Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
181by Abarghouei, Babak Emami“.... An attacker can devour the sensor resources. No central monitoring system, lead to mobile sensor network...”
Published 2013
Get full text
Thesis -
182by Ahmad Zawawi, Md. Nabil“... the threats of an active attack by an active warden in which the robustness of the stegoobject is concerned...”
Published 2006
Get full text
Thesis -
183by Khalaf, Emad T“... as possible with high visible quality in a way that it does not allow any attacker to even detect...”
Published 2012
Get full text
Thesis -
184by Abdul Mubin, Norzul Masri“.... Mobile device are the main devices that can be manipulates by the attacker towards their victims...”
Published 2017
Get full text
Get full text
Thesis -
185by Hirzan, Alauddin Maulana“... to allow transmission. Attacker from IPv6 network can use this tunneling mechanism to send intrusion...”
Published 2017
Get full text
Get full text
Thesis -
186by Annane, Boubakeur“... time. The experiments show that the proposed approach achieved lower attacker’s efficiency and coverage...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
187by Zare Anari, Abbas Mehdizadeh“... to detect or prevent an attacker which tampers against data. In this thesis, focus is given on Mobile IPv6...”
Published 2008
Get full text
Thesis -
188
-
189by Mustafa, Ahmed Sudad“... when a route is requested. However, AODV suffers severely from the black hole attacks where...”
Published 2017
Get full text
Thesis -
190by Thabet Albatol, Mohammed Samer Hasan“... of data or files, the third party which called the attackers try to get an illegal access the data without...”
Published 2021
Get full text
Get full text
Get full text
Thesis -
191by Memari, Nogol“.../identified/reported vulnerabilities. In case of zero day attacks, things may go unidentified for quite a long...”
Published 2014
Get full text
Thesis -
192by Uwadiegwu, Inyama Victor“... there is inadequate security mechanism which an intruder or a man in the middle (MITM) attack can capture...”
Published 2019
Get full text
Thesis -
193
-
194by Mohammed Ismael, Saba“.... There is no possibility of an attacker breaking the cipher, as the scheme showed perfect confusion and diffusion...”
Published 2018
Get full text
Thesis -
195by Munther, Munther Numan“... and attackers can easily exploit the inherent security limitation of ARP working principle to penetrate...”
Published 2018
Get full text
Thesis -
196by Mohamed, Kamsiah“... cipher relies on substitution and permutation function to protect the cipher against any attacks...”
Published 2022
Get full text
Thesis -
197by Hasheminejad, Hamidreza“..., computer worms and viruses in the cyberworld. In order to prevent these attacks, technologies...”
Published 2015
Get full text
Thesis -
198by Saleh, Mohammed Abbas Alameen“... is considered not reliable anymore because of its data that can be tampered with by an attacker after conducting...”
Published 2009
Get full text
Thesis -
199by Ali, Siti Hajar Aminah“...) attack. Let say, Company X is selling flowers via online in which the market is from the local...”
Published 2015
Get full text
Thesis -
200by El Omari, Abdullah Abdelmonem M.“... and infrastructure from attacker internet firewall. The experts believe that Access Points (AP'S) present a large...”
Published 2007
Get full text
Thesis