Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
Conventional security surveillance systems require the constant attention of security personnel, to monitor several locations concurrently. With the declining cost of computing power and widespread acceptance of the Internet as a viable communication medium, a low-cost and effective web-based survei...
| Main Author: | Syed Nor Azlan, Syarifah Ezdiani |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/427/1/1600465.pdf |
Similar Items
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Robust position encoding and velocity deduction for real time water level monitoring
by: Alsayed, Abdallah S.Z.
Published: (2015)
by: Alsayed, Abdallah S.Z.
Published: (2015)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
by: Ali, Khalid Abdullahi
Published: (2017)
by: Ali, Khalid Abdullahi
Published: (2017)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
by: Yusuf, Yusmardiah
Published: (2017)
by: Yusuf, Yusmardiah
Published: (2017)
A case study on network performance analysis in Jabatan Agama Islam Selangor (JAIS) / Norkhairulbariah Omar
by: Omar, Norkhairulbariah
Published: (2006)
by: Omar, Norkhairulbariah
Published: (2006)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Internet of things (IoT) device for web based monitoring of gas leakage / Mohd Aliff Mahdzir
by: Mahdzir, Mohd Aliff
Published: (2020)
by: Mahdzir, Mohd Aliff
Published: (2020)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Web-Based Remote Monitoring And Controlling System Using Embedded Web Server
by: Shafie@Musa, Siti Mariam
Published: (2002)
by: Shafie@Musa, Siti Mariam
Published: (2002)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Internet of things (IoT) device for web based river’s velocity monitoring / Mohd Radzuan Othman
by: Othman, Mohd Radzuan
Published: (2020)
by: Othman, Mohd Radzuan
Published: (2020)
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
by: Al-Kharasani, Ameen Mohammed Abdulkarem
Published: (2019)
by: Al-Kharasani, Ameen Mohammed Abdulkarem
Published: (2019)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
by: Ng, Roger Cheng Yong
Published: (2006)
by: Ng, Roger Cheng Yong
Published: (2006)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Risk assessment equation for IPv6 network / Athirah Rosli
by: Rosli, Athirah
Published: (2017)
by: Rosli, Athirah
Published: (2017)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
A Structural Health Monitoring (SHM) of composite patch repair for aircraft part and structures using principal component analysis
by: Mohd Aris, Khairul Dahri
Published: (2015)
by: Mohd Aris, Khairul Dahri
Published: (2015)
Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques
by: Muhadi, Nur 'Atirah
Published: (2022)
by: Muhadi, Nur 'Atirah
Published: (2022)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Effect of silver (Ag) and antimony (Sb) substitution on Ba-site of porous structured YBA2CU306 superconductor / Fariesha Farha Ramli
by: Ramli, Fariesha Farha
Published: (2011)
by: Ramli, Fariesha Farha
Published: (2011)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
Similar Items
-
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999) -
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998) -
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019) -
Robust position encoding and velocity deduction for real time water level monitoring
by: Alsayed, Abdallah S.Z.
Published: (2015) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)