Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
81
-
82
-
83
-
84
-
85by Mustafa, Mohd Nawawi“... security incidents is failure to determine the root cause of an incident, thus allowing the attacker...”
Published 2015
Get full text
Thesis -
86by Nordin, Norfarina“...The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has...”
Published 2020
Get full text
Thesis -
87by Abdallah Elhigazi, Abdallah Elhigazi“... medium, WLANs are vulnerable to a myriad of attacks. Although there have been concerted efforts...”
Published 2020
Get full text
Thesis -
88by Mohd Fauzi, Shukor Sanim“... of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems...”
Published 2003
Get full text
Thesis -
89by Farahmandian, Sara“... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...”
Published 2013
Get full text
Thesis -
90by Mohammed Ahmed Saad, Redhwan“..., in which ICMP can be blocked or dropped. ICMPv6 opens the door for attackers to attack IPv6 networks...”
Published 2016
Get full text
Thesis -
91by Salih Ali, Nabeel“... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...”
Published 2015
Get full text
Get full text
Thesis -
92
-
93
-
94
-
95by Shaukat, Haafizah Rameeza“... them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks...”
Published 2014
Get full text
Thesis -
96by Md Ilyas, Siti Sarah“...The number of phishing attacks involving online banking has records an increase percentage over...”
Published 2017
Get full text
Thesis -
97by Mohamad Fauzi, Noor Shafiqa Fazlien“... of attackers which publicly embarrasses the victim by sharing some personal information of the victim...”
Published 2020
Get full text
Thesis -
98by Mohammed Alhaj, Tagwa Ahmed“...Attack Scenario Construction (ASC) via Alert Correlation (AC) is important to reveal the strategy...”
Published 2018
Get full text
Thesis -
99by Hussein, Safwan Mawlood“...The vast amount of attacks over the Internet makes the computer users and many organizations under...”
Published 2012
Get full text
Thesis -
100