Profiling and mitigating brute force attack in home wireless LAN
Hafiz, MohdYusof Mohammad, Ali, Fakariah Hani Mohd
Published in 2014 International Conference on Computational Science and Technology (ICCST) (01.08.2014)
Published in 2014 International Conference on Computational Science and Technology (ICCST) (01.08.2014)
Get full text
Conference Proceeding
Polymorphic Malware Detection
Selamat, Nur Syuhada, Mohd Ali, Fakariah Hani, Abu Othman, Noor Ashitah
Published in 2016 6th International Conference on IT Convergence and Security (ICITCS) (01.09.2016)
Published in 2016 6th International Conference on IT Convergence and Security (ICITCS) (01.09.2016)
Get full text
Conference Proceeding
Secured web application using combination of Query Tokenization and Adaptive Method in preventing SQL Injection Attacks
Abu Othman, Noor Ashitah, Ali, Fakariah Hani Mohd, Binti Mohd Noh, Mashyum
Published in 2014 International Conference on Computer, Communications, and Control Technology (I4CT) (01.09.2014)
Published in 2014 International Conference on Computer, Communications, and Control Technology (I4CT) (01.09.2014)
Get full text
Conference Proceeding
A Method for Web Application Vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm
Saleh, Ain Zubaidah Mohd, Rozali, Nur Amizah, Buja, Alya Geogiana, Jalil, Kamarularifin Abd, Ali, Fakariah Hani Mohd, Rahman, Teh Faradilla Abdul
Published in Procedia computer science (2015)
Published in Procedia computer science (2015)
Get full text
Journal Article
Rules and Results for SSL/TLS Nonintrusive Proxy Based on JSON Data
Jawi, Suhairi Mohd, Ali, Fakariah Hani Mohd
Published in 2016 6th International Conference on IT Convergence and Security (ICITCS) (01.09.2016)
Published in 2016 6th International Conference on IT Convergence and Security (ICITCS) (01.09.2016)
Get full text
Conference Proceeding
Non-intrusive SSL/TLS proxy implementation and issues
Jawi, Suhairi Mohd, Ali, Fakariah Hani Mohd
Published in 2015 IEEE Student Conference on Research and Development (SCOReD) (01.12.2015)
Published in 2015 IEEE Student Conference on Research and Development (SCOReD) (01.12.2015)
Get full text
Conference Proceeding
Directional Based Graphical Authentication Method with Shoulder Surfing Resistant
Othman, Noor Ashitah Abu, Rahman, Muhammad Akmal Abdul, Sani, Anis Shobirin Abdullah, Ali, Fakariah Hani Mohd
Published in 2018 IEEE Conference on Systems, Process and Control (ICSPC) (01.12.2018)
Published in 2018 IEEE Conference on Systems, Process and Control (ICSPC) (01.12.2018)
Get full text
Conference Proceeding
Notice of Removal: Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique
Ismail, Suzwani Binti, Ali, Fakariah Hani Mohd, Aljunid, Syed Ahmad
Published in 2016 6th International Conference on IT Convergence and Security (ICITCS) (01.09.2016)
Published in 2016 6th International Conference on IT Convergence and Security (ICITCS) (01.09.2016)
Get full text
Conference Proceeding
Study of S-box properties in block cipher
Mohamed, Kamsiah, Mohammed Pauzi, Mohd Nazran, Hj Mohd Ali, Fakariah Hani, Ariffin, Suriyani, Nik Zulkipli, Nurul Huda
Published in 2014 International Conference on Computer, Communications, and Control Technology (I4CT) (01.09.2014)
Published in 2014 International Conference on Computer, Communications, and Control Technology (I4CT) (01.09.2014)
Get full text
Conference Proceeding
Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11
Baharudin, Norzaidi, Ali, Fakariah Hani Mohd, Darus, Mohamad Yusof, Awang, Norkhushaini
Published in 2015 5th International Conference on IT Convergence and Security (ICITCS) (01.08.2015)
Published in 2015 5th International Conference on IT Convergence and Security (ICITCS) (01.08.2015)
Get full text
Conference Proceeding
Performance enhancement of wireless sensor network (WSN) with the implementation of Hybrid ARQ (HARQ) and Transmission Power Control (TPC)
Razali, Samirah Mohd, Mamat, Kamaruddin, Abdul-Basit, Kamarul, Ali, Fakariah Hani Mohd
Published in 2014 IEEE Conference on Wireless Sensors (ICWiSE) (01.10.2014)
Published in 2014 IEEE Conference on Wireless Sensors (ICWiSE) (01.10.2014)
Get full text
Conference Proceeding
Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacks
Hussein, S. M., Ali, F. H. M., Kasiran, Z.
Published in 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP) (01.05.2012)
Published in 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP) (01.05.2012)
Get full text
Conference Proceeding