Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
101by Kordi, Elahe Fazeldeh“... MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best...”
Published 2014
Get full text
Thesis -
102by Abdul Razak, Aina Nabila“... to be protected from any attacks. The malware detection process becomes a challenge because the attacker has a new...”
Published 2019
Get full text
Thesis -
103by Ismail, Sushilawati“... in coal ash brick on the density, water absorption and salt attack resistance. Comparison of those...”
Published 2014
Get full text
Thesis -
104by Said, Mohamed Abdisalan“... had shown that the watermark is robust to geometric attacks and removal attacks. DCT and DWT...”
Published 2015
Get full text
Get full text
Get full text
Thesis -
105by Ahmed Marwan, Idrees Aleesa“...The news about distributed denial of service (DDoS) attacks is rapidly increased around the world...”
Published 2021
Get full text
Get full text
Get full text
Thesis -
106by Enshaei, Mehdi“... to attacks due to the open, cooperative and dynamic nature and needs a new method for secure communication...”
Published 2015
Get full text
Thesis -
107by Che Hasan, Hafizah“.... However, NFC is susceptible to some attacks such as data fabrication and eavesdropping. Thus, the mobile...”
Published 2018
Get full text
Thesis -
108by Malekzadeh, Mina“.... The main threats against availability of the networks are Denial of Service (DoS) and replay attacks...”
Published 2011
Get full text
Thesis -
109
-
110by Mohamad Alias, Mohd Azuan“...Port knocking is technique first introduce in the Black Hat to prevent attackers from discovering...”
Published 2012
Get full text
Thesis -
111by Ahmad Tarmizi Lim, Siti Naquiah“... password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without...”
Published 2016
Get full text
Thesis -
112by Aladaileh, Mohammad Adnan Ahmad“... technology is not free from new security concerns. The Distributed Denial of Service (DDoS) attack is one...”
Published 2021
Get full text
Thesis -
113by Dolatabadi, Zahra Sadat Shams“... to propose a method that can offer high resistance against some image distortions in the geometrical attack...”
Published 2013
Get full text
Thesis -
114by Araghi, Tanya Koohpayeh“... important issue for developing mobile ad hoc networks (MANETs). They expose to various kinds of attacks...”
Published 2013
Get full text
Thesis -
115by Ashouruan, Bahram Yaghoubzadeh“..., it is compromised in face to various sorts of attacks. Unfortunately, none of the presented secured routing...”
Published 2013
Get full text
Thesis -
116by Mohd Foozy, Cik Feresa“... the framework for a single attack detection for Spam has been studied. Phishing has never been studied. Existing...”
Published 2017
Get full text
Get full text
Thesis -
117by C. Arjuman, Navaneethan“... flaw within RD protocol has led to Fake RA attacks. Studies shows that the standard RD protocol...”
Published 2021
Get full text
Thesis -
118by Ibrahim Al-Ani, Ahmed Khallel“... aims to prevent a DoS attack during the DAD process by designing a rule-based mechanism. The proposed...”
Published 2020
Get full text
Thesis -
119
-
120by Ahmed Khalaf, Bashar“...) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety...”
Published 2019
Get full text
Get full text
Get full text
Thesis