-
1Academic Journal
المصدر: Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 4, Pp 417-425 (2021)
مصطلحات موضوعية: Two factor authentication, Smart cards, Systematic framework, Protocol, Scheme, Rating, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: SHAHZAD NAEEM, MUHAMMAD HASAN ISLAM
المصدر: Mehran University Research Journal of Engineering and Technology, Vol 35, Iss 4, Pp 483-492 (2016)
مصطلحات موضوعية: Enterprise Resource Planning System Assurance, Information Systems Auditors, Enterprise Resource Planning, Risk Management., Technology, Engineering (General). Civil engineering (General), TA1-2040, Science
وصف الملف: electronic resource
-
3Academic Journal
المؤلفون: ZUBAIR AHMED KHAN, SAEED-UR-REHMAN, MUHAMMAD HASAN ISLAM
المصدر: Mehran University Research Journal of Engineering and Technology, Vol 35, Iss 3, Pp 359-372 (2016)
مصطلحات موضوعية: Wormhole Attack, Wormhole, Mobile Ad Hoc Network, Routing Table, Round Trip Time, Received Signal Strength Indicator, Technology, Engineering (General). Civil engineering (General), TA1-2040, Science
وصف الملف: electronic resource
-
4
المؤلفون: Sabir Ali Changazi, Asim Dilawar Bakhshi, Muhammad Yousaf, Muhammad Hasan Islam, Syed Muhammad Mohsin, Shahab S. Band, Abdulmajeed Alsufyani, Sami Bourouis
المصدر: Computer Communications. 193:109-117
مصطلحات موضوعية: Computer Networks and Communications
-
5
المؤلفون: Sabir Ali Changazi, Asim Dilawar Bakhshi, Muhammad Yousaf, Muhammad Hasan Islam, Syed Muhammad Mohsin, Mohammad Rafiq Mufti, Bashir Ahmad
-
6
المؤلفون: Zakir Ullah, Muhammad Hasan Islam, Adnan Ahmed Khan, Sohail Sarwar
المصدر: International Journal of Communication Networks and Information Security (IJCNIS). 8
مصطلحات موضوعية: Computer Networks and Communications
-
7
المؤلفون: Saeed ur Rehman, Muhammad Hasan Islam, Zubair Khan
المصدر: Mehran University Research Journal of Engineering and Technology, Vol 35, Iss 3, Pp 359-372 (2016)
مصطلحات موضوعية: lcsh:T, Computer science, Efficient algorithm, Wormhole Attack, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Wormhole attack, Routing Table, lcsh:Technology, Round Trip Time, Received Signal Strength Indicator, lcsh:TA1-2040, Wormhole, Mobile Ad Hoc Network, lcsh:Q, lcsh:Engineering (General). Civil engineering (General), lcsh:Science, General Agricultural and Biological Sciences, Algorithm
-
8
المؤلفون: Zakir Ullah, Adnan Ahmed Khan, Muhammad Hasan Islam
المصدر: 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
مصطلحات موضوعية: Dynamic Source Routing, Static routing, Computer science, business.industry, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Policy-based routing, 020206 networking & telecommunications, 020302 automobile design & engineering, 02 engineering and technology, Computer security, computer.software_genre, 0203 mechanical engineering, Optimized Link State Routing Protocol, Link-state routing protocol, Node (computer science), Multipath routing, 0202 electrical engineering, electronic engineering, information engineering, Trust management (information system), business, computer, Computer network
-
9
المؤلفون: Zakir Ullah, Muhammad Hasan Islam, Adnan Ahmed Khan, Imran Shafi
المصدر: International Journal of Ad Hoc and Ubiquitous Computing. 28:131
مصطلحات موضوعية: Computer Networks and Communications, Hardware and Architecture, Software
-
10
المؤلفون: Sanaa Waheed, Muhammad Hasan Islam, Izza Zubair
المصدر: 2009 First International Conference on Ubiquitous and Future Networks.
مصطلحات موضوعية: Computer science, business.industry, Wireless ad hoc network, Distributed computing, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Overlay network, Control reconfiguration, Peer-to-peer, computer.software_genre, Network topology, Gossip, The Internet, Gossip protocol, business, computer, Computer network
-
11
المؤلفون: Shoab A. Khan, Kamran Nadeem, Muhammad Hasan Islam
المصدر: 2009 International Conference on Advanced Computer Control.
مصطلحات موضوعية: Intranet, business.industry, Computer science, Node (networking), Application layer DDoS attack, Robust random early detection, Denial-of-service attack, Computer security, computer.software_genre, The Internet, Routing (electronic design automation), business, computer, Trinoo, Computer network
-
12
المؤلفون: Shoab A. Khan, Kamran Nadeem, Muhammad Hasan Islam
المصدر: 2008 International Conference on Innovations in Information Technology.
مصطلحات موضوعية: Intranet, Computer science, Wireless ad hoc network, business.industry, Node (networking), Application layer DDoS attack, Robust random early detection, Denial-of-service attack, Computer security, computer.software_genre, Routing (electronic design automation), business, Trinoo, computer, Computer network
-
13
المؤلفون: Zakir Ullah, Imran Shafi, Muhammad Hasan Islam, Adnan Ahmed Khan
المصدر: International Journal of Ad Hoc and Ubiquitous Computing. 1:1
مصطلحات موضوعية: Computer Networks and Communications, Hardware and Architecture, Packet drop attack, Aodv routing protocol, Computer science, business.industry, Network packet, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Mobile ad hoc network, business, Software, Insider, Computer network
-
14
المؤلفون: Shoab A. Khan, Baber Aslam, Muhammad Hasan Islam
المصدر: 2006 Proceedings of the First Mobile Computing and Wireless Communication International Conference.
مصطلحات موضوعية: Engineering, Spoofing attack, business.industry, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Local area network, Wi-Fi Protected Access, Denial-of-service attack, Computer security, computer.software_genre, Wireless security, IEEE 802.11, Identity theft, Wireless, business, computer, Computer network
-
15Academic Journal
المؤلفون: Imran Ijaz, Muhammad Hasan Islam, Maria Kanwal, Tahreem Yaqoob
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Index Terms — Cloud Computing, Secure User Authentication, PKI, VPN Server, X.509
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.678.175; http://www.ijsce.org/attachments/File/v4i3/C2304074314.pdf