To search, Click below search items.
All Published Papers Search Service
Title
Buffer Overflow Attack and Defense Techniques
Author
Sabah M. Alzahrani
Vol. 21 No. 12 pp. 207-212
Keywords
Buffer; Overflow; Cybersecurity; Stack; Defense; Attack; Shellcode.
Phishing Attack Detection Using Deep Learning
Vol. 21 No. 12 pp. 213-218
Artificial Intelligence; Cybersecurity; Detection; Deep Learning; Phishing; Social Engineering; AWS; Spark; Distributed.
CSR and Governance Principles in Business Administration According to Deans of BA Schools Perspective: BA of Northern Border University as Case Study
Mahmoud Mohammad AL-Ajlouni1
Vol. 21 No. 12 pp. 219-222
College of Business Administration, Human Resources, Governance, Social Responsibility, Saudi Universities.
A Computer Oriented Solution for the Fractional Boundary Value Problem with Fuzzy Parameters with Application to Singular Perturbed Problems
Somia A. Asklany and I.K.Youssef,
Vol. 21 No. 12 pp. 223-227
fractional order linear BVP, finite difference method, Fuzzy , Fuzzy linear systems.