-
1by Sapri, Nurnadia“..., it is unsecure because the attacker can break security parameters to obtain access to the data that currently...”
Published 2015
Get full text
Thesis -
2by Mat Isa, Mohd Anuar“... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...”
Published 2018
Get full text
Thesis -
3by Mohamed, Nur Nabila“... lacks of access control mechanism and no protection from Man In The Middle (MITM) attack. The security...”
Published 2019
Get full text
Thesis -
4by Atefi, Kayvan“..., therefore the results may no longer be applicable and are not reliable within the current attacks. Further...”
Published 2019
Get full text
Thesis