Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
341by Al-Khasawneh, Mahmoud Ahmad Salem“... images requires the generation of intricate secret keys that protect the images from diverse attacks...”
Published 2018
Get full text
Thesis -
342by Ibrahim, Ayman Khallel“... making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well...”
Published 2020
Get full text
Thesis -
343by Adeeb, Jnaidi Saed Maher“...Since the period followed the September 11 in 2001 attack, and the second Palestinian uprising...”
Published 2019
Get full text
Thesis -
344by Arab, Farnaz“... metadata of pixels to ensure achievable efficiency to detect more attacks. All these required additional...”
Published 2014
Get full text
Thesis -
345by Fatani, Tariq Abdulaziz D.“... of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices...”
Published 2013
Get full text
Thesis -
346by Ismail, Haqi Khalid“..., and impersonation attacks. Cybercriminals can take advantage of insecure communication to perform attacks that lead...”
Published 2021
Get full text
Thesis -
347by Ng, Ke Huey“..., it defeats the original purpose and prompts to be attacked by intruders. This study introduces a hybrid RDWT...”
Published 2021
Get full text
Thesis -
348by Liew, Seow Wooi“.... Traditionally, phishing attacks target email, but now they have reached to Online Social Networks (OSNs) like...”
Published 2019
Get full text
Thesis -
349by Alkinany, Enas Akeel Raheem“.... However, Spoof attacks remain the main challenge faced by facial biometric systems. A spoof attack arises...”
Published 2019
Get full text
Thesis -
350by Ong, Elaine Ei Ling“... and SHA1 family algorithm can be break by the generic attacks such as Brute Force attack, domain extender...”
Published 2021
Get full text
Thesis -
351by Wan Ali, Wan Nor Ashiqin“... several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6...”
Published 2015
Get full text
Thesis -
352by Choong, Kai Bin“...”. Text-based CAPTCHA is the most common technique used across the internet to detect bot from attacking...”
Published 2018
Get full text
Thesis -
353by Krishnan, Ashvini Devi“.... Security specification languages can be used to represent security specification such as attack...”
Published 2013
Thesis -
354by Ahmad Zahari, Nurul Huda“... based on times and attacks. If there is no attack or intrusion detected, MPM will wait...”
Published 2011
Get full text
Get full text
Get full text
Thesis -
355by Noor Zuraidin, Mohd Safar“... anomalies are identified, abnormal DNS packet request, the NetBIOS attack, abnormal DNS MX query, DNS...”
Published 2011
Get full text
Get full text
Thesis -
356by Mokhtar, Ridwan“... model and the three-dimensional results. The effects of angles of attack and aerofoil profiles were...”
Published 2006
Get full text
Thesis -
357by Chin, Ji Jian“....’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks and a result...”
Published 2014
Thesis -
358“... of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM...”
Get full text
Thesis -
359by Mahmoud Al-Emari, Salam Radi“... to light due to the existing attacks that targeted Ethereum, for instance, the Ethereum DAO attack...”
Published 2022
Get full text
Thesis -
360by Che Wan Idris, Che Wan Zaidie“... will focus on the aerodynamic characteristics at various angles of attack at 0.1 - 0.15 Mach number using...”
Published 2009
Get full text
Thesis