3 Questions 16 Answers 0 Followers
Questions related from Aws Naser Jaber
I'm confuse for some related articles mentions that the Vulnerability Management have the Audit process. While, As I know Audit is complete separate audit.Another question what is the most...
13 November 2019 7,661 3 View
Im looking for the newest hybrid metaheuristic technique to use it over NSL data-set or any other DDoS datasets
30 June 2017 1,229 4 View
I try to search one paper between 2014-2016 talk about encrypt the data in cloud computing using ECDH + ANN. Thanks
28 March 2016 777 7 View