Showing 1 - 20 results of 33 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1
    by Muamer N., Mohammed
    Published 2011
    ... for researches and this connection is prone to vulnerability caused by the attackers in steeling information from...
    Get full text
    Thesis
  2. 2
  3. 3
    by Khalaf, Emad T
    Published 2012
    ... as possible with high visible quality in a way that it does not allow any attacker to even detect...
    Get full text
    Thesis
  4. 4
    by Mohammed Ismael, Saba
    Published 2018
    .... There is no possibility of an attacker breaking the cipher, as the scheme showed perfect confusion and diffusion...
    Get full text
    Thesis
  5. 5
    by Al Noman Ranak, Md Sayfullah
    Published 2018
    ... considerable number of attacks have been noted in the recent past. To resist these attacks, many passwords...
    Get full text
    Thesis
  6. 6
    by Khalid Hassan, Mohamed Edris
    Published 2016
    ...This thesis addresses the issue of image watermarking robustness against attacks and especially...
    Get full text
    Thesis
  7. 7
    by Juliza, Mohamad Arif
    Published 2022
    .... The openness of the Android mobile devices is extremely vulnerable to malware attacks. Even though various...
    Get full text
    Thesis
  8. 8
    by Ali, Mohammed Hasan
    Published 2019
    ... of false positive alerts, low detection rates of rare but dangerous attacks, and the need for a constant...
    Get full text
    Thesis
  9. 9
    by Al-Zarqawee, Aws Naser
    Published 2018
    ...Distributed denial-of-service (DDoS) attacks are incidents in a cloud computing environment...
    Get full text
    Thesis
  10. 10
    ... that can achieve consistent results when employed for the detection of multiple attack types. Hence...
    Get full text
    Thesis
  11. 11
    by Anwar, Shahid
    Published 2019
    ... coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service...
    Get full text
    Thesis
  12. 12
    by Mohamad Fadli, Zolkipli
    Published 2012
    ...-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a common...
    Get full text
    Thesis
  13. 13
    by Ng, Ke Huey
    Published 2021
    ..., it defeats the original purpose and prompts to be attacked by intruders. This study introduces a hybrid RDWT...
    Get full text
    Thesis
  14. 14
    by Tao, Hai
    Published 2012
    ... to geometric attacks is the most challenge work in traditional digital image watermarking techniques...
    Get full text
    Thesis
  15. 15
    by Thamer, Khalil Esmeel
    Published 2020
    .... With the technological advancement, the attackers have been developing new methods from time to time to gain access...
    Get full text
    Thesis
  16. 16
    by Noor Suhana, Sulaiman
    Published 2019
    ... systems and networks by looking for signatures of known attacks or deviations of normal activity. However...
    Get full text
    Thesis
  17. 17
    by Siti Suhaila, Sabarudin
    Published 2022
    ... and 40 mm) and grouser angle of attack (0 and 30-degree). The observation focuses on the flow of sand...
    Get full text
    Thesis
  18. 18
    by Juliawati, Alias
    Published 2016
    ... and grain boundaries attack. The presence of high population densities of cathodic Al8Mn5 particles in HFQ...
    Get full text
    Thesis
  19. 19
    by Muhammad Aizat, Azed
    Published 2021
    ..., the performances of the MSSA concrete towards aggressive environment were identified by using Acid Attack test...
    Get full text
    Thesis
  20. 20
    by Noor Suhani, Sulaiman
    Published 2023
    ... findings that may be brought into effective action to decrease the impact of cyber-attacks on government...
    Get full text
    Thesis