Showing 61 - 80 results of 215 for search '"Attacker"', query time: 0.05s Refine Results
  1. 61
    by Daud, Muhamad Azlan
    Published 2014
    ... input. Alvarez through his one-time pad attack successfully attacked the Baptista cyptosystem. Ariffin...
    Get full text
    Thesis
  2. 62
    by Shojanazeri, Hamid
    Published 2013
    ... as watermarks to provide malicious attack classification and locating tampered area. The Zernike moments...
    Get full text
    Thesis
  3. 63
    by Alamjuri, Roziela Hanim
    Published 2008
    ... is non-durable. It is susceptible to fungal and termite attacks. Hence, there is a need to treat bamboo...
    Get full text
    Thesis
  4. 64
    by Alezabi, Kamal Ali Ahmed
    Published 2017
    ... of the existing authentication schemes are complex and vulnerable to network attacks such as User Identity...
    Get full text
    Thesis
  5. 65
    by Adeeb, Jnaidi Saed Maher
    Published 2019
    ...Since the period followed the September 11 in 2001 attack, and the second Palestinian uprising...
    Get full text
    Thesis
  6. 66
    by Ismail, Haqi Khalid
    Published 2021
    ..., and impersonation attacks. Cybercriminals can take advantage of insecure communication to perform attacks that lead...
    Get full text
    Thesis
  7. 67
    by Liew, Seow Wooi
    Published 2019
    .... Traditionally, phishing attacks target email, but now they have reached to Online Social Networks (OSNs) like...
    Get full text
    Thesis
  8. 68
    by Alkinany, Enas Akeel Raheem
    Published 2019
    .... However, Spoof attacks remain the main challenge faced by facial biometric systems. A spoof attack arises...
    Get full text
    Thesis
  9. 69
    by Mohamed Ahmed, Osman
    Published 1997
    ..., when the airplane flies at low speeds and small angles of attacks, the lift provided by single...
    Get full text
    Thesis
  10. 70
    by Jamil, Norziana
    Published 2013
    ... weight as compared to the existing formula of message expansion. This leads the effort of attackers...
    Get full text
    Thesis
  11. 71
    by Ahmad, Nordila
    Published 2015
    ... rectangular pier was chosen for inclusion in an experiment on skewed piers at various angles of attack...
    Get full text
    Thesis
  12. 72
    by Lee, Weng Wah
    Published 2002
    ...Soil salinity and attack by pathogen a re the major abiotic stresses in plant agriculture...
    Get full text
    Thesis
  13. 73
    by Roslan, Nuur Alifah
    Published 2018
    ... that will also not raise suspicion when written. Besides that, other concerns are active attacks by intruders...
    Get full text
    Thesis
  14. 74
    by Hwang, Siaw San
    Published 2002
    ...Enhanced disease resistance and plant defense response against pathogen attack and environmental...
    Get full text
    Thesis
  15. 75
    by Tea, Boon Chian
    Published 2014
    ... unauthorized and cheating parties, which either passively or actively attack the scheme. Recently...
    Get full text
    Thesis
  16. 76
    by Ong, Bee Suan
    Published 2000
    ... was most marked in the attack and release portions of the ADSR envelope. The results also showed...
    Get full text
    Thesis
  17. 77
    by Alfaris, Rand Qusay
    Published 2009
    ... the attack, because every attack requires solving a system of non-linear equations. The decimal cryptosys...
    Get full text
    Thesis
  18. 78
    by Abbas, Borkan Ahmed
    Published 2016
    ... anomaly detection with the proficiency to recognize unforeseen attacks. An IDSs should provide high...
    Get full text
    Thesis
  19. 79
    by Kamarul Aizan, Nur Hanani
    Published 2012
    ... both protocols in 802.11i WLAN environment. The parameters used for this research are with attack...
    Get full text
    Thesis
  20. 80
    by Saeed, Auday H.
    Published 2015
    ... the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking...
    Get full text
    Thesis