Artificial intelligence for plate recognition and security protected by cyber attacks
Artificial Intelligence (AI) plays a pivotal role in modern security systems, particularly in providing automated license plate recognition (ALPR). This technology has been widely utilized for tasks such as traffic oversight, access management, and law enforcement. However, despite these advancement...
| Main Author: | Sukor, Ahmad Suzairy |
|---|---|
| Format: | Dissertation |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2026
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/190848 |
| Abstract | Abstract here |
Similar Items
Developing an effective message framing framework in mitigating quishing threats
by: Heng, Pang Cheok
Published: (2026)
by: Heng, Pang Cheok
Published: (2026)
Cyber security capability maturity model for critical information infrastructure for Nigerian Airforce Institute of Technology using C2M2 model
by: Ubaliyo, Usman Abdullahi
Published: (2026)
by: Ubaliyo, Usman Abdullahi
Published: (2026)
Designing code of practices on privacy protection based on personal information protection law (PIPL) for China Universities
by: Fei, Wang Yu
Published: (2026)
by: Fei, Wang Yu
Published: (2026)
Victim profiling in investment fraud based on bigbird-LSTM- CRF named entity recognition
by: Zikri, Muhammad Faris Ezany
Published: (2026)
by: Zikri, Muhammad Faris Ezany
Published: (2026)
Metric-based email phishing attack penetration testing (MPT) framework
by: Yixin, Zhang
Published: (2026)
by: Yixin, Zhang
Published: (2026)
Assessing cybersecurity awareness levels in social commerce scams using the theory of planned behavior model
by: Han, Ho Xiao
Published: (2026)
by: Han, Ho Xiao
Published: (2026)
A hybrid model for enhanced IDN homograph attack detection in mixed-domains
by: Tumusiime, Anthony
Published: (2026)
by: Tumusiime, Anthony
Published: (2026)
Conceptual-based standard operating procedure for video preservation in digital forensics investigation
by: Tian, Chia Tong
Published: (2026)
by: Tian, Chia Tong
Published: (2026)
Preliminary screening of fluorescent fingerprint powder for latent fingerprint visualisation at different intervals in a shaded ambient environment in Skudai
by: Jebur Al-Ghuri, Firas Hamzah
Published: (2026)
by: Jebur Al-Ghuri, Firas Hamzah
Published: (2026)
Anomaly detection using rule-based model for fraud prevention in public sector payroll division
by: Mohidin, Mohd Nor
Published: (2026)
by: Mohidin, Mohd Nor
Published: (2026)
Design and scalability performance evaluation of permissioned blockchain architecture for online voting system
by: Oon, Wong Chee
Published: (2026)
by: Oon, Wong Chee
Published: (2026)
Anomaly network intrusion detection model based on hybrid CNN-LSTM and attention mechanism
by: Tingyue, Wang
Published: (2026)
by: Tingyue, Wang
Published: (2026)
Digital forensic framework on antitrust investigation for Malaysia competition commission (MYCC)
by: Abdul Rahman, Mohamad Ridzuan
Published: (2026)
by: Abdul Rahman, Mohamad Ridzuan
Published: (2026)
Citizen-government social media engagement model in Indonesia
by: Ari Wedhasmara
Published: (2026)
by: Ari Wedhasmara
Published: (2026)
Fusion of enhanced text-based and word embedding features for hate speech and offensive language multichannel deep learning classification
by: Abdul Aziz, Noor Azeera
Published: (2026)
by: Abdul Aziz, Noor Azeera
Published: (2026)
Video-based abusive behaviour detection and classification using upper body features
by: Saba, Baloch
Published: (2026)
by: Saba, Baloch
Published: (2026)
Text classification on South China Sea conflicts using Support Vector Machine (SVM) and K-Nearest Neighbors (KNN)
by: Ismail, Nurul Nadhirah
Published: (2026)
by: Ismail, Nurul Nadhirah
Published: (2026)
A model of social media user engagement towards political leaders in Malaysia
by: Sapar, Norman
Published: (2026)
by: Sapar, Norman
Published: (2026)
A comparative analysis of data privacy among whatsapp, signal and telegram
by: Sumbe, Joseph Elia
Published: (2026)
by: Sumbe, Joseph Elia
Published: (2026)
Guidelines on data governance and security in remote work environments for independent Filipino remote workers in the Philippines
by: Rose, Nicolas Christine
Published: (2026)
by: Rose, Nicolas Christine
Published: (2026)
Enhanced phishing website detection using an ensemble- based extreme gradient boosting stacking model
by: Babagana, Umar
Published: (2026)
by: Babagana, Umar
Published: (2026)
Legal and administrative framework to regulate Malaysian strata lease scheme
by: Zainal, Nur Huzaifah
Published: (2026)
by: Zainal, Nur Huzaifah
Published: (2026)
Enhancing weibo security through the application of deep learning techniques in detecting fake images
by: Yating, He
Published: (2026)
by: Yating, He
Published: (2026)
Identity exposure optimization algorithm based on anonymization and homomorphic encryption in privacy preservation
by: Abdul Samad, Adlina
Published: (2026)
by: Abdul Samad, Adlina
Published: (2026)
Proposing amendments to the electronic Commerce Act 2006 to countermeasure against online fraud in Malaysia
by: Shum, Chen Yau
Published: (2026)
by: Shum, Chen Yau
Published: (2026)
The Influence of Emotional Intelligence and Organisational Commitment on Turnover Intention among Workers in Ponderosa Golf & Country Club, Johor Bahru
by: Chandran, Sarmillah
Published: (2026)
by: Chandran, Sarmillah
Published: (2026)
Relationship between servant leadership, public service motivation, and organizational commitment on organizational citizenship behavior among public servant in Batam
by: Pajri, Endar Heryan
Published: (2026)
by: Pajri, Endar Heryan
Published: (2026)
Learning-based entropy method for malicious file detection with test suite generation
by: Zainodin, Muhammad Edzuan
Published: (2026)
by: Zainodin, Muhammad Edzuan
Published: (2026)
Multimodal QR code phishing detection using multi-head attention and multilingual embeddings
by: Ibrahim Khalifa, Omar Yasser
Published: (2026)
by: Ibrahim Khalifa, Omar Yasser
Published: (2026)
A comparative analysis of machine learning and deep learning transformer models for effective cyberbullying detection in the Malay language on social media platform X
by: Bachan Singh, Savinder Singh
Published: (2026)
by: Bachan Singh, Savinder Singh
Published: (2026)
Efficiency and effectiveness land tax administration model
by: Sahari, Siti Norfaizah
Published: (2026)
by: Sahari, Siti Norfaizah
Published: (2026)
Critical success factors structural model for government asset management
by: Ismail, Norazli
Published: (2026)
by: Ismail, Norazli
Published: (2026)
Design and evaluation of a hybrid cryptographic protocol for quantum-resilient data protection
by: Udayagiri, Revathi
Published: (2026)
by: Udayagiri, Revathi
Published: (2026)
Organizational individualism, corporate violation and reputation risk among the Chinese a-share listed firms
by: Bin, Wang
Published: (2026)
by: Bin, Wang
Published: (2026)
Rangka kerja penyertaan awam dalam penguatkuasaan pemindahan bahan batuan di Negeri Sembilan
by: Mohd Yusof, Mohd Hafiz
Published: (2026)
by: Mohd Yusof, Mohd Hafiz
Published: (2026)
The impact of corporate voluntary disclosure and financial leverage on the relationship between corporate governance practices and shareholders value
by: Hamzah M, Barnawi Maher
Published: (2026)
by: Hamzah M, Barnawi Maher
Published: (2026)
Gabungan peruntukan kanun tanah negara bagi penyelesaian pemilikan lot lidi dari perspektif pentadbiran tanah
by: Ismail, Norliana
Published: (2026)
by: Ismail, Norliana
Published: (2026)
Users' perceptions of holy public spaces in the holy city of Makkah
by: Nabhan, Yahya Muhammed
Published: (2026)
by: Nabhan, Yahya Muhammed
Published: (2026)
Mechanisms for settling internal armed conflicts under international law and islamic law in Libya
by: Mansur Almontaser, Rami Almontaser
Published: (2026)
by: Mansur Almontaser, Rami Almontaser
Published: (2026)
Building an administrative legal mechanism to reduce violence in football stadium in accordance with the islamic values of the UAE society
by: Alkindi, Fahad Saeed Rashid Ahmed
Published: (2026)
by: Alkindi, Fahad Saeed Rashid Ahmed
Published: (2026)
Similar Items
-
Developing an effective message framing framework in mitigating quishing threats
by: Heng, Pang Cheok
Published: (2026) -
Cyber security capability maturity model for critical information infrastructure for Nigerian Airforce Institute of Technology using C2M2 model
by: Ubaliyo, Usman Abdullahi
Published: (2026) -
Designing code of practices on privacy protection based on personal information protection law (PIPL) for China Universities
by: Fei, Wang Yu
Published: (2026) -
Victim profiling in investment fraud based on bigbird-LSTM- CRF named entity recognition
by: Zikri, Muhammad Faris Ezany
Published: (2026) -
Metric-based email phishing attack penetration testing (MPT) framework
by: Yixin, Zhang
Published: (2026)
