Showing 1 - 3 results of 3 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Kamarudin, Nazhatul Hafizah
    Published 2018
    ... threatened by security attacks. It is noted that the use of username and password as an authentication scheme...
    Get full text
    Thesis
  2. 2
    by Azman, Nor Fazalina
    Published 2016
    ... to login to the web page. The proposed technique is proven to mitigate few types of attacks such as Man...
    Get full text
    Thesis
  3. 3
    by Aziz, Syaidahtul Badriyah
    Published 2015
    ... are motivated by their different background and need. Physical attack, such as node cloning gives...
    Get full text
    Thesis