dc.contributor.author | Shahzad, Shafay | |
dc.contributor.author | Munir, Fahad | |
dc.contributor.author | Haidar, Saqlain | |
dc.contributor.author | Masood, Fahd | |
dc.contributor.author | Supervised by Waleed Bin Shahid. | |
dc.date.accessioned | 2020-11-03T06:36:59Z | |
dc.date.available | 2020-11-03T06:36:59Z | |
dc.date.issued | 2018-07 | |
dc.identifier.other | TCC-26 / BETE-51 | |
dc.identifier.other | PTC-327 | |
dc.identifier.uri | http://10.250.8.41:8080/xmlui/handle/123456789/8696 | |
dc.description.abstract | successful information exfiltration framework must utilize complex recognition procedures to seek out private information where it is put away, or in any blend of system activity, information very still or end point tasks. These systems may grasp halfway and exact information coordinating, organized information process, factual examination, broadened general articulation coordinating and dynamic and dictionary investigation. | en_US |
dc.language.iso | en | en_US |
dc.publisher | MCS | en_US |
dc.title | Hardware based security solution for date exfiltration | en_US |
dc.type | Thesis | en_US |