الآن تُعرض المواد 21 -- 40 من 5133

    • COMPUTATIONAL INTELLIGENT MECHANISM FOR BOOSTING CLUSTER-BASED WSN SECURITY 

      القحطاني, محمد مهدي سيف آل سلطان; ALQAHTANI, MOHAMMED MAHDI SAIF ALSULTAN; جاد الحق, مصطفى . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-18)
      Abstract Wireless sensor networks (WSNs) is growing exponentially due to its utilization in numerous applications such as environmental monitoring, habitat monitoring, military, medical and health monitoring. WSNs are ...
    • Computational Intelligent Mechanism for Boosting Cluster-Based WSN Security 

      سيف, عمر سلطان ياسين; SAIF, OMAR SULTAN Y.; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-17)
      Abstract Over the past few years' cloud computing has rapidly grown to a widely accepted IT model, and the dependency on the Internet technology has become an integral part of our life. governments and Organizations and ...
    • Cybercrime in Progress -Theory and Prevention of - Enabled Offenses Technology 

      العنزي, خلود بنت ربيع خلف; Al-Anazi, Khulood R.; العتيبي, غازي نوار . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      Background of study: Technology has become an integral part of our everyday lives. Today, the technological landscape is littered with devices of all shapes, sizes, and utilities, including mobile phones, tablet computers, ...
    • Data security and Privacy Module in Cloud Computing 

      عيسى, رامي عبد الرحمن أحمد; Essa, Rami Abdulrahman; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: What is the level of data security and privacy in cloud computing environments?
    • Detection and Genotyping of STR loci in Saudi Breast Cancer Patients using Cell-free DNA (Cf-DNA) 

      Al-Sharhan, Norah; الشرهان, نورة بنت عبد الله (جامعة نايف العربية للعلوم الأمنية, 2017-06)
      Study Objectives: 1. Measure the Cf-DNA concentration in the plasma of breast cancer (BC) patients and healthy subjects. 2. Compare the concentration of plasma Cf-DNA in BC patients and healthy subjects, and evaluate ...
    • Detection of DDoS Attacks in Software Defined Networks 

      الراجحي, منصور سليمان; Alrajhi, Mansour Sulaiman; محمد, مصطفى جاد الحق . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Abstract Due to its centralized and programmable simplicity, Software‐Defined Network (SDN) are considered as one of the most promising technologies for computer networks. There are many security issues in the traditional ...
    • Detection of Violent Language Against Saudi Arabia in Social Media Using Deep Learning 

      الغامدي, أثير بنت يحيى علي مسفر; Alghamdi, Atheer Yahya; عمي, مريم عبد القادر . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The Main Question of The Study: Does the use of sequential model based on deep learning yield to accurate and effective detection of offensive Saudi Arabic language?
    • Developing a Drug Delivery System for Pregabalin by Nanoparticles 

      Alanoud, Mosa Alasiri; العسيري, العنود بنت موسى علي العزاني; الورثان, عبد الرحمن بن عبد الله . مشرف رئيس; العجلوني, عبدالوالي محمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-04-26)
      Study Title: Developing a Drug Delivery System for Pregabalin by Nanoparticles. Student: Alanoud Mosa Alasiri Supervisor: Dr. Abdul-Rahman Al-Warthan Co-Supervisor: Dr. Abdul-Wali Ajlouni. Study Questions: Main ...
    • Developing a Network-Based Botnet Detection Systems Using Machine Learning 

      العنزي, مشعل فرحان نافع; AL-Anazi, Meshal Farhan; جاد الحق, مصطفى . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      Abstract: Botnet is considered a multifunctional malware. It can be leveraged by attackers to launch variety of malware attacks such as click fraud, DDOS, spam, etc. Moreover, the botnets pretend the normal traffic by ...
    • Developing an Analytical Method for the Analysis of AMB-FUBINACA in Mice Brain using GC-MSMS 

      الغامدي, ملاك بنت عبد الرحيم سعيد آل عبد الرحيم; Al-Ghamdi, Malak Abdulrahim; بكداش, عبد السلام أحمد . مشرف رئيس; كومار, ساشيل . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: Is it possible to determine the FUB-AMB quantitatively and qualitatively in mice brain tissue? From this question three key questions emerge: - How efficient is the extraction method of ...
    • Developing Malware Detection System Based on Behavioral Aspects 

      العوفي, محمد أحمد ناهر الكريثي; ALAUFI, MOHAMMAD AHMED; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-18)
      Abstract Nowadays, the importance of malware analysis has become essential for the antivirus companies to detect various types of malware based on their finding, analyzing malware helps to assess damage, internet ...
    • Developing Security Strategy for “Just Walk Out” Technology 

      AlOmairy, Eman Mohammed Abdullah; العميري, إيمان محمد عبدالله; عناب, نسرين محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-06)
      On 2016, Amazon announced a new retail store: Amazon Go, the new type of store with no need to checkout. "Just Walk Out" technology is the name that amazon has launched on the technology used in its store. Amazon Go requires ...
    • The Effect of Allogeneic Bone Marrow Transplant (allo-BMT) on Human Deoxyribonucleic Acid (DNA) Profiling 

      Al-Saleh, Abrar Bader Khaled (2016)
      موضوع الدراسة: مقارنة بين السمات الوراثية من عينات الدم ومسحات الشدق ومسحات الجلد للمرضى الذين خضعوا لعملية زراعة النخاع العظمي. أهداف الدراسة: تهدف هذه الدراسة إلى: 1. تحديد الأنماط الوراثية للحمض النووي المستخلص من ...
    • EFFECT OF EYE PATHOLOGY ON THE IRIS RECOGNITION SYSTEM 

      AL SHEHR, WAUOOD; الشهري, وعود عبدالواحد فائز; الحربي, فهد محمد عباس . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-01)
      Nowadays, the application of biometric systems that aim to safeguard information and its supporting processes, systems and infrastructures are proliferating. Unfortunately, the iris recognition system has some weakness, ...
    • The Effect of Medicinal Herbs "Calligonum Comosum" and" Sanna Alexandrina" in Saudi Environment on Breast Cancer Cell Lines (MDA-MB-231) 

      الباز, عبير بنت صالح عثمان; Albaz, Abeer Saleh Othman; الغامدي, صالح بن محمد . مشرف رئيس; قصاب, أحمد شعبان . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-04-24)
      Research Problem: 1. What is the therapeutic effect of the medical herbs Calligonum comosum and Senna alexandrina on breast cancer cells represented by cancer cell line MDA-MB-231. 2. Does breast cancer cell line MDA-MB-231 ...
    • AN EFFECTIVE ALGORITHM FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORK (WSN) 

      Alolayan, Mohammed Hassan (2017)
      A Wireless Sensor Network (WSN) consists of sensor nodes which are deployed over a certain area for several applications. It is vulnerable to different types of attacks. Selective Forwarding and Black Hole attacks are two ...
    • An Effective Awareness Model for Phishing Prevention 

      ABU JARAD, NASSER MOHAMMAD HASAN; أبو جراد, ناصر محمد حسن; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Phishing is a fraudulent action to obtain sensitive information such as usernames or personal information. It is one of a social engineering techniques being used to delude non-technical users. They are often lured by ...
    • EFFICIENT APPROACH FOR DETECTING EXTREMIST ARABIC TEXTUAL CONTENTS IN WEBSITES 

      Alharbi, Mona Hajed Ghazi; الحربي, منى بنت هاجد غازي; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The internet and technology advances now days have motivated terrorist groups to publish articles and extremist thoughts over the internet through the websites, blogs and social media seeking to spread their extremist ...
    • Efficient Network Intrusion Detection Model Using Dynamic Machine Learning 

      السبيعي, نواف بن محمد عبد الله المحمدي; Alsubaie, Nawaf Mohammed; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      Research topic: Efficient Network Intrusion Detection Model Using Dynamic Machine Learning
    • An Encryption Based Security Model for Preventing Phishing Attacks 

      مطاوع, ضياء الدين نصر عبد العظيم; Motawa, Dyaa Eldeen Nasr; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-05-05)
      Abstract Currently, Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has become an organized criminal activity. Spoofed emails claiming to be from ...