Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
81
-
82by Al-Saleem, Samer Abdulsada Mutlag“...The goal of the thesis is to propose an approach that can detect flash crowd attacks that target...”
Published 2017
Get full text
Thesis -
83by Suardi, Khairmen“... what causes the hydrogen attack and dealuminification. Control microstructure and phases through heat...”
Published 2005
Get full text
Thesis -
84by Rajabi, Muhammad Javad“... be invisible and robust to common processing and attack. So far, current research has succeeded in maintaining...”
Published 2018
Get full text
Thesis -
85by Bojnord, Hoda Soltanian“.... VANET security is essential because a badly designed VANET is vulnerable to network attacks...”
Published 2013
Get full text
Thesis -
86
-
87
-
88by Mosa, Mohammad Rasmi Hassun“... to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a...”
Published 2013
Get full text
Thesis -
89
-
90by Cheraghi, Seyed Mohammad“... malicious user may deliberately mislead other vehicles and vehicular agencies. Sybil attacks have been...”
Published 2013
Get full text
Thesis -
91
-
92by Ali, Mohammed Qasim“... to transmit information using IPv6 stack. Sensors perform critical tasks and become targets of attacks...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
93by Hassan, Abdullahi Mohamud“.... Currently the capability of repetition codes on various attacks in not sufficiently studied...”
Published 2015
Get full text
Get full text
Get full text
Thesis -
94
-
95
-
96
-
97
-
98by Manaa, Mehdi Ebady“... whether they are genuine requests for network services or DoS attacks. Results obtained demonstrate...”
Published 2012
Get full text
Get full text
Thesis -
99by Mustafa, Mohd Nawawi“... security incidents is failure to determine the root cause of an incident, thus allowing the attacker...”
Published 2015
Get full text
Thesis -
100by Shakhatreh, Ala' Yaseen Ibrahim“...Securing the web against frequent cyber attacks is a big concern, attackers usually intend...”
Published 2010
Get full text
Get full text
Thesis