Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
Conventional security surveillance systems require the constant attention of security personnel, to monitor several locations concurrently. With the declining cost of computing power and widespread acceptance of the Internet as a viable communication medium, a low-cost and effective web-based survei...
| Auteur principal: | Syed Nor Azlan, Syarifah Ezdiani |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2006
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/427/1/1600465.pdf |
Documents similaires
Development of Security Identification and Monitoring System for Web Application
par: Dani, Norizawati
Publié: (1999)
par: Dani, Norizawati
Publié: (1999)
Internet - Based Security and Monitoring System
par: Suliman, Isameldin Mohammed
Publié: (1998)
par: Suliman, Isameldin Mohammed
Publié: (1998)
Fake review annotation model and classification through reviewers' writing style
par: Shojaee, Somayeh
Publié: (2019)
par: Shojaee, Somayeh
Publié: (2019)
Robust position encoding and velocity deduction for real time water level monitoring
par: Alsayed, Abdallah S.Z.
Publié: (2015)
par: Alsayed, Abdallah S.Z.
Publié: (2015)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)
par: H. Belgassem, Seddeq
Publié: (2004)
Zero distortion-based steganography for handwritten signature
par: Iranmanesh, Vahab
Publié: (2018)
par: Iranmanesh, Vahab
Publié: (2018)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
par: Ali, Khalid Abdullahi
Publié: (2017)
par: Ali, Khalid Abdullahi
Publié: (2017)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014)
par: Memari, Nogol
Publié: (2014)
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
par: Yusuf, Yusmardiah
Publié: (2017)
par: Yusuf, Yusmardiah
Publié: (2017)
A case study on network performance analysis in Jabatan Agama Islam Selangor (JAIS) / Norkhairulbariah Omar
par: Omar, Norkhairulbariah
Publié: (2006)
par: Omar, Norkhairulbariah
Publié: (2006)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
par: Sultan Suhaibuddeen, Mohamed Sulaiman
Publié: (2010)
par: Sultan Suhaibuddeen, Mohamed Sulaiman
Publié: (2010)
An efficient anomaly intrusion detection method with evolutionary neural network
par: Sarvari, Samira
Publié: (2020)
par: Sarvari, Samira
Publié: (2020)
Internet of things (IoT) device for web based monitoring of gas leakage / Mohd Aliff Mahdzir
par: Mahdzir, Mohd Aliff
Publié: (2020)
par: Mahdzir, Mohd Aliff
Publié: (2020)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
par: Ismail, Haqi Khalid
Publié: (2021)
par: Ismail, Haqi Khalid
Publié: (2021)
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)
par: Nehzati, Seyedeh Sheida
Publié: (2016)
Web-Based Remote Monitoring And Controlling System Using Embedded Web Server
par: Shafie@Musa, Siti Mariam
Publié: (2002)
par: Shafie@Musa, Siti Mariam
Publié: (2002)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
par: Javan, Ali
Publié: (2011)
par: Javan, Ali
Publié: (2011)
Network security situation awareness based on indicators extracted
par: Xie, Zeqiang
Publié: (2016)
par: Xie, Zeqiang
Publié: (2016)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
par: Hadi, Ahmed Adnan
Publié: (2022)
par: Hadi, Ahmed Adnan
Publié: (2022)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
par: Abiodun, Balogun Kamoru
Publié: (2021)
par: Abiodun, Balogun Kamoru
Publié: (2021)
Internet of things (IoT) device for web based river’s velocity monitoring / Mohd Radzuan Othman
par: Othman, Mohd Radzuan
Publié: (2020)
par: Othman, Mohd Radzuan
Publié: (2020)
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
par: Al-Kharasani, Ameen Mohammed Abdulkarem
Publié: (2019)
par: Al-Kharasani, Ameen Mohammed Abdulkarem
Publié: (2019)
Performance analysis on detection and prevention of wormhole attack in wireless network
par: Apandi, Mohamad Aiman Hanif
Publié: (2019)
par: Apandi, Mohamad Aiman Hanif
Publié: (2019)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
par: Bakhdlaghi, Yousef Abdullah
Publié: (2020)
par: Bakhdlaghi, Yousef Abdullah
Publié: (2020)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
par: Ng, Roger Cheng Yong
Publié: (2006)
par: Ng, Roger Cheng Yong
Publié: (2006)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
par: Mohamed Yassin, Warusia
Publié: (2015)
par: Mohamed Yassin, Warusia
Publié: (2015)
Risk assessment equation for IPv6 network / Athirah Rosli
par: Rosli, Athirah
Publié: (2017)
par: Rosli, Athirah
Publié: (2017)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
A multi-factor authentication scheme using attack recognition and key generator technique
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
Features selection for intrusion detection system using hybridize PSO-SVM
par: Tabaan, Alaa Abdulrahman
Publié: (2016)
par: Tabaan, Alaa Abdulrahman
Publié: (2016)
A Structural Health Monitoring (SHM) of composite patch repair for aircraft part and structures using principal component analysis
par: Mohd Aris, Khairul Dahri
Publié: (2015)
par: Mohd Aris, Khairul Dahri
Publié: (2015)
Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques
par: Muhadi, Nur 'Atirah
Publié: (2022)
par: Muhadi, Nur 'Atirah
Publié: (2022)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
par: Hussein, Noor Sabeeh
Publié: (2016)
par: Hussein, Noor Sabeeh
Publié: (2016)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
par: Mustafa, Mohd Nawawi
Publié: (2015)
par: Mustafa, Mohd Nawawi
Publié: (2015)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
par: M. Abulkhirat, Esam
Publié: (2003)
par: M. Abulkhirat, Esam
Publié: (2003)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
par: Hydara, Isatou
Publié: (2015)
par: Hydara, Isatou
Publié: (2015)
Effect of silver (Ag) and antimony (Sb) substitution on Ba-site of porous structured YBA2CU306 superconductor / Fariesha Farha Ramli
par: Ramli, Fariesha Farha
Publié: (2011)
par: Ramli, Fariesha Farha
Publié: (2011)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
par: Abdulkader, Zaid A.
Publié: (2018)
par: Abdulkader, Zaid A.
Publié: (2018)
Documents similaires
-
Development of Security Identification and Monitoring System for Web Application
par: Dani, Norizawati
Publié: (1999) -
Internet - Based Security and Monitoring System
par: Suliman, Isameldin Mohammed
Publié: (1998) -
Fake review annotation model and classification through reviewers' writing style
par: Shojaee, Somayeh
Publié: (2019) -
Robust position encoding and velocity deduction for real time water level monitoring
par: Alsayed, Abdallah S.Z.
Publié: (2015) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)