-
1by Alahmadi, Ahmed Mohammed A.“... to achieve these vital features the Bitcoin system should be provably secure against the attacks. Many...”
Published 2018
Get full text
Thesis -
2by Apandi, Mohamad Aiman Hanif“...In the wireless network, there is an attack called Wormhole attack that capable in confusing...”
Published 2019
Get full text
Thesis -
3by Al-Saadi, Mustafa Yahya ZakariyaSubjects: “...Denial of service attacks...”
Published 2018
Get full text
Thesis -
4by Hasan, Dahah Ahmed Haidarah“... threats is phishing attacks launched for the purpose of stealing certain sensitive information of victims...”
Published 2019
Get full text
Thesis -
5by Izaddoost, Alireza“... to its intended users. The Denial of Service (DoS) attacks are becoming more serious in security...”
Published 2008
Get full text
Thesis -
6by Ghobadifar, Faranak“... in the fields. The main purpose of this research was to determinate pest attack in paddy field using remote...”
Published 2015
Get full text
Thesis -
7by Ahmed, Dana Hasan“... Reflection Denial of Service (DRDoS) attacks which are called Reflection/Amplification and hassles...”
Published 2017
Get full text
Thesis -
8by Javan, Ali“... threats including coordinated distributed attacks have flourished against the vital services and priceless...”
Published 2011
Get full text
Thesis -
9by Hussein, Noor Sabeeh“... kinds of attacks like denial of service attacks, sybil attacks, jamming attacks, black/sink hole attacks...”
Published 2016
Get full text
Thesis -
10by Rastegari, Samaneh“.... In order to prevent this system from different types of attacks, we need to prepare a classification...”
Published 2009
Get full text
Thesis -
11by Mohd Ariffin, Noor Afiza“... data against all types of attacks. Furthermore, most current research only focuses on improving...”
Published 2017
Get full text
Thesis -
12
-
13by Mustafa, Mohd Nawawi“... security incidents is failure to determine the root cause of an incident, thus allowing the attacker...”
Published 2015
Get full text
Thesis -
14by Shaukat, Haafizah Rameeza“... them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks...”
Published 2014
Get full text
Thesis -
15by Abdul Razak, Aina Nabila“... to be protected from any attacks. The malware detection process becomes a challenge because the attacker has a new...”
Published 2019
Get full text
Thesis -
16by Enshaei, Mehdi“... to attacks due to the open, cooperative and dynamic nature and needs a new method for secure communication...”
Published 2015
Get full text
Thesis -
17by Che Hasan, Hafizah“.... However, NFC is susceptible to some attacks such as data fabrication and eavesdropping. Thus, the mobile...”
Published 2018
Get full text
Thesis -
18by Malekzadeh, Mina“.... The main threats against availability of the networks are Denial of Service (DoS) and replay attacks...”
Published 2011
Get full text
Thesis -
19by AlRashidi, Bedour Fahhad HamedSubjects: “...Denial of service attacks...”
Published 2015
Get full text
Thesis -
20by Khan, Samia“... the disadvantage of being attacked by various types of attacks, specifically black hole attacks and Distributed...”
Published 2018
Get full text
Thesis