Survey on data modification attacks
One of the challenging areas in computer science is to keep the data and information safe and assure. Due to very tight competition and sensitive data for the owner although they spend billions of dollars annually to make sure there are no threats or vulnerabilities against their assets, but up unti...
Saved in:
Main Authors: | Jama, Ahmed Yousuf, Sirat @ Md. Siraj, Maheyzah |
---|---|
Format: | Article |
Published: |
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/60433/ https://www.ijser.org/researchpaper/Survey-on-Data-Modification-Attacks.pdf. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A survey on attacks in RFID networks
by: Alizadeh, Mojtaba, et al.
Published: (2012) -
Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey
by: Albasheer, Hashim, et al.
Published: (2022) -
Oil well detection system for seismic surveying based on internet of things (IoT)
by: Mohd. Puad, Norsyazwani, et al.
Published: (2020) -
Privacy preserving data mining based on geometrical data transformation method (GDTM) and k-means clustering algorithm
by: Sirat @ Md. Siraj, Maheyzah, et al.
Published: (2018) -
Classification of sexual harassment on Facebook using term weighting schemes
by: Sirat @ Md. Siraj, Maheyzah, et al.
Published: (2018)