-
1by Muamer N., Mohammed“... for researches and this connection is prone to vulnerability caused by the attackers in steeling information from...”
Published 2011
Get full text
Thesis -
2
-
3by Khalaf, Emad T“... as possible with high visible quality in a way that it does not allow any attacker to even detect...”
Published 2012
Get full text
Thesis -
4by Mohammed Ismael, Saba“.... There is no possibility of an attacker breaking the cipher, as the scheme showed perfect confusion and diffusion...”
Published 2018
Get full text
Thesis -
5by Al Noman Ranak, Md Sayfullah“... considerable number of attacks have been noted in the recent past. To resist these attacks, many passwords...”
Published 2018
Get full text
Thesis -
6by Khalid Hassan, Mohamed Edris“...This thesis addresses the issue of image watermarking robustness against attacks and especially...”
Published 2016
Get full text
Thesis -
7by Juliza, Mohamad Arif“.... The openness of the Android mobile devices is extremely vulnerable to malware attacks. Even though various...”
Published 2022
Get full text
Thesis -
8by Ali, Mohammed Hasan“... of false positive alerts, low detection rates of rare but dangerous attacks, and the need for a constant...”
Published 2019
Get full text
Thesis -
9by Al-Zarqawee, Aws Naser“...Distributed denial-of-service (DDoS) attacks are incidents in a cloud computing environment...”
Published 2018
Get full text
Thesis -
10by Mohammad Khamees Khaleel, Alsajri“... that can achieve consistent results when employed for the detection of multiple attack types. Hence...”
Published 2022
Get full text
Thesis -
11by Anwar, Shahid“... coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service...”
Published 2019
Get full text
Thesis -
12by Mohamad Fadli, Zolkipli“...-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a common...”
Published 2012
Get full text
Thesis -
13by Ng, Ke Huey“..., it defeats the original purpose and prompts to be attacked by intruders. This study introduces a hybrid RDWT...”
Published 2021
Get full text
Thesis -
14by Tao, Hai“... to geometric attacks is the most challenge work in traditional digital image watermarking techniques...”
Published 2012
Get full text
Thesis -
15by Thamer, Khalil Esmeel“.... With the technological advancement, the attackers have been developing new methods from time to time to gain access...”
Published 2020
Get full text
Thesis -
16by Noor Suhana, Sulaiman“... systems and networks by looking for signatures of known attacks or deviations of normal activity. However...”
Published 2019
Get full text
Thesis -
17by Siti Suhaila, Sabarudin“... and 40 mm) and grouser angle of attack (0 and 30-degree). The observation focuses on the flow of sand...”
Published 2022
Get full text
Thesis -
18by Juliawati, Alias“... and grain boundaries attack. The presence of high population densities of cathodic Al8Mn5 particles in HFQ...”
Published 2016
Get full text
Thesis -
19by Muhammad Aizat, Azed“..., the performances of the MSSA concrete towards aggressive environment were identified by using Acid Attack test...”
Published 2021
Get full text
Thesis -
20by Noor Suhani, Sulaiman“... findings that may be brought into effective action to decrease the impact of cyber-attacks on government...”
Published 2023
Get full text
Thesis