استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Statistical Text Steganography for Arabic Language Using Markov Chains /
Developing a Performance-based Tool for Arabic Text Steganography /
Information Hiding Using Intelligent Steganography/
Improving the performance of naïve nayes algorithm for Arabic text categorization \
Understanding the Acceptance of Fingerprint-Based Authentication for E-payment Based on Extended Valence Framework /
Racism Detection in Twitter Using Deep Learning and Text Mining Techniques for the Arabic language /
Elementary statistics using Excel /
Developing a host intrusion prevention system by using data mining \
Video Compression Techniques' Performance in Altering Steganography Messages /
Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /
Arabic text classification techniques using the multivariate Bernoulli \
Discovering statistics using SAS : (and sex and drugs and rock roll) /
Text Book of Business statistics /
Text book of Elementary statistics \
Text generation : using discourse strategies and focus constraints to generate natural language text /
Principles of information systems security : text and cases /
Detecting Violence In Videos Using Movies Transcripts (Arabic Movie Or Dubbed Animations) By Using Text Mining Techniques /
Cryptography and network security : principles and practice /
A Proposed Blockchain-based Personal Health Records System for Managing Authority for Emergency Access /
Matrix algebra useful for statistics /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
A Framework and IoT-based Accident Detection System to Securely Report Accident and Driver's Private Information /
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Arabic Handwritten Character Segmentation Using Graph Theory Algorithm /