Showing
1 - 3
results of
3
for search '
Cusack, B
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Cusack, B
Showing
1 - 3
results of
3
for search '
Cusack, B
'
, query time: 0.15s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Using Design Science to build a Watermark System for Righful Ownership Protection in the Cloud
by
Cusack
,
B
,
Khaleghparast, R
Published 2017
Call Number:
Loading...
Located:
Loading...
Get fulltext
Others
2
Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
by
Cusack
,
B
,
Kyaw, A
,
Tian, Z
Published 2018
Call Number:
Loading...
Located:
Loading...
Get fulltext
Others
3
Detecting Slow DDos Attacks on Mobile Devices
by
Cusack
,
B
,
Lutui, R
,
Khaleghparast, R
Published 2019
Call Number:
Loading...
Located:
Loading...
Get fulltext
Others
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Attack origins; DoS; DDoS; TTL; Traceback; IoT security
Ownership; Cloud; Watermarks; Security; Design
Slow DDoS; Detection; Mobile Devices; Metrics
Loading...