Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
61by Hussein, Noor Sabeeh“... kinds of attacks like denial of service attacks, sybil attacks, jamming attacks, black/sink hole attacks...”
Published 2016
Get full text
Thesis -
62
-
63by Kuhanraj, Balan“... serious network threats such as denial of service attack, data modification attack, impersonation attack...”
Published 2020
Get full text
Thesis -
64
-
65by Muamer N., Mohammed“... for researches and this connection is prone to vulnerability caused by the attackers in steeling information from...”
Published 2011
Get full text
Thesis -
66by Abadi, Ahad Akbar“... issues still the considerable difficulties for customers. This means the attacks which can threat...”
Published 2013
Get full text
Thesis -
67by Boroujerdizadeh, Ali“.... We narrow down the project to a specific attack. Collusion attack is the main problem for video...”
Published 2013
Get full text
Thesis -
68by Hosseini, Seyed Mostafa Mir“... is going to explore integrity attacks in RFID systems. Even though the previous related works have...”
Published 2013
Get full text
Thesis -
69by Aghabababaeyan, Reza“.... Robustness is one of the areas to be improved when an attack is implied to watermarked image. One of the main...”
Published 2015
Thesis -
70by Kashefi, Iman“... for attackers. Among the leaders in the world of smartphones, Android is a novel platform with rapidly growing...”
Published 2013
Get full text
Thesis -
71Representations of Muslims in the coverage of the Charlie Hebdo attack in selected U.S. news media /by Dayana NayanGet full text
Published 2017
Thesis Book -
72
-
73by Lim, Boon Ping“...Denial of service (DoS) attacks tie up resources of a remote host or network, thereby denying...”
Published 2006
Thesis -
74by Ghaben, Ayman Ibrahim Ali“...This thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed...”
Published 2023
Get full text
Thesis -
75by Rastegari, Samaneh“.... In order to prevent this system from different types of attacks, we need to prepare a classification...”
Published 2009
Get full text
Thesis -
76by Mohd Ariffin, Noor Afiza“... data against all types of attacks. Furthermore, most current research only focuses on improving...”
Published 2017
Get full text
Thesis -
77by Harun, Zati Bayani“... (DDoS) attack which is jamming attack. Almost 81% of jamming attacks are initiated at the MAC layer due...”
Published 2019
Get full text
Thesis -
78
-
79
-
80