بحث
الآن تُعرض المواد 21 -- 30 من 46
Enhancing Detection of DDoS Botnet Attacks Against IOT Devices
(جامعة نايف العربية للعلوم الأمنية, 2020)
Distributed denial of service (DDoS) attacks are generally viewed as a huge threat to the web. A flooding DDoS strikes a victim machine by means of sending a vast amount of malicious traffic, which causes a significant ...
Security Awareness Model for Digital Transformation in Saudi High Schools
(جامعة نايف العربية للعلوم الأمنية, 2020)
The main question of the study: What is the level of awareness of
cybersecurity in high schools in Saudi Arabia?
The main question is branched from the following sub-questions:
• What is the level of cybersecurity ...
SECURE CHATBOTS AGAINST DATA LEAK AND OVER - LEARNING THREATS
(جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
With artificial intelligence and machine learning developments, chatbot technology showed up again as a trend in the messaging field and an essential asset for businesses to communicate and interact with their clients. ...
ENHANCED SECURITY FRAMEWORK FOR BIG DATA SYSTEMS USING ANOMALY DETECTION MODEL
(جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
Nowadays, the data, especially big data, became a valuable asset for organizations, businesses and individuals. They collect data that helps making decisions and improving their functions. However, the collected data from ...
FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING
(جامعة نايف العربية للعلوم الأمنية, 2019-05-03)
In the present digital world, digital image plays an important role in all areas such as journalism and news industry scientific research and publication and banking industry. With the advancement of the digital image ...
A SECURE AGENT BASED VEHICULAR COMMUNICATION SYSTEMS
(جامعة نايف العربية للعلوم الأمنية, 2019-04-06)
Recently, Vehicular Communication Systems (VCSs) have received a wide attention by research committee. Basic security requirement, such as authentication, confidentiality, integrity, must be achieved for the sake of security ...
THE USABILITY AND SECURITY OF ENCRYPTION APPLICATIONS USING TOKEN-BASED AUTHENTICATION
(جامعة نايف العربية للعلوم الأمنية, 2019-04-02)
The distribution of sensitive documents can be considered a fundamental process in any organization. As the governmental organizations in Saudi Arabia are gradually being transferred to electronic systems, the threat of ...
PERFORMANCE EVALUATION OF MACHINE LEARNING BASED INTRUSION DETECTION SYSTEMS FOR CLOUD COMPUTING
(جامعة نايف العربية للعلوم الأمنية, 2022)
The main question of the study: What ML model shows the highest performance in distinguishing abnormal traffic?
Study sub-questions:
- What is the most common attack against cloud computing platforms?
- Is it possible ...
COMPREHENSIVE FEASIBILITY STUDY FOR THE IMPLANTED MEDICAL DEVICES RESPOND TO CYBERSECURITY THREATS
(جامعة نايف العربية للعلوم الأمنية, 2020)
The main question of the study: The main question has crystallized in the fact that the risks and threats of cyberspace that may expose many patients who use these (IMD) devices to health complications and then endanger ...
ADAPTATIVE BLOCKCHAIN-BASED APPROACH FOR SECURE SMART HOMES
(جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
Internet of Things (IoT) security and privacy remain a major challenge, due to the huge scale and distributed nature of IoT networks. The core of the Internet of things is the sharing of information, where each sensor in ...