Author:
Aziz Normaziah A.,Mantoro Teddy,Khairudin M. Aiman,Murshid A. Faiz b A.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A machine learning-based ensemble model for securing the IoT network;Cluster Computing;2024-05-12
2. Increase The SQLi Attack Success Rate using SqlMap with the use of Tamper Selection Scripts;2023 International Conference on Technology, Engineering, and Computing Applications (ICTECA);2023-12-20
3. Preventing Cyber Crime in Electronic Medical Records Using Encryption Data;2023 International Conference on Technology, Engineering, and Computing Applications (ICTECA);2023-12-20
4. An Exploratory Study Gathering Security Requirements for the Software Development Process;Electronics;2023-08-25
5. Detection of ARP Spoofing Attacks in Software Defined Networks;2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS);2023-02-09