Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
281by Mnati, Mustafa Nasser“..., but the problem of robustness and transparency from any attack is still becomes the main research issue...”
Published 2010
Get full text
Thesis -
282by Daud, Muhamad Azlan“... input. Alvarez through his one-time pad attack successfully attacked the Baptista cyptosystem. Ariffin...”
Published 2014
Get full text
Thesis -
283
-
284
-
285
-
286by Shojanazeri, Hamid“... as watermarks to provide malicious attack classification and locating tampered area. The Zernike moments...”
Published 2013
Get full text
Thesis -
287
Get full text
Get full text
Get full text
Thesis -
288by Anwar, Shahid“... coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service...”
Published 2019
Get full text
Thesis -
289by Mousavi, Seyed Mojtaba Khorzoughi“...-based methods, while in automated methods the robustness against intentional or unintentional attacks...”
Published 2015
Get full text
Thesis -
290by Ordi, Ali“... in preventing Denial of Service (DoS) attacks. A ‘Connection Request Flooding’ DoS (CRF-DoS) attack is launched...”
Published 2016
Get full text
Thesis -
291by Mohamad Fadli, Zolkipli“...-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a common...”
Published 2012
Get full text
Thesis -
292by Rosli, Athirah“.... The developed equation was validated via experimentation that involved testing the UDP flooding attack, TCP...”
Published 2017
Get full text
Thesis -
293by Mohamad Dahalan, Ardi Dasyni“...’ pictures symbolising the letter ‘S’ for singular verbs in ‘Snake Attack’ activity. For the purpose...”
Published 2013
Get full text
Thesis -
294by Alamjuri, Roziela Hanim“... is non-durable. It is susceptible to fungal and termite attacks. Hence, there is a need to treat bamboo...”
Published 2008
Get full text
Thesis -
295by Alezabi, Kamal Ali Ahmed“... of the existing authentication schemes are complex and vulnerable to network attacks such as User Identity...”
Published 2017
Get full text
Thesis -
296by Chong , Chuong Leong“... power at a rotational speed of 300rpm. Wind turbine is investigated as a function of angle of attack...”
Published 2011
Get full text
Thesis -
297by Siddiqui, Zeeshan“... for TMIS systems while addressing a number of authentication attacks along with performance issues. However...”
Published 2015
Get full text
Thesis -
298by Al-Khasawneh, Mahmoud Ahmad Salem“... images requires the generation of intricate secret keys that protect the images from diverse attacks...”
Published 2018
Get full text
Thesis -
299by Ibrahim, Ayman Khallel“... making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well...”
Published 2020
Get full text
Thesis -
300by Adeeb, Jnaidi Saed Maher“...Since the period followed the September 11 in 2001 attack, and the second Palestinian uprising...”
Published 2019
Get full text
Thesis