Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
21
-
22
-
23
-
24
-
25
-
26
-
27
-
28by Lau, Wei Khang“... applied to digital files to withstand against cropping and resizing attack. In this Dual-watennarking...”
Published 2016
Get full text
Get full text
Get full text
Thesis -
29by Chai, Jee Sing“.... Generally, the schemes in spatial domain are usually less robust to attacks; while the schemes in frequency...”
Published 2008
Get full text
Thesis -
30by Abdollah, Mohd Faizal“... transaction. They have also become the main mean to attack host. The popularity of intrusion tools and script...”
Published 2009
Get full text
Get full text
Thesis -
31
-
32by Azali, Muhamad Rizal“...This project is using a honeypot as a tool to detect internal network attack at Faculty...”
Published 2005
Get full text
Thesis -
33by Roslan, Fairuzan“... of the greatest problems the security community faces is lack of information on the attacker. This is one...”
Published 2004
Get full text
Thesis -
34by Hasan, Dahah Ahmed Haidarah“... threats is phishing attacks launched for the purpose of stealing certain sensitive information of victims...”
Published 2019
Get full text
Thesis -
35by Modirkhazeni, Ali“... of conventional techniques of attack and the attacks that are not desirable because of limited resources is a...”
Published 2011
Get full text
Thesis -
36by Ardestani, Parichehr Manouchehri“... and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which...”
Published 2013
Get full text
Thesis -
37by Elejla, Omar E. O.“... in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have...”
Published 2018
Get full text
Thesis -
38by Omar, Mohd Nizam“... to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation...”
Published 2011
Get full text
Thesis -
39by Jantan, Mohd. Faidzal“.... Far from that, Algebraic Attacks and Fast Algebraic Attack has become popular among cryptographers...”
Published 2010
Get full text
Thesis -
40by Ibrahim, Husam Hamid“... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...”
Published 2018
Get full text
Get full text
Get full text
Thesis