Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
161by Mustafa, Ahmed Sudad“... when a route is requested. However, AODV suffers severely from the black hole attacks where...”
Published 2017
Get full text
Thesis -
162by Thabet Albatol, Mohammed Samer Hasan“... of data or files, the third party which called the attackers try to get an illegal access the data without...”
Published 2021
Get full text
Get full text
Get full text
Thesis -
163by Memari, Nogol“.../identified/reported vulnerabilities. In case of zero day attacks, things may go unidentified for quite a long...”
Published 2014
Get full text
Thesis -
164by Uwadiegwu, Inyama Victor“... there is inadequate security mechanism which an intruder or a man in the middle (MITM) attack can capture...”
Published 2019
Get full text
Thesis -
165
-
166by Mohammed Ismael, Saba“.... There is no possibility of an attacker breaking the cipher, as the scheme showed perfect confusion and diffusion...”
Published 2018
Get full text
Thesis -
167by Munther, Munther Numan“... and attackers can easily exploit the inherent security limitation of ARP working principle to penetrate...”
Published 2018
Get full text
Thesis -
168by Mohamed, Kamsiah“... cipher relies on substitution and permutation function to protect the cipher against any attacks...”
Published 2022
Get full text
Thesis -
169by Hasheminejad, Hamidreza“..., computer worms and viruses in the cyberworld. In order to prevent these attacks, technologies...”
Published 2015
Get full text
Thesis -
170by Saleh, Mohammed Abbas Alameen“... is considered not reliable anymore because of its data that can be tampered with by an attacker after conducting...”
Published 2009
Get full text
Thesis -
171by Ali, Siti Hajar Aminah“...) attack. Let say, Company X is selling flowers via online in which the market is from the local...”
Published 2015
Get full text
Thesis -
172by Abdullah, Raihana Syahirah“...Botnets is a tool for high-profile cyber-attack. It is a collection of compromised computer...”
Published 2016
Get full text
Get full text
Thesis -
173by Wong, Tze Jin“.... In this research, numerous mathematical attacks will be analyzed with the cryptosystem and compared with RSA. LUC...”
Published 2011
Get full text
Thesis -
174by Safiee, Mohd. Fauzan“...An Intrusion Detection System (IDS) is detects and blocks unwanted attacks to the civilian...”
Published 2007
Get full text
Thesis -
175by Alzubaidi, Mohammed Abdullah Omar“... that cloud computing has. Nevertheless, many researchers have suggested methods to mitigate those attacks...”
Published 2015
Get full text
Thesis -
176by Abd Ghafar, Amir Hamzah“... of the cryptosystem. Most cryptanalysis or commonly called ‘attacks’ upon RSA focuses on solving the IFP in feasible...”
Published 2020
Get full text
Thesis -
177by Abd Ghafar, Amir Hamzah“...This study has two main parts. The first part discusses side-channel attack on the AAb cryptosystem...”
Published 2015
Get full text
Thesis -
178by Mandangan, Arif“... cryptosystem was successfully attacked by the passive adversary attack. This attack is manipulating...”
Published 2011
Get full text
Thesis -
179by Hussien, Al-Abadi Hassan Mansur“... forms of attacks especially in relatedkey model attacks. These days, the most common block cipher...”
Published 2017
Get full text
Thesis -
180