Zobrazeno 1 - 10
of 115
pro vyhledávání: '"SHAHRIN, S."'
Autor:
Khalid, M., Shuaib, N. A., Haidiezul, A. H. M., Dolah, M. S., Shahrin, S., Mehat, N. M., Morsidi, M.
Publikováno v:
AIP Conference Proceedings; 2024, Vol. 2934 Issue 1, p1-8, 8p
Publikováno v:
Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN 2151-9617
The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain t
Externí odkaz:
http://arxiv.org/abs/1006.4569
Publikováno v:
International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 1-9, January 2010, USA
The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the atta
Externí odkaz:
http://arxiv.org/abs/1002.1678
Publikováno v:
Journal of Computing, Vol. 2, Issue 1, January 2010
The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack
Externí odkaz:
http://arxiv.org/abs/1001.3477
Publikováno v:
Robiah Y, Siti Rahayu S., Mohd Zaki M, Shahrin S., Faizal M. A., Marliza R., International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 56-61, September 2009, USA
Malware is a type of malicious program that replicate from host machine and propagate through network. It has been considered as one type of computer attack and intrusion that can do a variety of malicious activity on a computer. This paper addresses
Externí odkaz:
http://arxiv.org/abs/0909.4860
Publikováno v:
IJCSIS Vol.2, No.1, June 2009
Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important
Externí odkaz:
http://arxiv.org/abs/0906.3843
Autor:
ABDUL JALIL N. A., AHMAD F., SANKAR D., HASNOL M. F., AZAHARI N. A., SYED SHAHRIN S. A., WONG Z.
Publikováno v:
Medicine & Health (Universiti Kebangsaan Malaysia); Mar2024, Vol. 19 Issue 1, p25-39, 15p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Dhaka Medical College. Oct2017, Vol. 26 Issue 2, p173-177. 5p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.