Showing 1 - 4 results of 4 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Sapri, Nurnadia
    Published 2015
    ..., it is unsecure because the attacker can break security parameters to obtain access to the data that currently...
    Get full text
    Thesis
  2. 2
    by Mat Isa, Mohd Anuar
    Published 2018
    ... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...
    Get full text
    Thesis
  3. 3
    by Mohamed, Nur Nabila
    Published 2019
    ... lacks of access control mechanism and no protection from Man In The Middle (MITM) attack. The security...
    Get full text
    Thesis
  4. 4
    by Atefi, Kayvan
    Published 2019
    ..., therefore the results may no longer be applicable and are not reliable within the current attacks. Further...
    Get full text
    Thesis