A survey of intrusion detection system using case study Kuwait governments entiteis
The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may fin...
| Main Authors: | Alenezi, Khalid, Taha Alshaikhli , Imad Fakhri, al-kandari, Abdul Rahman, Al-Tayyar, Lulwa Ziad |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/42812/ http://irep.iium.edu.my/42812/1/07076866.pdf |
Similar Items
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
Kuwait government entities e-business continuity and
disaster recovery plan
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs)
by: Al-Enezi, Khaled Abdulkareem, et al.
Published: (2013)
by: Al-Enezi, Khaled Abdulkareem, et al.
Published: (2013)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
The influence of Internet and social media on purchasing
decisions in Indonesia and a comparison between
Indonesia and Kuwait
by: al-enizi, Khalid, et al.
Published: (2019)
by: al-enizi, Khalid, et al.
Published: (2019)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Detection and restoration of cracked digitized paintings and
manuscripts using image processing - a survey
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
Smart cities: a survey
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Traffic management system based on wsn in Kuwait: an initial design
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
CERT Technologies
by: Alenezi, Khalid, et al.
Published: (2015)
by: Alenezi, Khalid, et al.
Published: (2015)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
A new algorithm for human face detection using skin color tone
by: Zangana, Hewa Majeed, et al.
Published: (2013)
by: Zangana, Hewa Majeed, et al.
Published: (2013)
Rational drug design using genetic algorithm: case of malaria disease
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012)
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
CERT team involving GEs structured
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Detection of cracked digitized paintings and manuscripts
based on threshold techniques
by: abdulwahab, Nawafil, et al.
Published: (2019)
by: abdulwahab, Nawafil, et al.
Published: (2019)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Similar Items
-
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014) -
Kuwait government entities e-business continuity and
disaster recovery plan
by: Alenezi, Khalid, et al.
Published: (2014) -
e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs)
by: Al-Enezi, Khaled Abdulkareem, et al.
Published: (2013) -
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)