
Topic
- Computing and Processing
- Components, Circuits, Devices and Systems
- Communication, Networking and Broadcast Technologies
- Power, Energy and Industry Applications
- Signal Processing and Analysis
- Robotics and Control Systems
- General Topics for Engineers
- Fields, Waves and Electromagnetics
- Engineered Materials, Dielectrics and Plasmas
- Bioengineering
- Transportation
- Photonics and Electrooptics
- Engineering Profession
- Aerospace
- Geoscience
- Nuclear Engineering
- Career Development
- Emerging Technologies
- Telecommunications
- English for Technical Professionals
Ainuddin Wahid Abdul Wahab
Also published under:Ainuddin W. Abdul Wahab
Affiliation
Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
Topic
Network Devices,Virtual Machines,Agglomerative Clustering,Aggregate Value,Authentication Mechanism,Block Size,Bloom Filter,Boolean Variable,Cloud Computing,Cloud Network,Computational Resources,Control Plane,Control Platform,Control Update,Data Center,Decision Value,Denial Of Service,Digital Images,Distributed Denial Of Service,Distribution Network,Duplicated Regions,Edition Software,Entire Network,Entire Value,Equivalency,False Positive Rate,Flow Rule,Flow Table,Forensic Investigations,Forgery Detection,Graph Generation,Hash Function,Hessian Matrix,High Computational Resources,Host Network,Huge Amount Of Data,Illumination Changes,Image Forgery,Image Forgery Detection,Image Regions,Image Segmentation,Incomplete Sets,Information System,Input Image,Intrusion Detection System,JPEG Compression,Large Networks,Linear Equation,Load Balancing,Local Host,
Biography
Ainuddin Wahid Abdul Wahab received the B.Comp.Sc. and M.Comp.Sc. degrees from the University of Malaya, Malaysia, and the Ph.D. degree from Surrey University, U.K. He is currently a Senior Lecturer and a Deputy Dean of the Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya. His current research interests include digital forensics, information security, network security, and sensor network.