-
1by Jafar, Ibraheem“... little attention to data quality issue. Meanwhile, the more the data quality, the more accurate...”
Published 2017
Get full text
Thesis -
2
-
3by Kordi, Elahe Fazeldeh“... MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best...”
Published 2014
Get full text
Thesis -
4
-
5
-
6
-
7by Mohd. Miswan, Siti Hidayah“... focuses on the development of a model for the attitude elements which is one of the components...”
Published 2014
Get full text
Thesis -
8
-
9by Mahmood, Azmi“... atau kejuruteraan. Tesis ini membincangkan suatu penyelidikan yang melibatkan penjanaan aturcara...”
Published 1992
Thesis -
10by Abadi, Ahad Akbar“... even more attractive as a service. Without Virtualization cloud computing cannot achieve to its...”
Published 2013
Get full text
Thesis -
11by Dolatabadi, Zahra Sadat Shams“... to propose a method that can offer high resistance against some image distortions in the geometrical attack...”
Published 2013
Get full text
Thesis -
12by Boroujerdizadeh, Ali“.... We narrow down the project to a specific attack. Collusion attack is the main problem for video...”
Published 2013
Get full text
Thesis -
13by Bojnord, Hoda Soltanian“.... VANET security is essential because a badly designed VANET is vulnerable to network attacks...”
Published 2013
Get full text
Thesis -
14
-
15by Araghi, Tanya Koohpayeh“... important issue for developing mobile ad hoc networks (MANETs). They expose to various kinds of attacks...”
Published 2013
Get full text
Thesis -
16
-
17by Ardestani, Parichehr Manouchehri“... have attracted a great deal of attention over the years. The wormhole attack can affect the performance...”
Published 2013
Get full text
Thesis -
18by Farahmandian, Sara“... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...”
Published 2013
Get full text
Thesis -
19by Hosseini, Seyed Mostafa Mir“... is going to explore integrity attacks in RFID systems. Even though the previous related works have...”
Published 2013
Get full text
Thesis -
20by Nagalingam, Vanisri“... online banking to online meeting. There are many types of online attacks and one of the famous online...”
Published 2014
Thesis