Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
221by Juliza, Mohamad Arif“.... The openness of the Android mobile devices is extremely vulnerable to malware attacks. Even though various...”
Published 2022
Get full text
Thesis -
222by Baharudin, Muhammad Saufi“.... By using massive attack of zombie, the attackers launch a distribution denial of services (ddos) against...”
Published 2009
Get full text
Thesis -
223by Gaithuru, Juliet Nyokabi“... ways of attacking the algorithms used for encryption. This process of continued improvement...”
Published 2013
Get full text
Thesis -
224by Kalybayev, Almukhammed“... years, potentially leading to a loss of cash. The methods which are utilized by attackers to collect...”
Published 2013
Get full text
Thesis -
225by Mokaramian, Shahram“...2R classes, which include malicious attacks. Therefore, it requires a resampling technique...”
Published 2013
Get full text
Thesis -
226by Kamarudin, Nazhatul Hafizah“... threatened by security attacks. It is noted that the use of username and password as an authentication scheme...”
Published 2018
Get full text
Thesis -
227by Yaakub, Mohd Fauzi“...The issue of high angle of attacks at the retreating blade receives attention from countless...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
228
-
229by Omotunde, Habeeb Oladapo“...As SQL injection attack (SQLIA) continues to threaten web applications despite several techniques...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
230by Eid, Almazrooie Mishal“...Asymmetric and symmetric cryptography are believed to be secure against any attack using classical...”
Published 2018
Get full text
Thesis -
231by Hina, Aliyu Danladi“... against fast correlation attack, one of the major attacks known to weaken nonlinear combiner...”
Published 2019
Get full text
Thesis -
232by Buja, Alya Geogiana“... of block ciphers against side-channel cube attack and differential fault analysis.Thirdly,all proposed...”
Published 2018
Get full text
Get full text
Thesis -
233by Juremi, Julia“... cryptographic attacks. Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all...”
Published 2018
Get full text
Thesis -
234by Teh, Jia Yew“... to malicious, undesirable effects such as buffer overflows, privilege escalation (spawning an attackers’ shell...”
Published 2017
Get full text
Thesis -
235by Ali, Mohammed Hasan“... of false positive alerts, low detection rates of rare but dangerous attacks, and the need for a constant...”
Published 2019
Get full text
Thesis -
236by Al-Zarqawee, Aws Naser“...Distributed denial-of-service (DDoS) attacks are incidents in a cloud computing environment...”
Published 2018
Get full text
Thesis -
237by Emami, Mir Shahriar“... that current digital image watermarking approaches are prone to be impacted by watermarking attacks which...”
Published 2012
Get full text
Thesis -
238
-
239by Abdullah, Halimah Tun“...Digital watermarking is used to protect the intellectual property from malicious attack...”
Published 2014
Get full text
Thesis -
240by Yahaya, Zulkifli“... between the two airfoils. The effects of Reynolds numbers, angles of attack, and airfoil profiles...”
Published 2005
Get full text
Thesis