Conference Paper
العنوان التاريخ
Friendship Algorithm For Detecting Black Hole Attack In MANET
Spam Filtering with verification Code
The Necessity of construction trusted computer system
Imported Computer systems and information security
Article
العنوان التاريخ
A basion MobileID-Based Authentication Technique (MBBAT)
Enhancing RFID Security Against Brute Force Based Attacks
Enhancing Wireless Sensor Network Security Using Artificial Neural Network Based Trust Model
An intelligent classification model for phishing email detection)
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
SQL Injection Prevention using Query Dictionary Based Mechanism
Spam Reduction by using E-mail History and Authentication(SREHA)
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks (AWCAMAN)
An Enhanced Steganographic Model Based on DWT-LSB Combined with Encryption and Error Detection Techniques
Enhancing the connectivity of mobile Ad-hoc networks by considering the power, mobility and activity of nodes
Least Recently Plus Five Least frequently Replacement policy (LR+5LF)
An Efficient Scheme For MANET Domain Formation
Simple Scalar as an eLearning Mashup web application (eScalar)
The Preferable Bank Number for Multibanked-Caches
Low Power Architecture Cache for Embedded Systems
A New MultiPathTCP Flooding Attacks Mitigation Technique
Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique
Software Obfuscation Technique Based On Recurrent Neural Network
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
test