بحث
الآن تُعرض المواد 1 -- 10 من 17
ENSURING PRIVACY PROTECTION IN LOCATION-BASED SERVICES THROUGH INTEGRATION OF CACHE AND DUMMIE
(جامعة نايف العربية للعلوم الأمنية, 2019-04-02)
Location-Based Services (LBS) have recently gained much attention from the research community due to the openness of wireless networks and the daily development of mobile devices. However, using LBS is not risk free. ...
EFFECT OF EYE PATHOLOGY ON THE IRIS RECOGNITION SYSTEM
(جامعة نايف العربية للعلوم الأمنية, 2019-04-01)
Nowadays, the application of biometric systems that aim to safeguard information and its supporting processes, systems and infrastructures are proliferating. Unfortunately, the iris recognition system has some weakness, ...
LOCATION BASED AUTHENTICATION FOR MOBILE APPLICATION
(جامعة نايف العربية للعلوم الأمنية, 2019-04-04)
Recently, authentication is an important issue; it gives the organizations facility to secure their data by giving access to organizations resources like a computer system, networking, data center, services, and other ...
An Encryption Based Security Model for Preventing Phishing Attacks
(جامعة نايف العربية للعلوم الأمنية, 2019-05-05)
Abstract
Currently, Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has become an organized criminal activity. Spoofed emails claiming to be from ...
Machine-Learning Methodology for Crypto-Ransomware Detection
(جامعة نايف العربية للعلوم الأمنية, 2019-04-03)
Abstract
Ransomware is one of the fastest growing and most sophisticated types of malicious software (Malware). It is considered as the most significant denial of service (DoS) Attacks. There are two main categories, ...
An intelligent classification Model for malware detection
(جامعة نايف العربية للعلوم الأمنية, 2019)
Computer networks are expanding at very fast rate and the number of network users is increasing day by day, for full utilization of networks it need to be secured against many threats including malware, which is harmful ...
Developing Security Strategy for “Just Walk Out” Technology
(جامعة نايف العربية للعلوم الأمنية, 2019-04-06)
On 2016, Amazon announced a new retail store: Amazon Go, the new type of store with no need to checkout. "Just Walk Out" technology is the name that amazon has launched on the technology used in its store. Amazon Go requires ...
SECURE CHATBOTS AGAINST DATA LEAK AND OVER - LEARNING THREATS
(جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
With artificial intelligence and machine learning developments, chatbot technology showed up again as a trend in the messaging field and an essential asset for businesses to communicate and interact with their clients. ...
ENHANCED SECURITY FRAMEWORK FOR BIG DATA SYSTEMS USING ANOMALY DETECTION MODEL
(جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
Nowadays, the data, especially big data, became a valuable asset for organizations, businesses and individuals. They collect data that helps making decisions and improving their functions. However, the collected data from ...
FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING
(جامعة نايف العربية للعلوم الأمنية, 2019-05-03)
In the present digital world, digital image plays an important role in all areas such as journalism and news industry scientific research and publication and banking industry. With the advancement of the digital image ...