الآن تُعرض المواد 69 -- 88 من 5153

    • A New Intelligent Classification Model to Detect Phishing Emails 

      العنزي, عياش الطرقي السبيعي; ALENIZI, MAJED AYIASH; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-16)
      Abstract Electronic mails is currently a main communication method worldwide as it proven its efficiency. Phishing emails is one of the major threats committed via this facility which resulted in significant losses that ...
    • A New Model for Detecting Black Accounts in Social Media 

      الحربي, يوسف سمير سليم السليمي; ALHARBI, YOUSEF SAMIR; الحربي, فهد بن محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-19)
      Abstract Social networks are the most important communication channels in recent years, which popular among the different social groups. These networks affected the ideas and policies of individuals, groups and communities. ...
    • PERFORMANCE ANALYSIS OF SIGNATURE - BASED NETWORK INTRUSION DETECTION SYSTEM 

      عثمان, علي بابكر بخيت; Osman, Ali Babikher Bakheet; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Abstract Network Intrusion Detection Systems (NIDSs) are widely used to detect malicious traffic, misuse and violate security policies. NIDSs are the most reliable security mechanisms in protecting networks and ...
    • PERFORMANCE EVALUATION OF MACHINE LEARNING BASED INTRUSION DETECTION SYSTEMS FOR CLOUD COMPUTING 

      بن عجلان, خوله بنت عبد الرحمن محمد; Bin Ajlan, Khawla Abdulrahman; الحكيم, محمد شادي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2022)
      The main question of the study: What ML model shows the highest performance in distinguishing abnormal traffic? Study sub-questions: - What is the most common attack against cloud computing platforms? - Is it possible ...
    • A Proposed Model For Signature-Based Intrusion Detection System 

      Almutairi, Abdullah H. (2017)
      Research Problem: Large signature database size which causes a longer time to match packets and files with malware signature database. Large size signature database will also results in more resource consumption rates. Study ...
    • Relation between mitochondrial Genome and sperm motility from forensic perspective 

      Alsanosy, Safaa Adam Mohammed; السنوسي, صفاء آدم محمد; عامر, سيد أمين محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      Title: Relation between mitochondrial genome and sperm motility from forensic perspective Student: Safaa Adam Mohammed Alsanosy Supervisor: Prof. Dr. Sayed Amin Mohamed Amer Subject of research: ...
    • Risk Assessment of Data Privacy in Ministry of Justice in Saudi Arabia 

      العتيبي, محمد بن مطلق عبيد النفيعي; Al Otaibi, Mohammed Mutlaq; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      Main objective: This thesis examined risk assessment of data privacy in Ministry of Justice (MoJ) in Saudi Arabia
    • A SECURE AGENT BASED VEHICULAR COMMUNICATION SYSTEMS 

      Al-amri, Sara Saleh Ali; العمري, ساره صالح علي; عمي, مريم . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-06)
      Recently, Vehicular Communication Systems (VCSs) have received a wide attention by research committee. Basic security requirement, such as authentication, confidentiality, integrity, must be achieved for the sake of security ...
    • SECURE CHATBOTS AGAINST DATA LEAK AND OVER - LEARNING THREATS 

      Tuza, Sara Khaled Ali; طوزة, سارة خالد علي; عمي, مريم . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      With artificial intelligence and machine learning developments, chatbot technology showed up again as a trend in the messaging field and an essential asset for businesses to communicate and interact with their clients. ...
    • Secure Settlement Framework Using Blockchain Technology for Fraud Prevention 

      القحطاني, نوف بنت معيض أحمد آل سلمان; Alqahtani, Noof Moeed; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: can we develop secure settlements framework based on Self-sovereign identity through using iris scanning to increase the security of the blockchain for digital identity fraud prevention?
    • Securing Software Defined Networking against DDoS Attacks 

      آل عثمان, محمد سعود زيد; Alothman, Mohammed Saud; الحكيم, محمد شادي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: Is it feasible to apply ML techniques and algorithms at the control layer of SDN for detecting network attacks?
    • Security Awareness Model for Digital Transformation in Saudi High Schools 

      القحطاني, ناصر بن موسى عبد الله آل مشفلت; Alkhatani, Nasser Musa; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: What is the level of awareness of cybersecurity in high schools in Saudi Arabia? The main question is branched from the following sub-questions: • What is the level of cybersecurity ...
    • Stability of bk-2C-B in human blood samples using GC-MS 

      الحارثي, أفنان بنت رافع مصلح آل سلطان; Alharthe, Afnan Rafae; محمد, خالد مسعود . مشرف (جامعة نايف العربية للعلوم الأمنية, 2021)
      The main question of the study: • Does bk-2C-B stability in human blood samples over a seven-day period under various storage conditions?
    • STR profiling of different human blood sources taken from mosquito 

      العتيبي, أماني بنت محمد ذيبان الدعجاني; Alotaibi, Amani Mohammed Thipan; عامر, سيد أمين محمد . مشرف رئيس; علي, أشرف محمد أحمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: Is it possible to identify and characterize DNA profiles of single or mixed hosts, by analyzing the mosquito blood meals at different time intervals post-blood feeding?
    • The Effect of Anti-Forensics on the Digital Forensic Investigation Process in Saudi Arabia 

      العيسى, منيرة بنت عيد أحمد; AlEssa, Moneerah Eid; عمي, مريم . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: What is the prevalent status of anti-forensics on the digital forensic investigation process from digital forensic investigation practitioners perspective in Saudi Arabia?
    • Toxicological effects of Ciprofloxacin andor Diclofenac in albino rats 

      الزايدي, خالد عمر خلف; Alzaidi, Khalid Omar; الرمادي, محمد السيد سعيد . مشرف رئيس; عامر, سيد أمين محمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019)
      Importance of the study: This study is essential in correlating molecularly, and biochemically the activity of the most import liver enzymes (CYP) and the natural oxidative stress enzymes with the daily used therapeutic ...
    • THE USABILITY AND SECURITY OF ENCRYPTION APPLICATIONS USING TOKEN-BASED AUTHENTICATION 

      AlMahawes, Riham Suleiman Mohammed; المهوس, رهام سليمان محمد; الحربي, فهد محمد عباس . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-02)
      The distribution of sensitive documents can be considered a fundamental process in any organization. As the governmental organizations in Saudi Arabia are gradually being transferred to electronic systems, the threat of ...
    • Use of decidua basalis Mesenchymal stem cell to identify the molecular pathway resulting from the endothelial cell inflammation 

      Awad, Reema Abdulkareem Gomaa; عوض, ريما عبدالكريم جمعه; أبو مرعي, محمد حسن . مشرف رئيس; مسعودي, صافية عبد السلام . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-10-01)
      Study Title: Use of decidua basalis Mesenchymal stem cell to identify the molecular pathway resulting from the endothelial cell inflammation. Student: Reema Abdulkareem Awad. Supervisor: ...
    • USING ENSEMBLE MACHINE LEARNING FOR INTRUSION DETECTION USING MULTIPLE MODELS WITH SAME ADAPTIVE AI CLASSIFICATION ALGORITHMS ON WEKA 

      آل يوسف, متعب يحيى علي; AL-YOUSEF, MUTEB; عبد المجيد, نبيه طارق . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-15)
      Abstract With the rapid development and growth of the internet and networking in a very fast manner, numerous numbers of attacks are rising that threaten up the networks and information security alike. Thus, intrusion ...