furthermo
Autor:
Azri Azmi, Haslina Md Sarkan, Suhaimi Ibrahim, Saiful Adli Ismail, Kamilia Kamardin, Othman Mohd Yusop
Publikováno v:
Journal of Computer Science & Computational Mathematics. :91-97
Publikováno v:
Advanced Science Letters. 23:5522-5526
Recent researches have proposed data partitioning technique with secret sharing to enhance the security in cloud computing. However, its complexity in reconstructing while preserving confidentiality has a limitation of practical use, specifically whe
Autor:
Othman Mohd Yusop, Azizul Azizan, Suriani Mohd Sam, Azri Azmi, Nazri Kama, Faizura Haneem, Hafiza Abas
Publikováno v:
Advanced Science Letters. 23:5094-5097
The Master Data Management (MDM) empowers government agencies to consolidate and integrate multiple master data sources to a single source of truth. With MDM, the master data from different agencies that are valuable across agencies, applications and
Autor:
Amirul Nurshuhada, Romle Othman Mohd Yusop, Azri Azmi, Haslina Md Sarkan, Nazri Kama, Saiful Adli Ismail
Publikováno v:
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS).
The rapid growth of technology has boosted the usage of mobile devices to access a web application. These devices have various specifications such as screen sizes and resolutions. Responsive Web Design (RWD) approach bridges the gap of these differen
Autor:
Othman Mohd Yusop, Nur Farhana Binti Abdul Kadir, Mohd Nazri Kama, Haslina Md Sarkan, Azri Azmi
Publikováno v:
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS).
Software effort estimation (SEE) predicts the amount of effort needed to develop software and this information is important for a project manager to make good decisions when confronted with requirement change requests during the development. However,
Autor:
Mohd Nazri Kama, Poon Ai Phin, Othman Mohd Yusop, Nurfarahin Mohmad, Mohd Nizam Zakaria, Saiful Adli Ismail
Publikováno v:
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS).
Penetration testing or pen test is a simulated cyber-attack conducted to find the vulnerabilities and weaknesses in a computer system. The test is conducted by professionals hired by the organization that produces a report to the organization for fur
Publikováno v:
ICVISP
Customer churn is one of the main problems in telecommunication industry. This study aims to identify the factors that influence customer churn and develop an effective churn prediction model as well as provide best analysis of data visualization res
Autor:
Nurazean Maarop, Othman Mohd Yusop, Kavitha Thamadharan, Azri Azmi, Ganthan Narayana Samy, Norziha Megat Mohd. Zainuddin, Azizul Azizan
Publikováno v:
Advanced Science Letters. 22:3023-3026
Information Security Management System (ISMS) is an information security compliance standards implemented in organization to provide specifications and controls for protecting information assets and to increase the integrity and confidence of clients