-
1
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
Published 2008Subjects: “…Computer networks - Security measures…”
Get full text
Thesis -
2
Network security situation awareness based on indicators extracted
Published 2016Subjects: “…Computer networks - Security measures…”
Get full text
Thesis -
3
A multi-factor authentication scheme using attack recognition and key generator technique
Published 2017Subjects: “…Computer networks - Security measures…”
Get full text
Thesis -
4
A malicious URL detection framework using priority coefficient and feature evaluation
Published 2024Subjects: Get full text
Thesis -
5
Risk awareness model for security and privacy in social networking sites from the users’ perspective
Published 2021Subjects: “…Computer networks - Security measures…”
Get full text
Thesis -
6
Design of a lightweight virtual honeynet based on linux container virtualization
Published 2014Subjects: Get full text
Thesis -
7
Electronic Book of Network Security: Introduction to Network Security
Published 2003Subjects: Get full text
Project Paper Report -
8
Fake review annotation model and classification through reviewers' writing style
Published 2019Subjects: “…Computer networks - Security measures…”
Get full text
Thesis -
9
Honeynet as a service deployment approach in enabling virtual crime scene investigation
Published 2015Subjects: Get full text
Thesis -
10
Steganography in webpages using CSS color attributes enhanced by rule-based system
Published 2016Subjects: Get full text
Thesis -
11
Zero distortion-based steganography for handwritten signature
Published 2018Subjects: Get full text
Thesis -
12
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003Subjects: Get full text
Thesis -
13
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
Published 2015Subjects: Get full text
Thesis -
14
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018Subjects: “…Vehicular ad hoc networks (Computer networks) - Security measures…”
Get full text
Thesis -
15
Analysis the performance of adaptive demodulator in terms of bit error rate for software defined radio
Published 2009Subjects:Conference or Workshop Item -
16
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015Subjects: Get full text
Thesis -
17
-
18
-
19
Regions Security Policy (RSP) : applying regions to network security
Published 2005Subjects: Get full text
Thesis -
20
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021Subjects: “…Computer networks - Security measures…”
Get full text
Thesis