CERT Technologies
Members of the incident response team should have excellent technical skills, such as system administration, network administration, programming, technical support, malware analysis, and intrusion detection. Moreover, supporting system state and status reporting are associated with enabling aut...
| Main Authors: | Alenezi, Khalid, Alshaikhli, Imad Fakhri Taha, Abdullah, Lili Marziana, AlAhmad, Mohammad A. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJISM
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/45854/ http://irep.iium.edu.my/45854/1/IJISM_472.pdf |
Similar Items
CERT team involving GEs structured
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Kuwait government entities e-business continuity and
disaster recovery plan
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
Multicollisions in sponge construction
by: Alahmad, Mohammad A., et al.
Published: (2013)
by: Alahmad, Mohammad A., et al.
Published: (2013)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
A new fragile digital watermarking technique for a PDF digital Holy Quran
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A survey of intrusion detection system using case study Kuwait governments entiteis
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
SVG and Arabic font challenges and improvements
by: Taha, Imad, et al.
Published: (2013)
by: Taha, Imad, et al.
Published: (2013)
Achieving security by combining Huffman and SLSB algorithms
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Similar Items
-
CERT team involving GEs structured
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015) -
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017) -
Kuwait government entities e-business continuity and
disaster recovery plan
by: Alenezi, Khalid, et al.
Published: (2014) -
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)