Showing 1 - 2 results of 2 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Uwadiegwu, Inyama Victor
    Published 2019
    ... there is inadequate security mechanism which an intruder or a man in the middle (MITM) attack can capture...
    Get full text
    Thesis
  2. 2
    by Manavi, Sina
    Published 2015
    ... memory. Finally, in the last evaluation, we performed a real world attack case study based on one...
    Get full text
    Thesis