Browsing PhD and MSc Theses- Faculty of Information Technology by Supervisor "tbarhoom"
Now showing items 1-20 of 30
-
A DATA MINING BASED FRAUD DETECTION MODEL FOR WATER CONSUMPTION BILLING SYSTEM IN MOG
(الجامعة الإسلامية - غزة, 2012)Financial losses due to financial frauds are mounting, recognizing the problem of losses and the area of suspicious behavior is the challenge of fraud detection. Applying data mining techniques on financial statements can ... -
A Model for Strengthening Accuracy in Detecting the Anomalous Firewall Rules in Small Network (SADAR)
(الجامعة الإسلامية - غزة, 2015)The firewall policy rules is a core technology that has an important role in the network security, through controlling the traffic with income and outgoing the packets over the network. Moreover, the management of the ... -
A Model to Detect the Integrity Violation of Shared File in the Cloud
(الجامعة الإسلامية - غزة, 2016)Nowadays, there is an increasing trend in outsourcing data to remote cloud servers, where users store their data at specific storage space offered by Cloud service provider (CSP) with low cost. Many of cloud service provider ... -
A model to ensure tha integrity of user's data in the cloud
(الجامعة الإسلامية - غزة, 2014) -
A Personalized Context-Dependent Web Search Engine Using Word Net (Sama Search Engine)
(the islamic university, 2012)It is a fact that the growth of information resources on the WWW is increasing at every moment. So, it has increasingly become difficult for users to find information satisfies their individual needs. The current search ... -
abnormal network trafic detection based on clustering and classification techniques dos case study
(الجامعة الإسلامية - غزة, 2013) -
Adaptive Worms Detection Model Based on Multi Classifiers
(الجامعة الإسلامية - غزة, 2012)In recent times, the networks security has become a place of interest of researchers, threats has become an issue for each networks system, and a source of concern. Worms attacks have been major security threats to networks ... -
An Approach for Detecting and Preventing DoS Attacks in LAN
(الجامعة الإسلامية - غزة, 2015)Nowadays, Denial of service (DoS) attacks, have become a major security threat to networks and to the Internet, DoS is harmful to the networks as it delays legitimate users from accessing the server, usually services such ... -
An Efficient Approach for Supporting Multi-Tenancy Schema Inheritance in RDBMS for SaaS
(الجامعة الإسلامية - غزة, 2015)Multi-tenant data management is a major application of Software as a Service (SaaS) , whereby a third party service provider hosts databases as a service and provides its customers with needed services. SaaS applications ... -
Client Side Action Against Cross Site Scripting Attacks
(the islamic university, 2012)Cross-Site Scripting is one of the main attacks of many Web-based services. Since Web browsers support the execution of scripting commands embedded in the retrieved content, Attacker can gain this feature maliciously to ... -
Detecting DDoS Attack Using A Multilayer Data Mining techniques
(الجامعة الإسلامية - غزة, 2015)Availability is one of the three main components of computer security, along with confidentiality and integrity. One of the major threats to network security is Denial of Service (DDoS),which is a relatively simple, but ... -
detecting polymorphic no operations in shellcode based on mining techniques
(الجامعة الإسلامية - غزة, 2016) -
Detection and Prevention of XSS Vulnerabilities in MOODLE
(الجامعة الإسلامية - غزة, 2016)MOODLE (Modular Object-oriented Dynamic Learning Environment) is one of the most popular e-learning environment in the world, MOODLE is same as web application that vulnerable to illegal attacks so, the need for confidentiality, ... -
Detection Model for Pharming Attack Based on IP-Address Check and Website Predictability
(الجامعة الإسلامية - غزة, 2013)With the deployment of broadband Internet access, the importance of saving sensitive personal and financial information becomes more troubling, so it has become necessary to search for appropriate and effective solutions ... -
enhanced context aware role based access control framework for pervasive environment
(الجامعة الإسلامية - غزة, 2014) -
Enhancing of CryptoBI Algorithm for Data Security in Local Area Network
(الجامعة الإسلامية - غزة, 2015)The CryptoBI version1 “A Novel Cryptography Method Based on Image for Key Generation” algorithm is a new type of symmetric encryption algorithm that prevents the attacks and avoids key exchange between the two sides of ... -
Exploring Guidance for prevent aginst XSS attacks in open CMS
(الجامعة الإسلامية - غزة, 2014) -
Filtering Features and Recommender Model For Messaging System of MOODLE FRMM
(الجامعة الإسلامية - غزة, 2014)E-learning systems are powerful way for enriching learning and teaching process. With the spread of this culture, there is a need for Learning management system as MOODLE, aTutor , canvas and Sakai. MOODLE allows students ... -
implementing and comprising of otp techniques totp , hotp , crotp to prevent replay attack in radius protocol
(الجامعة الإسلامية - غزة, 2014) -
Improve Radiologists Productivity in Hospitals Based on Data Mining Techniques
(الجامعة الإسلامية - غزة, 2017)Modern radiology departments have enormous databases of images and text. Like any databases, which are rich in data content, but poor in information content. Data Mining is an effective tool that extracts useful information ...