Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
321by Siswanto, Apri“... assess the systems, fingerprints could be replicated and modified by attackers. Currently, most existing...”
Published 2022
Get full text
Get full text
Thesis -
322by Al-Alak, Saif M. Kh.“... key for message ciphering that leads to the possibility of key attack. The authentication algorithm...”
Published 2014
Get full text
Thesis -
323by Ghathwan, Khalil Ibrahim“...Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks...”
Published 2016
Get full text
Get full text
Thesis -
324by Revathy, Amadera Limgam“... found on Malaysian videos are political attack and racial attack. Other subcategories include name...”
Published 2019
Get full text
Get full text
Thesis -
325by Mushgil, Baydaa Mohammad“... signal processing and manipulating attacks specially the de-synchronization attacks such as jittering...”
Published 2016
Get full text
Thesis -
326by Mohd Nor, Mohd Khairi“... vital policy for users and organization since most commonly attack launched because of the vulnerability...”
Published 2012
Get full text
Thesis -
327by Essa, Shawnim Ikram“... banking has given rise to an increase in attacks against banking institutions and their customers...”
Published 2013
Get full text
Thesis -
328by Mnati, Mustafa Nasser“..., but the problem of robustness and transparency from any attack is still becomes the main research issue...”
Published 2010
Get full text
Thesis -
329by Daud, Muhamad Azlan“... input. Alvarez through his one-time pad attack successfully attacked the Baptista cyptosystem. Ariffin...”
Published 2014
Get full text
Thesis -
330
-
331
-
332
-
333by Shojanazeri, Hamid“... as watermarks to provide malicious attack classification and locating tampered area. The Zernike moments...”
Published 2013
Get full text
Thesis -
334
Get full text
Get full text
Get full text
Thesis -
335by Anwar, Shahid“... coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service...”
Published 2019
Get full text
Thesis -
336by Mousavi, Seyed Mojtaba Khorzoughi“...-based methods, while in automated methods the robustness against intentional or unintentional attacks...”
Published 2015
Get full text
Thesis -
337by Ordi, Ali“... in preventing Denial of Service (DoS) attacks. A ‘Connection Request Flooding’ DoS (CRF-DoS) attack is launched...”
Published 2016
Get full text
Thesis -
338by Farhan, Farhan Abdel-Fattah Ahmad“... attacks. This research investigates the use of a promising technique from machine learning to designing...”
Published 2011
Get full text
Get full text
Thesis -
339by Mohamad Fadli, Zolkipli“...-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a common...”
Published 2012
Get full text
Thesis -
340by Rosli, Athirah“.... The developed equation was validated via experimentation that involved testing the UDP flooding attack, TCP...”
Published 2017
Get full text
Thesis