-
1by Halil F.M.; Azman M.A.; Sekak S.N.A.A.; Nasir N.M.; Romeli N.S.“… of the prepared pretender estimate. Furthermore, the application of Monte Carlo (MC) simulation, using probability…”
Published in Planning Malaysia (2024)
Get full text
Article -
2by Ismail N.N.S.; Warip M.N.M.; Elias S.J.; Ahmad R.B.“…. Generally, session hijacking is the attack occurs to impersonate the real resource to serve the pretended…”
Published in International Journal of Engineering and Technology(UAE) (2018)
Get full text
Article