• Login
    Browsing Computing Dissertations and Theses by Supervisor 
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • Browsing Computing Dissertations and Theses by Supervisor
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • Browsing Computing Dissertations and Theses by Supervisor
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computing Dissertations and Theses by Supervisor "48187"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-8 of 8

    • title
    • date published
    • date added to RB
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack 

        Al-Jarrah, Zaid (2018)
        Cybersecurity is a very important area that needs to be worked on and improved. Day by day technology becomes closer to human life in many ways. In recent years, especially after the emergence of IoT and cloud computing, ...
      • Thumbnail

        A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce 

        Alahmadi, Alaa (2017-07)
        Rapid growth of E-commerce has made a huge number of products and services accessible to the users. The vast variety of options makes it difficult for the users to finalize their decisions. Recommender systems aim at ...
      • Thumbnail

        A crypto-economy based distributed & asynchronous hashgraphy algorithm for a tracking system 

        Kommushetty, Sushmitha (2018)
        RESEARCH QUESTIONS: •How Hashgraphy can be applied for real-time tracking of an object? •How Hashgraphy can be used to deliver real-time data from weather to traffic conditions by the tracking system? •How can Hashgraphy ...
      • Thumbnail

        Detecting Sybil attack in mobile wireless sensor networks using observer nodes 

        Alomirah, Abdulaziz Abdulrahman (2019)
        RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows:  How many observer nodes would be enough for a ...
      • Thumbnail

        An edge-based steganography algorithm for hiding text into images 

        Alomirah, Reem Abdulrahman (2019)
        RESEARCH QUESTIONS: • How can I improve existing steganography methods in terms of capacity and transparency? • How can I reduce the complexity of existing steganography methods? • How can I increase the robustness ...
      • Thumbnail

        Encryption, storage technology and security of data at rest 

        Alkorbi, Mohammed (2015-11)
        The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ...
      • Thumbnail

        Evaluation of WEP, WPA and WPA2 security protocols on 802.11ac client to server WLAN performance 

        Mohammed, Alghamdi Talal (2016)
        RESEARCH OBJECTIVE: The key objective of the research is to find out the impact of enabling security protocols on the WLAN performance in a real test bed environment. The research has measured the 802.11ac WLAN performance ...
      • Thumbnail

        Performance analysis of defense mechanisms against UDP flood attacks 

        Treseangrat, Kiattikul (2014)
        A Distributed Denial of Service (DDoS) attack remains one of the most common and devastating security threats to the Internet world. The main purpose of an attack is to disable the use of services on the Internet or the ...

        Library home
        Send Feedback
        Research publications
        Unitec
        Moodle
        © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142
         

         

        Usage Statistics

        For this collectionFor the Research Bank

        About

        About Research BankResearch at UnitecContact us

        Help for authors  

        How to add researchOpen Access GuideVersions Toolkit

        Register for updates  

        LoginRegister

        Browse Research Bank  

        EverywhereAcademic study areasAuthorDateSubjectTitleType of researchSupervisorThis CollectionAuthorDateSubjectTitleType of researchSupervisor

        Library home
        Send Feedback
        Research publications
        Unitec
        Moodle
        © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142