To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10675

Title

Buffer Overflow Attack and Defense Techniques

Author

Sabah M. Alzahrani

Citation

Vol. 21  No. 12  pp. 207-212

Keywords

Buffer; Overflow; Cybersecurity; Stack; Defense; Attack; Shellcode.


Title

Phishing Attack Detection Using Deep Learning

Author

Sabah M. Alzahrani

Citation

Vol. 21  No. 12  pp. 213-218

Keywords

Artificial Intelligence; Cybersecurity; Detection; Deep Learning; Phishing; Social Engineering; AWS; Spark; Distributed.


Title

CSR and Governance Principles in Business Administration According to Deans of BA Schools Perspective: BA of Northern Border University as Case Study

Author

Mahmoud Mohammad AL-Ajlouni1

Citation

Vol. 21  No. 12  pp. 219-222

Keywords

College of Business Administration, Human Resources, Governance, Social Responsibility, Saudi Universities.


Title

A Computer Oriented Solution for the Fractional Boundary Value Problem with Fuzzy Parameters with Application to Singular Perturbed Problems

Author

Somia A. Asklany and I.K.Youssef,

Citation

Vol. 21  No. 12  pp. 223-227

Keywords

fractional order linear BVP, finite difference method, Fuzzy , Fuzzy linear systems.


[1] ... [prev] [2001] [2002] [2003] [2004] [2005] [2006] [2007] [2008] [2009] [2010] [next] ... [2669]