Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
201by Nasim, Ahmed“..., Port Scan Attack and Smurf Attack Detection. The approach is to develop software which performs port...”
Get full text
Get full text
Thesis -
202by Mohamedali Abdalla, Ahmed Abdalla“...The growth of the Internet and networking has made securing networks against attacks a very...”
Published 2015
Get full text
Thesis -
203by Khalid Hassan, Mohamed Edris“...This thesis addresses the issue of image watermarking robustness against attacks and especially...”
Published 2016
Get full text
Thesis -
204
-
205
-
206by Khavidaki, Seyyed Mojtaba Dashti“...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...”
Published 2013
Get full text
Thesis -
207by Ibrahim, Mohammed“... of people’s lives. However, most IoT devices are vulnerable to botnet attacks. To defend these devices...”
Published 2021
Get full text
Thesis -
208by Mohamed, Ashara Banu“..., one of the main issues that still remains since its beginning is the huge amount of attack alerts...”
Published 2015
Get full text
Thesis -
209by Ali Mohamed, Nachaat Abdelatif“... organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent...”
Published 2022
Get full text
Thesis -
210by Yunanto, Sri“...This thesis attempts to analyze the involvement of militant Islamist groups in terror attacks...”
Published 2013
Get full text
Thesis -
211by Farrokhtala, Ali“... principles but still there is not any approved standard in this field. Black hole attack as one of the most...”
Published 2013
Get full text
Thesis -
212by Omar @ Othman, Wan Zariman“...Algebraic attacks on stream cipher are important in cryptanalysis to both design- ers...”
Published 2019
Get full text
Thesis -
213by Daud, Ali Yusny“...) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form...”
Published 2002
Get full text
Thesis -
214by Hydara, Isatou“... of an application. The presence of XSS vulnerabilities in applications source codes enables XSS attacks to take...”
Published 2015
Get full text
Thesis -
215by Asmawi, Aziah“... become increasingly vulnerable to malicious attacks that could affect essential properties...”
Published 2016
Get full text
Thesis -
216
-
217by Abdulbari Ali, Sherif“.... Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds...”
Published 2005
Get full text
Thesis -
218by Mat Isa, Mohd Anuar“... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...”
Published 2018
Get full text
Thesis -
219by Hamdi, Ayman Majid“... important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey attacks...”
Published 2019
Get full text
Thesis -
220by Al-Rimy, Bander Ali Saleh“.... Even after neutralizing such attacks, the targeted files remain encrypted. This irreversible effect...”
Published 2019
Get full text
Thesis