Browsing PhD and MSc Theses- Faculty of Information Technology by Supervisor "tbarhoom"
Now showing items 21-30 of 30
-
LSBs Steganography Based on R-Indicator
(الجامعة الإسلامية - غزة, 2017)Steganography is the art and science of hiding secret data inside other data called the cover data. This makes it hard to detect the existence of the secret data by third parties. There are different models of carrier that ... -
Malware Detection Based on Permissions on Android Platform Using Data Mining
(الجامعة الإسلامية - غزة, 2016)With the spreading of smart mobile devices to nearly every person, Android Operating System is dominating the mobile’s operating systems. Due to the weak policy of submitting application to Google Play store, attackers ... -
Network Intrusion Detection Using One-Class Classification Based on Standard Deviation of Service's Normal Behavior
(الجامعة الإسلامية - غزة, 2015)Computer networks and internet have been increasingly used in our daily life. Due to the explosive growth of network attacks, network intrusion detection systems (NIDS) have become an essential network component which plays ... -
New Method to Detect Text Fabrication in Scanned Documents
(الجامعة الإسلامية - غزة, 2015)In our life, we rely on the documents and papers almost in all transaction areas, and with the importance of these documents, there is a new crime appeared in the society called, documents forgery, and it is one of the ... -
Prediction Model Based on Time Series for Chloride and Nitrate Concentration in Municipal Groundwater Wells in Gaza Strip
(الجامعة الإسلامية - غزة, 2017) -
Spyware Detection Using Data Mining for Windows Portable Executable Files
(الجامعة الإسلامية - غزة, 2013)Malware represents a significant problem that threatens the security of computer systems. Spyware is one of the recent types of malware that represents a serious threat to confidentiality. The traditional approaches using ... -
Steganography within LSB and Second LSB with Randomness Depending on Indicators Using Secret Key
(الجامعة الإسلامية - غزة, 2017)Steganography is the art of science that is concerned with hiding communications by hiding secret information inside a medium as a carrier, called cover medium, to be sent over communication channels to meant parties. ... -
Time Estimation for Next Request to Prevent DOS Attack on RESTful Services
(الجامعة الإسلامية - غزة, 2016)Systems are getting integrated faster and easier using web API, as applications and cloud API’s nowadays are shifting to REST-based services in the detriment of SOAP-based ones. RESTful services are a lightweight alternative ... -
Wireless Intrusion Detection Enhancement using Backpropagate Neural Network
(the islamic university, 2011)IEEE 802.11 wireless networks (WLANs) through its evolution stages are vulnerable for service availability security issues, Denial-of-Service (DoS) attacks are the most danger for the availability of the WLANs. Many of the ... -
Wormhole Attack Detection and Prevention Model in MANET Based on Hop-Count and Localization
(الجامعة الإسلامية - غزة, 2015)Due to the nature of wireless transmission in Mobile Ad-Hoc Networks (MANET), has more security issues compared to wired networks. Among of all of these security issues, wormhole attack is considered to be a very serious ...