.

Browsing SoAS - Theses and Dissertations by Subject "Computer networks -- Security measures"

LAUR Repository

Browsing SoAS - Theses and Dissertations by Subject "Computer networks -- Security measures"

Sort by: Order: Results:

  • Zantout, Bassam (Lebanese American University, 2011-10-06)
    The aim of this research is to present a historical background of security techniques for avoiding traffic analysis as well as assuring data integrity throughout different implementations, theories, and real life scenarios ...
  • Jurdi, Ghenwa Al (Lebanese American University, 2016-03-03)
    Cooperation in wireless content distribution networks has been proposed as an effective approach to improve system performance in terms of bit rate enhancement and energy consumption reduction. To enable such cooperation, ...
  • Halawi, Ola (Lebanese American University, 2020-05-18)
    Enormous amounts of data collected from social networks or other online platforms are being published publicly for the sake of statistics, marketing, and research, among other objectives. The consequent privacy and data ...
  • Sanadiki, Hiba (Lebanese American University, 2016-01-28)
    In this thesis, we detect attacks targeting the cluster based QOLSR model in Mobile Ad Hoc Networks (MANETs). The QOLSR is a multimedia protocol that was designed on top of the Optimized Link State Routing (OLSR), where ...
  • Shehab, Maya (Lebanese American University, 2011-09-30)
    A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all inbound and outbound network actions and generates alarms when it detects suspicious or malicious attempts. A false positive ...
  • Zbib, Mirna (Lebanese American University, 2012-09-26)
    With the advancement of Internet technology, securing information systems from electronic attacks have become a significant concern. With all the preventive methods, malicious users still find new methods that overcome ...
  • Sai, Mohamed El (Lebanese American University, 2015-09-30)
    The age of Internet Technology that we are in has introduced new types of attacks to new assets that didn’t exist before. Databases that represent Information assets are subject to attacks that have malicious intentions ...
  • Chahoud, Mario (Lebanese American University, 2022-08-18)
    Traditional machine learning models are used to train their models on centralized data sets. Lately, data privacy becomes a real aspect to take into consideration while collecting data. For that, Federated learning plays ...
  • Semaan, Nabil H. (Lebanese American University, 2011-09-08)
    In this report, we provided a review of cryptography, smart card, and some algorithms. We also implement the algorithms: RSA for encryption and decryption of text, RSA for encryption and decryption of text using signature ...

Search LAUR


Advanced Search

Browse

My Account