Showing 1 - 20 results of 20 for search '"Attacker"', query time: 0.07s Refine Results
  1. 1
    by Haron, Haliza
    Published 2015
    ... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...
    Get full text
    Get full text
    Thesis
  2. 2
    by Mohd Salleh, Nurhashikin
    Published 2018
    ... uses the Internet as their platform to form online communities and launch their attack...
    Get full text
    Get full text
    Thesis
  3. 3
    by Salih Ali, Nabeel
    Published 2015
    ... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...
    Get full text
    Get full text
    Thesis
  4. 4
    by Abdullah, Raihana Syahirah
    Published 2016
    ...Botnets is a tool for high-profile cyber-attack. It is a collection of compromised computer...
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
    by Ahmad, Nazrul Muhaimin
    Published 2018
    ... rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To...
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20