الآن تُعرض المواد 71 -- 90 من 5153

    • PERFORMANCE ANALYSIS OF SIGNATURE - BASED NETWORK INTRUSION DETECTION SYSTEM 

      عثمان, علي بابكر بخيت; Osman, Ali Babikher Bakheet; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Abstract Network Intrusion Detection Systems (NIDSs) are widely used to detect malicious traffic, misuse and violate security policies. NIDSs are the most reliable security mechanisms in protecting networks and ...
    • PERFORMANCE EVALUATION OF MACHINE LEARNING BASED INTRUSION DETECTION SYSTEMS FOR CLOUD COMPUTING 

      بن عجلان, خوله بنت عبد الرحمن محمد; Bin Ajlan, Khawla Abdulrahman; الحكيم, محمد شادي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2022)
      The main question of the study: What ML model shows the highest performance in distinguishing abnormal traffic? Study sub-questions: - What is the most common attack against cloud computing platforms? - Is it possible ...
    • A Proposed Model For Signature-Based Intrusion Detection System 

      Almutairi, Abdullah H. (2017)
      Research Problem: Large signature database size which causes a longer time to match packets and files with malware signature database. Large size signature database will also results in more resource consumption rates. Study ...
    • Relation between mitochondrial Genome and sperm motility from forensic perspective 

      Alsanosy, Safaa Adam Mohammed; السنوسي, صفاء آدم محمد; عامر, سيد أمين محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      Title: Relation between mitochondrial genome and sperm motility from forensic perspective Student: Safaa Adam Mohammed Alsanosy Supervisor: Prof. Dr. Sayed Amin Mohamed Amer Subject of research: ...
    • Risk Assessment of Data Privacy in Ministry of Justice in Saudi Arabia 

      العتيبي, محمد بن مطلق عبيد النفيعي; Al Otaibi, Mohammed Mutlaq; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      Main objective: This thesis examined risk assessment of data privacy in Ministry of Justice (MoJ) in Saudi Arabia
    • A SECURE AGENT BASED VEHICULAR COMMUNICATION SYSTEMS 

      Al-amri, Sara Saleh Ali; العمري, ساره صالح علي; عمي, مريم . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-06)
      Recently, Vehicular Communication Systems (VCSs) have received a wide attention by research committee. Basic security requirement, such as authentication, confidentiality, integrity, must be achieved for the sake of security ...
    • SECURE CHATBOTS AGAINST DATA LEAK AND OVER - LEARNING THREATS 

      Tuza, Sara Khaled Ali; طوزة, سارة خالد علي; عمي, مريم . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      With artificial intelligence and machine learning developments, chatbot technology showed up again as a trend in the messaging field and an essential asset for businesses to communicate and interact with their clients. ...
    • Secure Settlement Framework Using Blockchain Technology for Fraud Prevention 

      القحطاني, نوف بنت معيض أحمد آل سلمان; Alqahtani, Noof Moeed; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: can we develop secure settlements framework based on Self-sovereign identity through using iris scanning to increase the security of the blockchain for digital identity fraud prevention?
    • Securing Software Defined Networking against DDoS Attacks 

      آل عثمان, محمد سعود زيد; Alothman, Mohammed Saud; الحكيم, محمد شادي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: Is it feasible to apply ML techniques and algorithms at the control layer of SDN for detecting network attacks?
    • Security Awareness Model for Digital Transformation in Saudi High Schools 

      القحطاني, ناصر بن موسى عبد الله آل مشفلت; Alkhatani, Nasser Musa; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: What is the level of awareness of cybersecurity in high schools in Saudi Arabia? The main question is branched from the following sub-questions: • What is the level of cybersecurity ...
    • Stability of bk-2C-B in human blood samples using GC-MS 

      الحارثي, أفنان بنت رافع مصلح آل سلطان; Alharthe, Afnan Rafae; محمد, خالد مسعود . مشرف (جامعة نايف العربية للعلوم الأمنية, 2021)
      The main question of the study: • Does bk-2C-B stability in human blood samples over a seven-day period under various storage conditions?
    • STR profiling of different human blood sources taken from mosquito 

      العتيبي, أماني بنت محمد ذيبان الدعجاني; Alotaibi, Amani Mohammed Thipan; عامر, سيد أمين محمد . مشرف رئيس; علي, أشرف محمد أحمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: Is it possible to identify and characterize DNA profiles of single or mixed hosts, by analyzing the mosquito blood meals at different time intervals post-blood feeding?
    • The Effect of Anti-Forensics on the Digital Forensic Investigation Process in Saudi Arabia 

      العيسى, منيرة بنت عيد أحمد; AlEssa, Moneerah Eid; عمي, مريم . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: What is the prevalent status of anti-forensics on the digital forensic investigation process from digital forensic investigation practitioners perspective in Saudi Arabia?
    • Toxicological effects of Ciprofloxacin andor Diclofenac in albino rats 

      الزايدي, خالد عمر خلف; Alzaidi, Khalid Omar; الرمادي, محمد السيد سعيد . مشرف رئيس; عامر, سيد أمين محمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019)
      Importance of the study: This study is essential in correlating molecularly, and biochemically the activity of the most import liver enzymes (CYP) and the natural oxidative stress enzymes with the daily used therapeutic ...
    • THE USABILITY AND SECURITY OF ENCRYPTION APPLICATIONS USING TOKEN-BASED AUTHENTICATION 

      AlMahawes, Riham Suleiman Mohammed; المهوس, رهام سليمان محمد; الحربي, فهد محمد عباس . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-02)
      The distribution of sensitive documents can be considered a fundamental process in any organization. As the governmental organizations in Saudi Arabia are gradually being transferred to electronic systems, the threat of ...
    • Use of decidua basalis Mesenchymal stem cell to identify the molecular pathway resulting from the endothelial cell inflammation 

      Awad, Reema Abdulkareem Gomaa; عوض, ريما عبدالكريم جمعه; أبو مرعي, محمد حسن . مشرف رئيس; مسعودي, صافية عبد السلام . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-10-01)
      Study Title: Use of decidua basalis Mesenchymal stem cell to identify the molecular pathway resulting from the endothelial cell inflammation. Student: Reema Abdulkareem Awad. Supervisor: ...
    • USING ENSEMBLE MACHINE LEARNING FOR INTRUSION DETECTION USING MULTIPLE MODELS WITH SAME ADAPTIVE AI CLASSIFICATION ALGORITHMS ON WEKA 

      آل يوسف, متعب يحيى علي; AL-YOUSEF, MUTEB; عبد المجيد, نبيه طارق . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-15)
      Abstract With the rapid development and growth of the internet and networking in a very fast manner, numerous numbers of attacks are rising that threaten up the networks and information security alike. Thus, intrusion ...
    • Validated method of nicotine and cotinine determination after sub-acute inhalation of electronic cigarette vapors in mice using ultra performance liquid chromatography- tandem mass spectrometry 

      العتيبي, ماجد محمد العضياني; Al-Otaibi, Majid Muhammad Aladhaiani; الأسمري, فواز فايز . مشرف رئيس; الأمين, الخاتم حسن . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2021)
      Study main question: What are the most appropriate conditions of UPLC-MS/MS analysis to detect and determine nicotine and cotinine in mice serum samples exposed to e-cigarette-vapors-containing nicotine using hydralazine ...
    • VIDEO WATERMARKING SYSTEM BASED ON MOVING PARTS AND SILENCE DELETION 

      Almuzairai, Shahad Mousa Abduallah; المزيرعي, شهد موسى عبدالله; عناب, نسرين محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-04)
      In recent years, video watermarking has emerged as a powerful technique for ensuring copyright protection. However, ensuring the lowest level of distortion, high transparency and transparency control, integrity of the ...