Search Results - "Shahid"
Suggested Topics within your search.
Suggested Topics within your search.
- Islam 5
- Doctrines 2
- Banks and banking 1
- Computer networks 1
- Examination questions 1
- Faith (islam) 1
- Foreign relations 1
- God (islam) 1
- History 1
- Industrial organization 1
- Islamic Law 1
- Islamic meditations 1
- Man (Islam) 1
- Management accounting 1
- Master of ceremonies 1
- Oratory 1
- Physiology 1
- Privacy, Right of 1
- Radiography 1
- Radiology, Medical 1
- Religious aspects 1
- Repentance 1
- Security measures 1
- Speechwriting 1
- Terrorism 1
- Travel 1
- Vibration 1
- customs and practices 1
- customs and practies 1
- islam 1
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
Effectiveness Of The Malaysia's Command Centre For Cyber Security Operations In Safeguarding The Country
Published 2024Thesis Book -
13
Keupayaan laut menjadi sumber tenaga alternatif (diperbaharui) di Malaysia
Published 2008Thesis Book -
14
-
15
-
16
-
17
-
18
-
19
Security and privacy management, techniques, and protocols
Published 2018Table of Contents: “…A lightweight authentication & encryption protocol for secure communications between resource limited devices without hardware modification : resource limited device authentication / Piotr Ksiazak, Letterkenny Institute of Technology, Ireland, Kevin Curran, Ulster University, United Kingdom -- Role of cryptography in security / Sarvesh Tanwar, Mody University of Science and Technology, Lakshmangarh, India, Anil Kumar, Mody University of Science & Technology, India -- Risk assessment in virtualization / Dev Pandey, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalaya, India, Bharat Mishra, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalya, India -- Metamorphic malware detection using minimal opcode statistical patterns / Mahmood Fazlali, Shahid Beheshti University, Iran, Islamic Republic of Iran -- False alarm reduction : a profiling mechanism and new research directions / Salima Hacini, Constantine University, Algeria, Zahia Guessoum, Pierre et Marie Curie University, France, Mohamed Cheikh, Lire Laboratory, Constantine2 University, Algeria -- Trust-based analytical models for secure wireless sensor networks / Aminu Usman, Auckland University of Technology, Nigeria, Jairo Gutierrez, Auckland University of Technology, New Zealand, New Zealand -- Intrusion detection systems alerts reduction new approach for forensics readiness / Aymen Akremi, Umm Al-Qura University, Saudi Arabia, Hassen Sallay, Umm Al-Qura University, Saudi Arabia, Mohsen Rouached, Sultanate Qabus University, Oman -- Security visualization extended review issues,classifications, validation methods,trends, extensions / Ferda Özdemir Sönmez, Middle East Technical University, Turkey, Banu Günel, Middle East Technical University, Turkey…”
Book


