Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
41by Modirkhazeni, Ali“... of conventional techniques of attack and the attacks that are not desirable because of limited resources is a...”
Published 2011
Get full text
Thesis -
42by Ardestani, Parichehr Manouchehri“... and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which...”
Published 2013
Get full text
Thesis -
43by Elejla, Omar E. O.“... in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have...”
Published 2018
Get full text
Thesis -
44by Omar, Mohd Nizam“... to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation...”
Published 2011
Get full text
Thesis -
45by Jantan, Mohd. Faidzal“.... Far from that, Algebraic Attacks and Fast Algebraic Attack has become popular among cryptographers...”
Published 2010
Get full text
Thesis -
46
-
47by Ibrahim, Husam Hamid“... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
48by Ridha, Hussein Ali“... communication from malicious attacks. The data is enabled to be received by the recipients. The data is delayed...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
49by Ibrahim, Husam Hamid“... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
50by Lau, Wei Khang“... applied to digital files to withstand against cropping and resizing attack. In this Dual-watermarking...”
Published 2016
Get full text
Get full text
Get full text
Thesis -
51by Mohd Salleh, Nurhashikin“... uses the Internet as their platform to form online communities and launch their attack...”
Published 2018
Get full text
Get full text
Thesis -
52
-
53
-
54
-
55
-
56
-
57by Izaddoost, Alireza“... to its intended users. The Denial of Service (DoS) attacks are becoming more serious in security...”
Published 2008
Get full text
Thesis -
58by Ghobadifar, Faranak“... in the fields. The main purpose of this research was to determinate pest attack in paddy field using remote...”
Published 2015
Get full text
Thesis -
59by Ahmed, Dana Hasan“... Reflection Denial of Service (DRDoS) attacks which are called Reflection/Amplification and hassles...”
Published 2017
Get full text
Thesis -
60by Javan, Ali“... threats including coordinated distributed attacks have flourished against the vital services and priceless...”
Published 2011
Get full text
Thesis