-
1by Abdallah Elhigazi, Abdallah Elhigazi“... medium, WLANs are vulnerable to a myriad of attacks. Although there have been concerted efforts...”
Published 2020
Get full text
Thesis -
2by Mohammed Alhaj, Tagwa Ahmed“...Attack Scenario Construction (ASC) via Alert Correlation (AC) is important to reveal the strategy...”
Published 2018
Get full text
Thesis -
3by Al-Rimy, Bander Ali Saleh“.... Even after neutralizing such attacks, the targeted files remain encrypted. This irreversible effect...”
Published 2019
Get full text
Thesis -
4by Al-Khasawneh, Mahmoud Ahmad Salem“... images requires the generation of intricate secret keys that protect the images from diverse attacks...”
Published 2018
Get full text
Thesis -
5by Ibrahim, Nurudeen Mahmud“... the issue of poor detection accuracy due to insignificant features and coordinated attacks...”
Published 2019
Get full text
Thesis -
6by Abdul Rauf, Abdul Rauf“... of users as well as cloud resources from inside and outside attacks....”
Published 2019
Get full text
Thesis -
7by Safaei, Mahmood“... factors such as noise, weak received signal strength or intrusion attacks. The process of detecting highly...”
Published 2019
Get full text
Thesis -
8by Taha, Mustafa Sabah“... against the statistical, X2 , Histogram and non-structural steganalysis detection attacks. The obtained...”
Published 2020
Get full text
Thesis -
9by Abrahim, Araz Rajab“... the impact of blurring shallow depth, homogenous area, and noise attacks to improve the accuracy. Therefore...”
Published 2019
Get full text
Thesis