Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
101by Nordin, Norfarina“...The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has...”
Published 2020
Get full text
Thesis -
102by Abdallah Elhigazi, Abdallah Elhigazi“... medium, WLANs are vulnerable to a myriad of attacks. Although there have been concerted efforts...”
Published 2020
Get full text
Thesis -
103by Mohd Fauzi, Shukor Sanim“... of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems...”
Published 2003
Get full text
Thesis -
104by Farahmandian, Sara“... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...”
Published 2013
Get full text
Thesis -
105
-
106by Mohammed Ahmed Saad, Redhwan“..., in which ICMP can be blocked or dropped. ICMPv6 opens the door for attackers to attack IPv6 networks...”
Published 2016
Get full text
Thesis -
107by Salih Ali, Nabeel“... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...”
Published 2015
Get full text
Get full text
Thesis -
108
-
109
-
110
-
111by Shaukat, Haafizah Rameeza“... them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks...”
Published 2014
Get full text
Thesis -
112by Ali, Sameer“..., it is susceptible to attacker’s Distributed Denial of Service (DDoS) attacks. DDoS attacks are the main causes...”
Published 2021
Thesis -
113by Md Ilyas, Siti Sarah“...The number of phishing attacks involving online banking has records an increase percentage over...”
Published 2017
Get full text
Thesis -
114by Mohamad Fauzi, Noor Shafiqa Fazlien“... of attackers which publicly embarrasses the victim by sharing some personal information of the victim...”
Published 2020
Get full text
Thesis -
115by Mohammed Alhaj, Tagwa Ahmed“...Attack Scenario Construction (ASC) via Alert Correlation (AC) is important to reveal the strategy...”
Published 2018
Get full text
Thesis -
116by Hussein, Safwan Mawlood“...The vast amount of attacks over the Internet makes the computer users and many organizations under...”
Published 2012
Get full text
Thesis -
117
-
118by Kordi, Elahe Fazeldeh“... MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best...”
Published 2014
Get full text
Thesis -
119
-
120by Abdul Razak, Aina Nabila“... to be protected from any attacks. The malware detection process becomes a challenge because the attacker has a new...”
Published 2019
Get full text
Thesis