Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
41by Ridha, Hussein Ali“... communication from malicious attacks. The data is enabled to be received by the recipients. The data is delayed...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
42by Ibrahim, Husam Hamid“... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
43by Lau, Wei Khang“... applied to digital files to withstand against cropping and resizing attack. In this Dual-watermarking...”
Published 2016
Get full text
Get full text
Get full text
Thesis -
44by Mohd Salleh, Nurhashikin“... uses the Internet as their platform to form online communities and launch their attack...”
Published 2018
Get full text
Get full text
Thesis -
45
-
46
-
47
-
48
-
49
-
50by Izaddoost, Alireza“... to its intended users. The Denial of Service (DoS) attacks are becoming more serious in security...”
Published 2008
Get full text
Thesis -
51by Ghobadifar, Faranak“... in the fields. The main purpose of this research was to determinate pest attack in paddy field using remote...”
Published 2015
Get full text
Thesis -
52by Ahmed, Dana Hasan“... Reflection Denial of Service (DRDoS) attacks which are called Reflection/Amplification and hassles...”
Published 2017
Get full text
Thesis -
53by Javan, Ali“... threats including coordinated distributed attacks have flourished against the vital services and priceless...”
Published 2011
Get full text
Thesis -
54by Hussein, Noor Sabeeh“... kinds of attacks like denial of service attacks, sybil attacks, jamming attacks, black/sink hole attacks...”
Published 2016
Get full text
Thesis -
55
-
56by Kuhanraj, Balan“... serious network threats such as denial of service attack, data modification attack, impersonation attack...”
Published 2020
Get full text
Thesis -
57
-
58by Muamer N., Mohammed“... for researches and this connection is prone to vulnerability caused by the attackers in steeling information from...”
Published 2011
Get full text
Thesis -
59by Abadi, Ahad Akbar“... issues still the considerable difficulties for customers. This means the attacks which can threat...”
Published 2013
Get full text
Thesis -
60by Boroujerdizadeh, Ali“.... We narrow down the project to a specific attack. Collusion attack is the main problem for video...”
Published 2013
Get full text
Thesis