-
1by Al-Safwani, Nadher Mohammed Ahmed“... in an unfriendly environment. Wireless Ad Hoc network might be unprotected against attacks by malicious nodes...”
Published 2009
Get full text
Get full text
Thesis -
2by Al-Minshid, Khalid Abdulrazzaq Abdulnabi“.... In this dissertation, we consider the use of SSD concepts in the field of backdoor attack detection. The application...”
Published 2014
Get full text
Get full text
Thesis -
3by Manaa, Mehdi Ebady“... whether they are genuine requests for network services or DoS attacks. Results obtained demonstrate...”
Published 2012
Get full text
Get full text
Thesis -
4by Shakhatreh, Ala' Yaseen Ibrahim“...Securing the web against frequent cyber attacks is a big concern, attackers usually intend...”
Published 2010
Get full text
Get full text
Thesis -
5by Nor Izham, Subri“...The Distributed Denial of Services (DDoS) is an imminent attack that can threaten cyber security...”
Published 2017
Get full text
Get full text
Get full text
Thesis -
6by Khader, Aqeel Sahi“... advances in techniques used for attacks. One of the easiest and most serious of these attacks is the MS...”
Published 2010
Get full text
Get full text
Thesis -
7by Annane, Boubakeur“... time. The experiments show that the proposed approach achieved lower attacker’s efficiency and coverage...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
8by El Omari, Abdullah Abdelmonem M.“... and infrastructure from attacker internet firewall. The experts believe that Access Points (AP'S) present a large...”
Published 2007
Get full text
Thesis -
9by Yasear, Shaymah Akram“... and also resistant against possible attacks. However, the existing ultra-lightweight authentication...”
Published 2015
Get full text
Get full text
Thesis -
10
-
11by Mahdi, Reyadh H“... communications channels, and it use to avoid attack that happen on cryptography in general and on stream cipher...”
Published 2009
Get full text
Get full text
Thesis -
12by Irshad, Hira“.... The equity markets in Pakistan respond negatively to attacks on educational institutes and businesses whereas...”
Published 2020
Get full text
Get full text
Get full text
Get full text
Thesis -
13by Taqiyah Khadijah, Ghazali“... and privacy. Moreover, this also increases the probability of privacy leakage which lead to attacks...”
Published 2023
Get full text
Get full text
Thesis -
14by Siswanto, Apri“... assess the systems, fingerprints could be replicated and modified by attackers. Currently, most existing...”
Published 2022
Get full text
Get full text
Thesis -
15by Ghathwan, Khalil Ibrahim“...Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks...”
Published 2016
Get full text
Get full text
Thesis -
16by Revathy, Amadera Limgam“... found on Malaysian videos are political attack and racial attack. Other subcategories include name...”
Published 2019
Get full text
Get full text
Thesis -
17by Farhan, Farhan Abdel-Fattah Ahmad“... attacks. This research investigates the use of a promising technique from machine learning to designing...”
Published 2011
Get full text
Get full text
Thesis -
18by Eric, Karerangabo“...Today, computer networks attacks have continued to increase in severity and sophistication. Data...”
Published 2009
Get full text
Get full text
Thesis -
19by Abiodun, Bakare Mustapha“... wireless network from cyber terrorists attacks. The main objective of this research is to deploy...”
Published 2011
Get full text
Get full text
Thesis -
20by Oyekola, Ayoola Gabriel“... of the candidate's capacity cum propriety and positive reaction to policy implementation and projection. Attack...”
Published 2023
Get full text
Get full text
Thesis