Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
241by Al-Zarqawee, Aws Naser“...Distributed denial-of-service (DDoS) attacks are incidents in a cloud computing environment...”
Published 2018
Get full text
Thesis -
242by Emami, Mir Shahriar“... that current digital image watermarking approaches are prone to be impacted by watermarking attacks which...”
Published 2012
Get full text
Thesis -
243
-
244by Abdullah, Halimah Tun“...Digital watermarking is used to protect the intellectual property from malicious attack...”
Published 2014
Get full text
Thesis -
245by Yahaya, Zulkifli“... between the two airfoils. The effects of Reynolds numbers, angles of attack, and airfoil profiles...”
Published 2005
Get full text
Thesis -
246by Bahrim, Ahmad A’limmuddin“...A form of security issue called cross-site scripting (XSS) enables attackers to insert malicious...”
Published 2023
Get full text
Thesis -
247by Parveen, Sajida“... threats, one of them is spoofing attacks. A spoofing attack occurs when a person tries to masquerade...”
Published 2016
Get full text
Thesis -
248by Bakhdlaghi, Yousef Abdullah“... the discovery of large-scale and coordinated attacks. Although existing CIDN offers consultation capability...”
Published 2020
Get full text
Thesis -
249by Dak, Ahmad Yusri“... to being vulnerable to jamming attacks. A study found that eighty one percent of attacks occurs...”
Published 2019
Get full text
Thesis -
250by Soleymani, Seyed Ahmad“... patterns of attacks such as simple attack, opinion tampering attack, and cunning attack. In conclusion...”
Published 2019
Get full text
Thesis -
251by Haratian, Mohammad Hossein“... number of efforts have concentrated on handling the vast variety of security attacks. The characteristic...”
Published 2009
Get full text
Thesis -
252by Mohammad Khamees Khaleel, Alsajri“... that can achieve consistent results when employed for the detection of multiple attack types. Hence...”
Published 2022
Get full text
Thesis -
253by Yaribakht, Amir Hesam“... that can be robust against common image processing attacks such as JPEG compression, rotation, sharpening...”
Published 2020
Get full text
Thesis -
254
-
255by Pang, Kok An“... against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading...”
Published 2021
Get full text
Get full text
Thesis -
256
-
257by Behnia, Armaghan“... period of validity it may compromise through brute force attacks or dictionary attacks. In order to come...”
Published 2013
Get full text
Thesis -
258by Mustafa, Intan Shafinaz“...) open to the potential attacks during transmission. Recipients required a mechanism which can prove...”
Published 2006
Get full text
Thesis -
259by Dhahir, Saif Mahmood“..., dynamic, infrastructure-less and self-organizing, MANETs are vulnerable to several kinds of attacks...”
Published 2017
Get full text
Thesis -
260by Noorlaily Izwana Ibrahim“... to the users. The term “malvertising” comes from the word malware and advertising. It is one type of attack...”
Published 2012
Get full text
Thesis