Search alternatives:
data interception » data injection (Expand Search)
Showing 1 - 13 results of 13 for search 'data interception', query time: 0.06s Refine Results
  1. 1
  2. 2

    The TOR Data Communication System by Haraty, Ramzi A.

    Published 2014
    “…Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 3

    The TOR Data Communication System by Haraty, Ramzi A.

    Published 2014
    “…Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 4

    Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems by Haraty, Ramzi A.

    Published 2016
    “…In this case confidential data might be intercepted or read by hackers. We cannot consider any centralized control for securing data since we cannot assume any central third party security infrastructure (e.g., PKI) to protect confidential data in a data sharing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 5

    The NetCamo data communication system by Haraty, Ramzi A.

    Published 2015
    “…This paper presents a thorough study of NetCamo-one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 6
  7. 7

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones by Syeda Nazia Ashraf (17541222)

    Published 2023
    “…<p dir="ltr">The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with robust data communication services across multiple platforms. …”
  8. 8
  9. 9

    Tracking and repairing damaged healthcare databases using the matrix by Haraty, Ramzi A.

    Published 2015
    “…Local databases in e-health service providers might be intercepted during the exchange of data and read by intruders; and malicious transactions may damage data that is highly confidential. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 10

    The probabilities of type I and II error of null of cointegration tests: A Monte Carlo comparison by Ahmet Faruk Aysan (11902115)

    Published 2022
    “…The three cases of deterministic part considered are: absence of both intercept and linear time trend, presence of only the intercept and presence of both the intercept and linear time trend. …”
  11. 11

    Synthesis of evidence from zero‐events studies: A comparison of one‐stage framework methods by Chang Xu (102022)

    Published 2023
    “…Numerous methods provide valid solutions to synthesizing data from studies with zero-events, either based on a frequentist or a Bayesian framework. …”
  12. 12

    A Review of Evapotranspiration Measurement Models, Techniques and Methods for Open and Closed Agricultural Field Applications by Ikhlas Ghiat (16932564)

    Published 2021
    “…This review offers important directions for the estimation of evapotranspiration rates depending on the agricultural setting and the available climatological and physiological data, in addition to experimentally based adaptation processes for ET models. …”
  13. 13

    Global fertility in 204 countries and territories, 1950–2021, with forecasts to 2100: a comprehensive demographic analysis for the Global Burden of Disease Study 2021 by Natalia V, Bhattacharjee

    Published 2024
    “…Uncertainty from past data inputs and model estimation was propagated throughout analyses by taking 1000 draws for past and present fertility estimates and 500 draws for future forecasts from the estimated distribution for each metric, with 95% uncertainty intervals (UIs) given as the 2·5 and 97·5 percentiles of the draws. …”
    Get full text
    Get full text
    Get full text
    article