NUST Institutional Repository

Hardware based security solution for date exfiltration

Show simple item record

dc.contributor.author Shahzad, Shafay
dc.contributor.author Munir, Fahad
dc.contributor.author Haidar, Saqlain
dc.contributor.author Masood, Fahd
dc.contributor.author Supervised by Waleed Bin Shahid.
dc.date.accessioned 2020-11-03T06:36:59Z
dc.date.available 2020-11-03T06:36:59Z
dc.date.issued 2018-07
dc.identifier.other TCC-26 / BETE-51
dc.identifier.other PTC-327
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/8696
dc.description.abstract successful information exfiltration framework must utilize complex recognition procedures to seek out private information where it is put away, or in any blend of system activity, information very still or end point tasks. These systems may grasp halfway and exact information coordinating, organized information process, factual examination, broadened general articulation coordinating and dynamic and dictionary investigation. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Hardware based security solution for date exfiltration en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account