Host based instrusion detection system for android platform
Also available in printed version : TK5105.59 G46 2013 raf
| Main Author: | Masoud Ghorbanian |
|---|---|
| Other Authors: | Bharanidharan Shanmugam, supervisor |
| Format: | Master's thesis |
| Published: |
Universiti Teknologi Malaysia
2025
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/103213 |
| Abstract | Abstract here |
Similar Items
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
by: Luqmanulhakim Mohd Nasir
Published: (2024)
by: Luqmanulhakim Mohd Nasir
Published: (2024)
Intrusion detection system using hybird gsa-k-means
by: Bibi Masoomeh Aslahi Shahri
Published: (2025)
by: Bibi Masoomeh Aslahi Shahri
Published: (2025)
A comparison study of particale swarm optimizzation and differential evolution for feature selection intrusion detection system
by: Mohamud Sheikh Ali Hussein
Published: (2025)
by: Mohamud Sheikh Ali Hussein
Published: (2025)
Packet-level intrusion detection
by: Rami Hussen Mohammed Altilib
Published: (2025)
by: Rami Hussen Mohammed Altilib
Published: (2025)
Web log cleaning algorithm for intrusion detection
by: Ong Yew Chuan
Published: (2025)
by: Ong Yew Chuan
Published: (2025)
An intrusion detection system (IDS) for internet network (Full text)
Published: (2025)
Published: (2025)
Hybrid of structural-causal and statistical model for intrusion alert correlation
by: Maheyzah Md. Sirat @ Md. Siraj
Published: (2025)
by: Maheyzah Md. Sirat @ Md. Siraj
Published: (2025)
Feature selection using swarm intelligent for attacks in Ad Hoc on-demand distance vercto
by: Lee, Chun How
Published: (2025)
by: Lee, Chun How
Published: (2025)
Pembangunan aplikasi telefon pintar untuk platform android (Muslim Mother Care)
by: Aisyah Abdul Aziz
Published: (2025)
by: Aisyah Abdul Aziz
Published: (2025)
Pembangunan aplikasi cepat membaca al-Quran untuk platform android (Mai IQra)
by: Yanti Munirah Jusoh
Published: (2025)
by: Yanti Munirah Jusoh
Published: (2025)
Data verification method for Malaysia brand android device : an enhancement for mobile phone forensic guideline
by: Nik Nurul Izzah Harun
Published: (2025)
by: Nik Nurul Izzah Harun
Published: (2025)
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
by: Suhaimi, Hamizan
Published: (2021)
by: Suhaimi, Hamizan
Published: (2021)
DeDePro Wireless Intruder Detection System (WIDS) against de-authentication/ disassociation attacks in 802.11 A/B/G/N / Norzaidi Baharudin
by: Baharudin, Norzaidi
Published: (2014)
by: Baharudin, Norzaidi
Published: (2014)
Detecting applications with excessive privileges and applications vulnerable to privilege escalation attack in android
by: Iman Kashefi
Published: (2025)
by: Iman Kashefi
Published: (2025)
Comparative study of artificial neural network and fuzzy unordered rule indiction algorithm in intrusion detection system
by: Tam, Kun Leong
Published: (2025)
by: Tam, Kun Leong
Published: (2025)
New framework for securing mobile adhoc network using lightweight authentication and signature-based intrusion detection system
by: Satria Mandala
Published: (2025)
by: Satria Mandala
Published: (2025)
Guideline to investigate data leakage by image capture using android mobile phone
by: Mohd. Hazuwan Ab. Wahab
Published: (2025)
by: Mohd. Hazuwan Ab. Wahab
Published: (2025)
Case study on web ICT security incidents in government sector: guideline of log file analysis / Mohd Azrai Manap
by: Manap, Mohd Azrai
Published: (2012)
by: Manap, Mohd Azrai
Published: (2012)
Investigating cultural influences to privacy: case of Malaysia's computer professionals' self-regulatory efficacy concerning information privacy practices / Emely Shazwan Abdul Wahid
by: Abdul Wahid, Emely Shazwan
Published: (2013)
by: Abdul Wahid, Emely Shazwan
Published: (2013)
Comparison between intrusion detection system tools with j48 and naive bayes classification
by: Mohd. Fairuz Shahadan
Published: (2025)
by: Mohd. Fairuz Shahadan
Published: (2025)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
by: Ahmad Tarmizi Lim, Siti Naquiah
Published: (2016)
by: Ahmad Tarmizi Lim, Siti Naquiah
Published: (2016)
Research study on communication overhead between mobile phone and server in the network with security and without security / Hazie Amira Mohd Ghazali
by: Mohd Ghazali, Hazie Amira
Published: (2016)
by: Mohd Ghazali, Hazie Amira
Published: (2016)
Criminal profiling on android phone forensic
by: Vigneswaran Vaithishparan
Published: (2025)
by: Vigneswaran Vaithishparan
Published: (2025)
Criminal profiling on android phone forensic
by: Vigneswaran Vaithishparan
Published: (2025)
by: Vigneswaran Vaithishparan
Published: (2025)
Network security risk assessment based on fuzzy logic approach / Nurulhidayah Abdul Latif
by: Abdul Latif, Nurulhidayah
Published: (2012)
by: Abdul Latif, Nurulhidayah
Published: (2012)
Intrusion identification system using domain name service
by: Mohamad Rais, Faisal
Published: (2008)
by: Mohamad Rais, Faisal
Published: (2008)
Development of an Android Application Based on Quranic Exegesis Related to Fasting and Fidyah
by: Nur Afiyah binti Mahmud Fathi
Published: (2024)
by: Nur Afiyah binti Mahmud Fathi
Published: (2024)
An architectural design for hybrid intrusion detection system for database
Published: (2025)
Published: (2025)
The development of trusted NetFlow packet capturing system / Ahmad Fuad Mat Som
by: Mat Som, Ahmad Fuad
Published: (2009)
by: Mat Som, Ahmad Fuad
Published: (2009)
IPv6 tunneling through multiple layers of NATs using XTeredo / Noor Jeehan Amat Jamji
by: Amat Jamji, Noor Jeehan
Published: (2009)
by: Amat Jamji, Noor Jeehan
Published: (2009)
User's view on information security in government sector / Siti Asmah Ibrahim
by: Ibrahim, Siti Asmah
Published: (2015)
by: Ibrahim, Siti Asmah
Published: (2015)
Development of advisory fault detection and diagnosis system using knowledge based and artificial neural network (Full text)
Published: (2025)
Published: (2025)
Automatic coronary artery detection in cardiogram image (Full text)
Published: (2025)
Published: (2025)
Designing a new model to detect Trojan Horse based on knowledge discovery and data mining
by: Areej Mustafa Khlaif Abuzaid
Published: (2024)
by: Areej Mustafa Khlaif Abuzaid
Published: (2024)
Spam detection with genetic optimized artificial immune system
by: Alireza Mehrsina
Published: (2025)
by: Alireza Mehrsina
Published: (2025)
Office and shopping mall wireless security system
by: Lai, Chin Hui
Published: (2025)
by: Lai, Chin Hui
Published: (2025)
Electronic security device (ESD) alert system
by: Khuzaimah Mohd. Ali
Published: (2025)
by: Khuzaimah Mohd. Ali
Published: (2025)
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
by: Intan Nurfarahin Binti Ahmad
Published: (2024)
by: Intan Nurfarahin Binti Ahmad
Published: (2024)
Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebook
by: Ahmad Syahrul Anuar Saidi
Published: (2025)
by: Ahmad Syahrul Anuar Saidi
Published: (2025)
Similar Items
-
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
by: Luqmanulhakim Mohd Nasir
Published: (2024) -
Intrusion detection system using hybird gsa-k-means
by: Bibi Masoomeh Aslahi Shahri
Published: (2025) -
A comparison study of particale swarm optimizzation and differential evolution for feature selection intrusion detection system
by: Mohamud Sheikh Ali Hussein
Published: (2025) -
Packet-level intrusion detection
by: Rami Hussen Mohammed Altilib
Published: (2025) -
Web log cleaning algorithm for intrusion detection
by: Ong Yew Chuan
Published: (2025)