Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
261
-
262by Irshad, Hira“.... The equity markets in Pakistan respond negatively to attacks on educational institutes and businesses whereas...”
Published 2020
Get full text
Get full text
Get full text
Get full text
Thesis -
263by Abdulbari Ali, Sherif“.... Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds...”
Published 2005
Get full text
Thesis -
264by Mat Isa, Mohd Anuar“... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...”
Published 2018
Get full text
Thesis -
265by Hamdi, Ayman Majid“... important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey attacks...”
Published 2019
Get full text
Thesis -
266by Al-Rimy, Bander Ali Saleh“.... Even after neutralizing such attacks, the targeted files remain encrypted. This irreversible effect...”
Published 2019
Get full text
Thesis -
267by Juliza, Mohamad Arif“.... The openness of the Android mobile devices is extremely vulnerable to malware attacks. Even though various...”
Published 2022
Get full text
Thesis -
268by Baharudin, Muhammad Saufi“.... By using massive attack of zombie, the attackers launch a distribution denial of services (ddos) against...”
Published 2009
Get full text
Thesis -
269by Gaithuru, Juliet Nyokabi“... ways of attacking the algorithms used for encryption. This process of continued improvement...”
Published 2013
Get full text
Thesis -
270by Kalybayev, Almukhammed“... years, potentially leading to a loss of cash. The methods which are utilized by attackers to collect...”
Published 2013
Get full text
Thesis -
271by Mokaramian, Shahram“...2R classes, which include malicious attacks. Therefore, it requires a resampling technique...”
Published 2013
Get full text
Thesis -
272by Kamarudin, Nazhatul Hafizah“... threatened by security attacks. It is noted that the use of username and password as an authentication scheme...”
Published 2018
Get full text
Thesis -
273by Yaakub, Mohd Fauzi“...The issue of high angle of attacks at the retreating blade receives attention from countless...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
274
-
275by Omotunde, Habeeb Oladapo“...As SQL injection attack (SQLIA) continues to threaten web applications despite several techniques...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
276by Eid, Almazrooie Mishal“...Asymmetric and symmetric cryptography are believed to be secure against any attack using classical...”
Published 2018
Get full text
Thesis -
277by Buja, Alya Geogiana“... of block ciphers against side-channel cube attack and differential fault analysis.Thirdly,all proposed...”
Published 2018
Get full text
Get full text
Thesis -
278by Hina, Aliyu Danladi“... against fast correlation attack, one of the major attacks known to weaken nonlinear combiner...”
Published 2019
Get full text
Thesis -
279by Juremi, Julia“... cryptographic attacks. Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all...”
Published 2018
Get full text
Thesis -
280by Teh, Jia Yew“... to malicious, undesirable effects such as buffer overflows, privilege escalation (spawning an attackers’ shell...”
Published 2017
Get full text
Thesis