الآن تُعرض المواد 24 -- 43 من 5133

    • Data security and Privacy Module in Cloud Computing 

      عيسى, رامي عبد الرحمن أحمد; Essa, Rami Abdulrahman; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: What is the level of data security and privacy in cloud computing environments?
    • Detection and Genotyping of STR loci in Saudi Breast Cancer Patients using Cell-free DNA (Cf-DNA) 

      Al-Sharhan, Norah; الشرهان, نورة بنت عبد الله (جامعة نايف العربية للعلوم الأمنية, 2017-06)
      Study Objectives: 1. Measure the Cf-DNA concentration in the plasma of breast cancer (BC) patients and healthy subjects. 2. Compare the concentration of plasma Cf-DNA in BC patients and healthy subjects, and evaluate ...
    • Detection of DDoS Attacks in Software Defined Networks 

      الراجحي, منصور سليمان; Alrajhi, Mansour Sulaiman; محمد, مصطفى جاد الحق . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Abstract Due to its centralized and programmable simplicity, Software‐Defined Network (SDN) are considered as one of the most promising technologies for computer networks. There are many security issues in the traditional ...
    • Detection of Violent Language Against Saudi Arabia in Social Media Using Deep Learning 

      الغامدي, أثير بنت يحيى علي مسفر; Alghamdi, Atheer Yahya; عمي, مريم عبد القادر . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The Main Question of The Study: Does the use of sequential model based on deep learning yield to accurate and effective detection of offensive Saudi Arabic language?
    • Developing a Drug Delivery System for Pregabalin by Nanoparticles 

      Alanoud, Mosa Alasiri; العسيري, العنود بنت موسى علي العزاني; الورثان, عبد الرحمن بن عبد الله . مشرف رئيس; العجلوني, عبدالوالي محمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-04-26)
      Study Title: Developing a Drug Delivery System for Pregabalin by Nanoparticles. Student: Alanoud Mosa Alasiri Supervisor: Dr. Abdul-Rahman Al-Warthan Co-Supervisor: Dr. Abdul-Wali Ajlouni. Study Questions: Main ...
    • Developing a Network-Based Botnet Detection Systems Using Machine Learning 

      العنزي, مشعل فرحان نافع; AL-Anazi, Meshal Farhan; جاد الحق, مصطفى . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      Abstract: Botnet is considered a multifunctional malware. It can be leveraged by attackers to launch variety of malware attacks such as click fraud, DDOS, spam, etc. Moreover, the botnets pretend the normal traffic by ...
    • Developing an Analytical Method for the Analysis of AMB-FUBINACA in Mice Brain using GC-MSMS 

      الغامدي, ملاك بنت عبد الرحيم سعيد آل عبد الرحيم; Al-Ghamdi, Malak Abdulrahim; بكداش, عبد السلام أحمد . مشرف رئيس; كومار, ساشيل . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: Is it possible to determine the FUB-AMB quantitatively and qualitatively in mice brain tissue? From this question three key questions emerge: - How efficient is the extraction method of ...
    • Developing Malware Detection System Based on Behavioral Aspects 

      العوفي, محمد أحمد ناهر الكريثي; ALAUFI, MOHAMMAD AHMED; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-18)
      Abstract Nowadays, the importance of malware analysis has become essential for the antivirus companies to detect various types of malware based on their finding, analyzing malware helps to assess damage, internet ...
    • Developing Security Strategy for “Just Walk Out” Technology 

      AlOmairy, Eman Mohammed Abdullah; العميري, إيمان محمد عبدالله; عناب, نسرين محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-06)
      On 2016, Amazon announced a new retail store: Amazon Go, the new type of store with no need to checkout. "Just Walk Out" technology is the name that amazon has launched on the technology used in its store. Amazon Go requires ...
    • The Effect of Allogeneic Bone Marrow Transplant (allo-BMT) on Human Deoxyribonucleic Acid (DNA) Profiling 

      Al-Saleh, Abrar Bader Khaled (2016)
      موضوع الدراسة: مقارنة بين السمات الوراثية من عينات الدم ومسحات الشدق ومسحات الجلد للمرضى الذين خضعوا لعملية زراعة النخاع العظمي. أهداف الدراسة: تهدف هذه الدراسة إلى: 1. تحديد الأنماط الوراثية للحمض النووي المستخلص من ...

      AL SHEHR, WAUOOD; الشهري, وعود عبدالواحد فائز; الحربي, فهد محمد عباس . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-01)
      Nowadays, the application of biometric systems that aim to safeguard information and its supporting processes, systems and infrastructures are proliferating. Unfortunately, the iris recognition system has some weakness, ...
    • The Effect of Medicinal Herbs "Calligonum Comosum" and" Sanna Alexandrina" in Saudi Environment on Breast Cancer Cell Lines (MDA-MB-231) 

      الباز, عبير بنت صالح عثمان; Albaz, Abeer Saleh Othman; الغامدي, صالح بن محمد . مشرف رئيس; قصاب, أحمد شعبان . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-04-24)
      Research Problem: 1. What is the therapeutic effect of the medical herbs Calligonum comosum and Senna alexandrina on breast cancer cells represented by cancer cell line MDA-MB-231. 2. Does breast cancer cell line MDA-MB-231 ...

      Alolayan, Mohammed Hassan (2017)
      A Wireless Sensor Network (WSN) consists of sensor nodes which are deployed over a certain area for several applications. It is vulnerable to different types of attacks. Selective Forwarding and Black Hole attacks are two ...
    • An Effective Awareness Model for Phishing Prevention 

      ABU JARAD, NASSER MOHAMMAD HASAN; أبو جراد, ناصر محمد حسن; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Phishing is a fraudulent action to obtain sensitive information such as usernames or personal information. It is one of a social engineering techniques being used to delude non-technical users. They are often lured by ...

      Alharbi, Mona Hajed Ghazi; الحربي, منى بنت هاجد غازي; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The internet and technology advances now days have motivated terrorist groups to publish articles and extremist thoughts over the internet through the websites, blogs and social media seeking to spread their extremist ...
    • Efficient Network Intrusion Detection Model Using Dynamic Machine Learning 

      السبيعي, نواف بن محمد عبد الله المحمدي; Alsubaie, Nawaf Mohammed; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      Research topic: Efficient Network Intrusion Detection Model Using Dynamic Machine Learning
    • An Encryption Based Security Model for Preventing Phishing Attacks 

      مطاوع, ضياء الدين نصر عبد العظيم; Motawa, Dyaa Eldeen Nasr; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-05-05)
      Abstract Currently, Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has become an organized criminal activity. Spoofed emails claiming to be from ...
    • Endothelial Gene Expression Profile of Placental Mesenchymal stem Cells (pMSCs) Immune Modulated in Diabetes Condition 

      خليفة, سندس عصام فهيم; Khalifa, Sondos Essam; أبو مرعي, محمد حسن . مشرف رئيس; مسعودي, صافية عبد السلام . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019-04-22)
      Study question: 1- Can placental mesenchymal stem cells (pMSCs) modify the harmful effects of monocytes and high glucose concentration on endothelial cell function? 2- Which genes in endothelial cells are modified under ...
    • An Enhanced Approach for DNS Pharming Detection 

      Al-Dossary, Fahad Badi Abdulmohassen Amari; الدوسري, فهد بادي عبدالمحسن العماري; الشريف, أحمد علي (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Phishing attack has many time on sub attack under it, pharming is one of those attack which use the social engineering method to pinch user sensitive information. It is more advanced than normal phishing attack, in pharming ...

      Alsheddi, Lamya Fahad Ali; الشدي, لمياء فهد علي; عناب, نسرين محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Nowadays, the data, especially big data, became a valuable asset for organizations, businesses and individuals. They collect data that helps making decisions and improving their functions. However, the collected data from ...