[PDF][PDF] Establishing a soldier wireless sensor network (WSN) communication for military operation monitoring
The study investigates and develops components for implementing an effective and efficient
military knowledge/information/communication in closed network architecture. Since military …
military knowledge/information/communication in closed network architecture. Since military …
Establishing mesh network amongst infantry personnel during military operations: A preliminary study
AKA Ghani, MN Ismail, Z Omar… - … on Information and …, 2016 - ieeexplore.ieee.org
This paper describes a preliminary study for proposing a viable mesh network
communication for knowledge sharing platform. This network structure is to support military …
communication for knowledge sharing platform. This network structure is to support military …
[PDF][PDF] Security Model to Control on Social Media using Visualization and Forensic Approach
KL Besi - academia.edu
Nowadays, alternative media especially social media has played an important role in
influencing people on any issues. If there is no controls on social media contents such as …
influencing people on any issues. If there is no controls on social media contents such as …
[PDF][PDF] A New Approach in Securing Cloud Network from Malware Attack
KL Besi - academia.edu
Malware includes network viruses, worms, Trojan horses, rootkits, spyware, adware,
malicious BHOs, rogue security software and other malicious programs. Malware infections …
malicious BHOs, rogue security software and other malicious programs. Malware infections …
[引用][C] A New Approach in Securing Cloud Network from Malware Attack
MNB Ismail, MABM Shukran… - Advances in …, 2015 - Advanced Institutes of Convergence …
[引用][C] Security Model to Control on Social Media using Visualization and Forensic Approach
MNB Ismail, MABM Shukran… - Advances in …, 2015 - Advanced Institutes of Convergence …