Showing 1 - 2 results of 2 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Ibrahim, Mohammed
    Published 2021
    ... of people’s lives. However, most IoT devices are vulnerable to botnet attacks. To defend these devices...
    Get full text
    Thesis
  2. 2
    by Jamal, Fara
    Published 2021
    ... a security attack. Also, user attributes are stored in the block storage using an InterPlanetary...
    Get full text
    Thesis