Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
241by Nasim, Ahmed“..., Port Scan Attack and Smurf Attack Detection. The approach is to develop software which performs port...”
Get full text
Get full text
Thesis -
242by Mohamedali Abdalla, Ahmed Abdalla“...The growth of the Internet and networking has made securing networks against attacks a very...”
Published 2015
Get full text
Thesis -
243by Khalid Hassan, Mohamed Edris“...This thesis addresses the issue of image watermarking robustness against attacks and especially...”
Published 2016
Get full text
Thesis -
244
-
245
-
246by Khavidaki, Seyyed Mojtaba Dashti“...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...”
Published 2013
Get full text
Thesis -
247by Ibrahim, Mohammed“... of people’s lives. However, most IoT devices are vulnerable to botnet attacks. To defend these devices...”
Published 2021
Get full text
Thesis -
248by Mohamed, Ashara Banu“..., one of the main issues that still remains since its beginning is the huge amount of attack alerts...”
Published 2015
Get full text
Thesis -
249by Ali Mohamed, Nachaat Abdelatif“... organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent...”
Published 2022
Get full text
Thesis -
250by Yunanto, Sri“...This thesis attempts to analyze the involvement of militant Islamist groups in terror attacks...”
Published 2013
Get full text
Thesis -
251by Farrokhtala, Ali“... principles but still there is not any approved standard in this field. Black hole attack as one of the most...”
Published 2013
Get full text
Thesis -
252by Omar @ Othman, Wan Zariman“...Algebraic attacks on stream cipher are important in cryptanalysis to both design- ers...”
Published 2019
Get full text
Thesis -
253by Daud, Ali Yusny“...) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form...”
Published 2002
Get full text
Thesis -
254by Hydara, Isatou“... of an application. The presence of XSS vulnerabilities in applications source codes enables XSS attacks to take...”
Published 2015
Get full text
Thesis -
255by Asmawi, Aziah“... become increasingly vulnerable to malicious attacks that could affect essential properties...”
Published 2016
Get full text
Thesis -
256
-
257by Irshad, Hira“.... The equity markets in Pakistan respond negatively to attacks on educational institutes and businesses whereas...”
Published 2020
Get full text
Get full text
Get full text
Get full text
Thesis -
258by Abdulbari Ali, Sherif“.... Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds...”
Published 2005
Get full text
Thesis -
259by Mat Isa, Mohd Anuar“... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...”
Published 2018
Get full text
Thesis -
260by Hamdi, Ayman Majid“... important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey attacks...”
Published 2019
Get full text
Thesis