155 results on '"Al-Qassas A"'
Search Results
2. An empirical evaluation of link quality utilization in ETX routing for VANETs
3. A new approach for detecting process injection attacks using memory analysis.
4. Priority populations’ experiences of isolation, quarantine and distancing for COVID-19: protocol for a longitudinal cohort study (Optimise Study)
5. A systematic review of detection and prevention techniques of SQL injection attacks.
6. Data Fusion and the Impact of Group Mobility on Load Distribution on MRHOF and OF0
7. Priority populations' experiences of isolation, quarantine and distancing for COVID-19: protocol for a longitudinal cohort study (Optimise Study)
8. A Scoring System for Information Security Governance Framework Using Deep Learning Algorithms: A Case Study on the Banking Sector.
9. An empirical evaluation of link quality utilization in ETX routing for VANETs.
10. The status of information security systems in banking sector from social engineering perspective.
11. A new architecture for voice interconnection using packet switched network.
12. Advanced security testing using a cyber-attack forecasting model: A case study of financial institutions.
13. Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review
14. ULTRASOUND GUIDED QUADRATUS LUMBORUM ANALGESIA: DIFFERENT APPROACHES IN ORTHOPEDIC LOWER LIMB SURGERY UNDER SUBARACHNOID ANESTHESIA
15. Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security.
16. On the performance of traffic-aware reactive routing in MANETs
17. A New Approach for Detecting Process Injection Attacks Using Memory Analysis
18. ArgMed: A Support System for Medical Decision Making Based on the Analysis of Clinical Discussions
19. Software Design and Experimental Evaluation of a Reduced AES for IoT Applications
20. Randomness Analysis of DES Ciphers Produced with Various Dynamic Arrangements.
21. A Group Leader Location Hiding Technique for VANETs.
22. Analysis of Clinical Discussions Based on Argumentation Schemes.
23. An Interactive System for Documentation and Analysis of Clinical Discussions.
24. A Secure Cloud Computing Model based on Data Classification.
25. Secure and Efficient Cloud Computing Framework.
26. Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security
27. Investigating Vincenti Engineering Principles in Support to the Auditing of Measurement Processes in Agile Organizations.
28. Routing and the Impact of Group Mobility Model in VANETs.
29. Supporting Medical Decision Making through the Analysis of Clinical Discussions.
30. Inclusion of Cultural and Linguistic Diversity in COVID-19 Public Health Research: Research Design Adaptations to Seek Different Perspectives in Victoria, Australia
31. A Secure Cloud Computing Model based on Data Classification
32. Data Fusion and the Impact of Group Mobility on Load Distribution on MRHOF and OF0
33. An economic study to estimate the water footprint of the most important strategic crops in Egypt
34. A systematic review of detection and prevention techniques of SQL injection attacks
35. Email Fraud Attack Detection Using Hybrid Machine Learning Approach
36. A systematic review of detection and prevention techniques of SQL injection attacks.
37. Performance Study of End-to-End Traffic-Aware Routing.
38. Performance Evaluation of a New End-to-End Traffic-Aware Routing in MANETs.
39. Systematic Review of E-commerce Security Issues and Customer Satisfaction Impact
40. A Hybrid Protocol Using Fuzzy Logic and Rough Set Theory for Target Coverage
41. Advanced security testing using a cyber‐attack forecasting model: A case study of financial institutions
42. Systematic Review of E-commerce Security Issues and Customer Satisfaction Impact
43. Performance comparison of end-to-end and on-the-spot traffic-aware techniques.
44. A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion
45. Inclusion of Cultural and Linguistic Diversity in COVID-19 Public Health Research: Research Design Adaptations to Seek Different Perspectives in Victoria, Australia
46. An economic study to estimate the water footprint of the most important strategic crops in Egypt
47. The Impact of Varying Sinks on Load Distribution in IoT Routing Under Static and Mobile Scenarios
48. Software Design and Experimental Evaluation of a Reduced AES for IoT Applications
49. Bandwidth-efficient routing protocol for mobile ad hoc networks.
50. The Impact of Varying Sinks on Load Distribution in IoT Routing Under Static and Mobile Scenarios
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.