To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10701

Title

Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks

Author

Ghadah Aldabbagh

Citation

Vol. 21  No. 1  pp. 152-161

Keywords

D2D communications, 5G, ProSe , C-V2X, resource scheduling, power control.


Title

Honeypots Tools Study and Analysis

Author

Sultan Al-Jameel and Adwan Alownie Alanazi

Citation

Vol. 21  No. 1  pp. 162-173

Keywords

Honeypot, Security, low, medium, high, production, research, PentBox, honeydrive , attackers.


Title

Social Media Security and Attacks

Author

Sarah Almalki, Reham Alghamdi, Gofran Sami, and Wajdi Alhakami

Citation

Vol. 21  No. 1  pp. 174-183

Keywords

Social media security; Social media attacks; Privacy. Social media threats


Title

SECURITY THREATS AND ATTACKS IN CLOUDSECURITY THREATS AND ATTACKS IN CLOUD

Author

Asma Mohammed, Jamilah Al khathami and Wajdi Alhakami

Citation

Vol. 21  No. 1  pp. 184-191

Keywords

Cloud Computing; Security; Attacks; Threats.


[1] ... [prev] [1471] [1472] [1473] [1474] [1475] [1476] [1477] [1478] [1479] [1480] [next] ... [2676]