Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
181by Elrowayati, Ali Abdulhafid“... and/or unintentional attacks, such as recompression attack, lossy channel attacks, signal processing attacks, frame...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
182by Mandala, Satria“...Mobile Adhoc Network (MANET) is vulnerable to network attacks due toits open communication medium...”
Published 2012
Get full text
Thesis -
183by Mat Nor, Fazli“... client-side application vulnerabilities as well as privacy threats. Attackers could exploit...”
Published 2016
Get full text
Thesis -
184by Abdulkader, Zaid A.“... if it undergoes attack. To do this, it must use alternative mechanisms while making sure that it does not affect...”
Published 2018
Get full text
Thesis -
185by Rezaeipour, Davood“... ciphers. It cannot be analyzed by known cryptanalytic attacks. We study AES specifications and also...”
Published 2011
Get full text
Thesis -
186by Chizoba, Okwara Jerry“... of the malicious attacks given serious attention as they have shown some level of complexities thereby causing...”
Published 2019
Get full text
Thesis -
187by Qasem, Murad Abdo Rassam“..., generally can not detect novel attacks. A method that offers a promise to solve this problem is the anomaly...”
Published 2010
Get full text
Thesis -
188by Abu Bakar, Nurul Badriah“... and unintentional attacks but the various available techniques for watermarking have yet to attain the best defence...”
Published 2013
Get full text
Thesis -
189A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarakby Mubarak, Mohd Faizal“... of RFID system with other devices introduce security vulnerabilities which could be exploited by attackers...”
Published 2015
Get full text
Thesis -
190by Mohamed Yassin, Warusia“... researchers, the low attack detection rates (also known as the detection of true positive) that reflect...”
Published 2015
Get full text
Thesis -
191by Malekzadeh, Mina“.... The lack of protection on management frames causes an intruder to launch different types of attack...”
Published 2007
Get full text
Thesis -
192by Sharabyan, Mohammad Tahghighi“... domain. The GC, like other matrix cryptosystems, cannot resist against chosen-plaintext attack...”
Published 2015
Get full text
Thesis -
193by Wan Mohd Ruzai, Wan Nur Aqlili“... cryptanalysis (or often called ‘attack’) against RSA and its variants are not based on this integer...”
Published 2021
Get full text
Thesis -
194by Ahmad Khalid, Shamsul Kamal“...In today’s world, designer of a watermarking system had to constantly faced with determined attacks...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
195by Mohammed Al-Aghbari, Anas Mustafa“... the attacks. Physical security is the most important because it is the first layer in security. In Yemen...”
Published 2013
Get full text
Thesis -
196by Mohd Izwan Zulaini, Abdul Gani“... until 2017 in response to the recovery of the animal populations. Since 1900, crocodile attacks had...”
Published 2019
Get full text
Get full text
Thesis -
197by Adenan, Nurul Nur Hanisah“... to enhance its security. In this thesis, we present three analytical attacks on the modulus N = p 2q...”
Published 2021
Get full text
Thesis -
198by Dashti Khavidaki, Seyyed Mojtaba“...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...”
Published 2013
Get full text
Thesis -
199by Yasir, Javed“...). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle...”
Published 2020
Get full text
Thesis -
200by Al Noman Ranak, Md Sayfullah“... considerable number of attacks have been noted in the recent past. To resist these attacks, many passwords...”
Published 2018
Get full text
Thesis