Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
61by Hosseini, Seyed Mostafa Mir“... is going to explore integrity attacks in RFID systems. Even though the previous related works have...”
Published 2013
Get full text
Thesis -
62by Kashefi, Iman“... for attackers. Among the leaders in the world of smartphones, Android is a novel platform with rapidly growing...”
Published 2013
Get full text
Thesis -
63Representations of Muslims in the coverage of the Charlie Hebdo attack in selected U.S. news media /by Dayana NayanGet full text
Published 2017
Thesis Book -
64
-
65by Ghaben, Ayman Ibrahim Ali“...This thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed...”
Published 2023
Get full text
Thesis -
66by Rastegari, Samaneh“.... In order to prevent this system from different types of attacks, we need to prepare a classification...”
Published 2009
Get full text
Thesis -
67by Mohd Ariffin, Noor Afiza“... data against all types of attacks. Furthermore, most current research only focuses on improving...”
Published 2017
Get full text
Thesis -
68by Harun, Zati Bayani“... (DDoS) attack which is jamming attack. Almost 81% of jamming attacks are initiated at the MAC layer due...”
Published 2019
Get full text
Thesis -
69
-
70
-
71
-
72by Al-Saleem, Samer Abdulsada Mutlag“...The goal of the thesis is to propose an approach that can detect flash crowd attacks that target...”
Published 2017
Get full text
Thesis -
73by Suardi, Khairmen“... what causes the hydrogen attack and dealuminification. Control microstructure and phases through heat...”
Published 2005
Get full text
Thesis -
74by Rajabi, Muhammad Javad“... be invisible and robust to common processing and attack. So far, current research has succeeded in maintaining...”
Published 2018
Get full text
Thesis -
75by Bojnord, Hoda Soltanian“.... VANET security is essential because a badly designed VANET is vulnerable to network attacks...”
Published 2013
Get full text
Thesis -
76by Mosa, Mohammad Rasmi Hassun“... to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a...”
Published 2013
Get full text
Thesis -
77by Cheraghi, Seyed Mohammad“... malicious user may deliberately mislead other vehicles and vehicular agencies. Sybil attacks have been...”
Published 2013
Get full text
Thesis -
78by Ali, Mohammed Qasim“... to transmit information using IPv6 stack. Sensors perform critical tasks and become targets of attacks...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
79by Hassan, Abdullahi Mohamud“.... Currently the capability of repetition codes on various attacks in not sufficiently studied...”
Published 2015
Get full text
Get full text
Get full text
Thesis -
80