Your search returned 12 results.

Not what you expected? Check for suggestions
Mitigation technique against primary user emulation attack in cognitive radio networks Syed Bilal Haider Naqvi

by Naqvi, Syed Bila Haider (MSIS-10).

Publisher: Rawalpindi MCS (NUST) Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 HAI (1), Central Library (CL)Call number: 004 (2).
Detection of flooding distributed denial of service attacks in rule-based network intrusion detection systems Amtul Saboor

by Saboor, Amtul (MSIS-10).

Publisher: Rwp MCS 2014Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SAB (1).
Defense Against Insider Attacks (Sybil Attack) Using Code Testing Imran Makhdoom

by Makhdoom, Imran (MSIS-10).

Publisher: Rawalpindi MCS (NUST) April, 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MAK (1), Central Library (CL)Call number: 004 (1).
Discrete Fourier Transform Attack Maj Rashid Zulfiqar,

by Zulfiqar, Maj Rashid (MSIS-10).

Publisher: Rawalpindi MCS,NUST 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ZUL (1), Central Library (CL)Call number: 004 (2).
Forensic Analysis of Cloud Storage Service on Windows 8 Sidrat Mehreen

by Mehreen, Sidrat (MSIS-10).

Publisher: Rawalpindi MCS,NUST 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MEH (1), Central Library (CL)Call number: 004 (2).
Automated Analysis of Malware-Semantics Based Approach Muzzamil Noor

by Noor, Muzzamil (MSIS-10).

Publisher: Rawalpindi MCS,NUST 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 NOO (1).
Complex Network Model of Loss of Privacy in Social Network Contagion Komal Batool

by Batool, Komal (MSIS-10).

Publisher: Rawalpindi MCS,NUST 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 BAT (1), Central Library (CL)Call number: 004 (2).
Attacks and Countermeasures of Hash Chain Based Password Authentication Schemes Muhammad Shahzad Jan

by Jan, Muhammad Shahzad (MSIS-10).

Publisher: Rawalpindi MCS,NUST 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 JAN (1), Central Library (CL)Call number: 004 (2).
Data Integrity Validation of Open Source Idevice Forensic Tools with Reference to Commercial Tool Maryam Jalees Ahemd

by Ahmed, Maryam Jalees (MSIS-10).

Publisher: Rawalpindi MCS,NUST 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (1).
Detection of Advance Persistent Threat (APT) Maj Farhan Habib Ahmad

by Ahmad, Farhan Habib (MSIS-10).

Publisher: Rawalpindi MCS,NUST 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (1).
Implementation of Automated Security Focused Configuration Management in an Academic Organization Through Scap (NIST)/ Summayya Shahzad

by Shahzad, Sumayya | Supervisor : Dr. Baber Aslam.

Publisher: Rawalpindi MCS,NUST 2015Online access: Click here to access online Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SHA (1), Central Library (CL)Call number: 004 (2).
Design and Implementation of Scalable Ethnic Threats Archive With Customized Signatures Generation Competence Muhammad Awais

by Awais, Muhammad. (MSIS-10).

Publisher: rawalpindi MCS,NUST May, 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AWA (1), Central Library (CL)Call number: 004 (2).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.