Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Raihana Syahirah Abdullah"'
Publikováno v:
Karbala International Journal of Modern Science. 8:313-329
Autor:
Sharifah Sakinah Syad Ahmed, Siti Rohanah Hasan Basri, Zaid. J. Al-Araji, Raihana Syahirah Abdullah, Hayder Adil Abdul Raheem, Ammar Awad Mutlag
Publikováno v:
Network Security. 2021:13-19
An attack graph (AG) is an abstraction that represents the paths by which an attacker could break a security policy, leveraging interdependencies among discovered vulnerabilities. However, current AG implementations are inefficient on large-scale net
Publikováno v:
International Journal of Engineering and Advanced Technology. 9:534-542
Information exchange is a key aspect of using technology in everyday life. Crimes associated with the lack of information security awareness (ISA), misuse and carelessness are on the increase and often result in heavy losses and serious consequences.
Publikováno v:
International Journal of Cyber-Security and Digital Forensics. 8:15-22
Autor:
Muhammad Safwan Rosli, Raihana Syahirah Abdullah, Faizal M.A, Wan Nur Fatihah Wan Mohd Zaki, Warusia Yassin
Publikováno v:
International Journal of Advanced Computer Science and Applications. 12
Internet of things (IoT) is the things or devices with software, intelligent sensors interconnected via the internet to send and receive data with another device. This capacity makes things, i.e., smartphones, smart homes, intelligent toys, baby moni
Publikováno v:
International Journal of Advanced Computer Science and Applications. 12
With the increase in using computer networking, the security risk has also increased. To protect the network from attacks, attack graph has been used to analyze the vulnerabilies of the network. However, properly securing networks requires quantifyin
Autor:
Muhammad Safwan Rosli, Faizal M.A, Raihana Syahirah Abdullah, Wan Nur Fatihah Wan Mohd Zaki, Warusia Yassin
Publikováno v:
International Journal of Advanced Computer Science and Applications. 11
Ransomware has becoming a current trend of cyberattack where its reputation among malware that cause a massive amount recovery in terms of cost and time for ransomware victims. Previous studies and solutions have showed that when it comes to malware
Publikováno v:
International Journal of Computer Network and Information Security. 10:9-17
Autor:
Raihana Syahirah Abdullah, Farah Adeliena Bakhari, Mohd Faizal Abdollah, Zaki Mas'ud, Warusia Yassin
Publikováno v:
ICIT
Malware attacks are widespread in an era of growing technology by targeting most computing resources. Plenty of the technology nowadays is based on digital data exchange and it leads to the Internet of Things (IoT) development. A massive growth of Io
Publikováno v:
Research Journal of Information Technology. 6:135-153