-
41by Arab, Farnaz“... metadata of pixels to ensure achievable efficiency to detect more attacks. All these required additional...”
Published 2014
Get full text
Thesis -
42by Fatani, Tariq Abdulaziz D.“... of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices...”
Published 2013
Get full text
Thesis -
43by Krishnan, Ashvini Devi“.... Security specification languages can be used to represent security specification such as attack...”
Published 2013
Thesis -
44by Dabiranzohouri, Miranda“... on their computers. The expressiveness of the PDF format, furthermore, enables attackers to evade detection...”
Published 2014
Thesis -
45Investigating the influencing factors and attitude towards online banking using biometric technologyby Abdulqawi, Ala Abdulrahman“... customer information. Malware attacks, phishing fraudsters and other types of attacks have become well...”
Published 2013
Get full text
Thesis -
46by Hussein, Mohamud Sheikh Ali“... to the increasing attacks even in such a new ways of attacks for that reason improving intrusion detection system...”
Published 2014
Thesis -
47A new colour image steganography using LSB approach with halftoning determination embedding positionby Hassan, Reband Jamil“...-square attack. In this study, a new colour image steganography technique is proposed using the LSB...”
Published 2014
Thesis -
48by Josiah, Kekere Temitope“... malicious attacks. Intrusion detection serves as a second line of defense apart from firewall...”
Published 2015
Get full text
Thesis -
49Improved watermarking scheme based on best color channel selection using discrete slantlet transformby Adnan, Myasar Mundher“... attacks. In this thesis, The RGB colour image watermarking is proposed using by Discrete Slantlet...”
Published 2013
Get full text
Thesis -
50Colour image watermarking using discrete cosine transform and two-level singular value decompositionby Ali, Bokan Omar“.... It is predominantly used for copyright protection against copyright infringement and malicious attacks. Embedding a...”
Published 2013
Get full text
Thesis -
51by Abunada, Ahmed A. A.“... to detect novel attacks and produces high false alarm. Besides, data labeling is expensive and time...”
Published 2013
Get full text
Thesis -
52by Majid, Gelareh“... image, is one of the frequently used techniques. Adding different type of attack such as noise...”
Published 2014
Thesis -
53by Aslahi, Bibi Masoomeh“... on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve...”
Published 2013
Get full text
Thesis -
54by Khiabani, Hamed“... works showed that the accuracy of the model improved from 2% to 41.3% during an oscillating attack...”
Published 2013
Get full text
Thesis -
55by Nasser, Alzahrani Jalal“... types of attacks is applied on watermarked image namely, Gaussian noise, Salt & Pepper Noise, Poisson...”
Published 2013
Thesis -
56by Aslahi Shahri, Bibi Masoomeh“... on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve...”
Published 2013
Get full text
Thesis -
57by Kadhim, Karrar Abdul Ameer“..., six types of attacks are applied on watermarked image namely, Gaussian noise, Salt & Pepper Noise...”
Published 2013
Get full text
Thesis -
58by Soltanmohammadi, Saeed“... records. Accessing HIS data through the internet make it more vulnerable to data lost, misuses and attacks...”
Published 2013
Get full text
Thesis -
59by Mohammed Shaamala, Abduljabbar Hasan“... sure the embedding watermark is undetectable by the human eye, robust against common attack...”
Published 2014
Get full text
Thesis -
60by Shoukat, Ijaz Ali“... (significant than existing). Moreover, mathematical testing shows that common security attacks...”
Published 2016
Get full text
Thesis