Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
441by Aslahi, Bibi Masoomeh“... on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve...”
Published 2013
Get full text
Thesis -
442by Mat Deli, Mohd. Sharudin“... the computer and internet users from exposing themselves towards malware attacks, identifying the attacks...”
Published 2017
Get full text
Thesis -
443by Afrakhteh, Masoud“... to be robust against one of the common attacks to stego-images known as Chi-squared attack....”
Published 2010
Get full text
Thesis -
444by Abdullahi, Abdifatah Abdirahman“.... The used of IDS to prevent the extremely sophisticated attacks in most of our industries, governmental...”
Published 2013
Get full text
Thesis -
445by Al-Saedi, Karim Hashim Kraidi“... of the threat they pose. Therefore, it is difficult for the security analyst to identify attacks and take...”
Published 2013
Get full text
Thesis -
446by Khiabani, Hamed“... works showed that the accuracy of the model improved from 2% to 41.3% during an oscillating attack...”
Published 2013
Get full text
Thesis -
447by Zarir, Mustafa Nadhim“... it additionally corresponds to attacks on pc systems. The distinguishing actions that mitigate the operations...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
448by Franco, Daniel Jose Da Graca Peceguina“... to learn systems’ specifications and extract general state-based rules for attacks identification...”
Published 2021
Get full text
Thesis -
449by Mohd. Shariff, Muhammad Reza“... disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number...”
Published 2008
Get full text
Thesis -
450by Ng, Wui Ming“... in the development of plant protection scheme against phytopathogenic attacks from fungi and insects. Bacteria...”
Published 2007
Get full text
Get full text
Thesis -
451
-
452by Elebe, Talib Muhsen“... to the increase of natural disasters, armed conflicts or terrorist attacks. It presents great challenges...”
Published 2017
Get full text
Get full text
Thesis -
453
-
454by Rafsanjani, Ahmad Sahban“... attackers spread malicious URLs to carry out attacks such as phishing and malware, which lead unsuspecting...”
Published 2023
Get full text
Thesis -
455by Asri, Ahmad Azlan“... (v), height of spoiler (h), and angle of attack (a). The car then will simulated without using rear...”
Published 2010
Get full text
Thesis -
456by Daud, Rohaizan“... of denial-of-service hacker attacks on the most popular and established of Internet sites has led to a...”
Published 2005
Get full text
Thesis -
457by Usmani, Mohammed Umar“... of concrete incorporating PET fibers from recycled bottle wastes and was exposed to acid and sulphate attack...”
Published 2016
Get full text
Thesis -
458by Nasser, Alzahrani Jalal“... types of attacks is applied on watermarked image namely, Gaussian noise, Salt & Pepper Noise, Poisson...”
Published 2013
Thesis -
459by Aslahi Shahri, Bibi Masoomeh“... on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve...”
Published 2013
Get full text
Thesis -
460by Sanati, Parisa“... changes were occurred on their structures. Strong acidic condition in SGF created an acidic attack to Si-O...”
Published 2013
Get full text
Thesis