Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
221by Rezaeipour, Davood“... ciphers. It cannot be analyzed by known cryptanalytic attacks. We study AES specifications and also...”
Published 2011
Get full text
Thesis -
222by Chizoba, Okwara Jerry“... of the malicious attacks given serious attention as they have shown some level of complexities thereby causing...”
Published 2019
Get full text
Thesis -
223by Qasem, Murad Abdo Rassam“..., generally can not detect novel attacks. A method that offers a promise to solve this problem is the anomaly...”
Published 2010
Get full text
Thesis -
224by Abu Bakar, Nurul Badriah“... and unintentional attacks but the various available techniques for watermarking have yet to attain the best defence...”
Published 2013
Get full text
Thesis -
225by Nagalingam, Vanisri“... online banking to online meeting. There are many types of online attacks and one of the famous online...”
Published 2014
Thesis -
226A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarakby Mubarak, Mohd Faizal“... of RFID system with other devices introduce security vulnerabilities which could be exploited by attackers...”
Published 2015
Get full text
Thesis -
227by Mahdi, Reyadh H“... communications channels, and it use to avoid attack that happen on cryptography in general and on stream cipher...”
Published 2009
Get full text
Get full text
Thesis -
228by Mohamed Yassin, Warusia“... researchers, the low attack detection rates (also known as the detection of true positive) that reflect...”
Published 2015
Get full text
Thesis -
229by Malekzadeh, Mina“.... The lack of protection on management frames causes an intruder to launch different types of attack...”
Published 2007
Get full text
Thesis -
230by Sharabyan, Mohammad Tahghighi“... domain. The GC, like other matrix cryptosystems, cannot resist against chosen-plaintext attack...”
Published 2015
Get full text
Thesis -
231by Wan Mohd Ruzai, Wan Nur Aqlili“... cryptanalysis (or often called ‘attack’) against RSA and its variants are not based on this integer...”
Published 2021
Get full text
Thesis -
232by Ahmad Khalid, Shamsul Kamal“...In today’s world, designer of a watermarking system had to constantly faced with determined attacks...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
233by Farahpoor, Mohammadali“... Secret Sharing and Rabin’s Information Dispersal Algorithm. One of the most dangerous attacks which can...”
Published 2014
Thesis -
234by Mohammed Al-Aghbari, Anas Mustafa“... the attacks. Physical security is the most important because it is the first layer in security. In Yemen...”
Published 2013
Get full text
Thesis -
235by Mohd Izwan Zulaini, Abdul Gani“... until 2017 in response to the recovery of the animal populations. Since 1900, crocodile attacks had...”
Published 2019
Get full text
Get full text
Thesis -
236by Adenan, Nurul Nur Hanisah“... to enhance its security. In this thesis, we present three analytical attacks on the modulus N = p 2q...”
Published 2021
Get full text
Thesis -
237by Dashti Khavidaki, Seyyed Mojtaba“...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...”
Published 2013
Get full text
Thesis -
238by Chan, Gaik Yee“... to address the problems or countermeasure the attacks occurring at the Application Layer. These ID/IP...”
Published 2012
Thesis -
239by Yasir, Javed“...). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle...”
Published 2020
Get full text
Thesis -
240by Al Noman Ranak, Md Sayfullah“... considerable number of attacks have been noted in the recent past. To resist these attacks, many passwords...”
Published 2018
Get full text
Thesis