-
1by Haron, Haliza“... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...”
Published 2015
Get full text
Get full text
Thesis -
2by Mohd Salleh, Nurhashikin“... uses the Internet as their platform to form online communities and launch their attack...”
Published 2018
Get full text
Get full text
Thesis -
3by Salih Ali, Nabeel“... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...”
Published 2015
Get full text
Get full text
Thesis -
4by Abdullah, Raihana Syahirah“...Botnets is a tool for high-profile cyber-attack. It is a collection of compromised computer...”
Published 2016
Get full text
Get full text
Thesis -
5
-
6by Ahmad, Nazrul Muhaimin“... rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To...”
Published 2018
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20