-
1by Aladaileh, Mohammad Adnan Ahmad“... technology is not free from new security concerns. The Distributed Denial of Service (DDoS) attack is one...”
Published 2021
Get full text
Thesis -
2by C. Arjuman, Navaneethan“... flaw within RD protocol has led to Fake RA attacks. Studies shows that the standard RD protocol...”
Published 2021
Get full text
Thesis -
3by Omolara, Abiodun Esther“... scheme to address brute-force attacks specifically in the context of password-based encryption systems...”
Published 2020
Get full text
Thesis -
4by Ali Mohamed, Nachaat Abdelatif“... organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent...”
Published 2022
Get full text
Thesis -
5by Mahmoud Al-Emari, Salam Radi“... to light due to the existing attacks that targeted Ethereum, for instance, the Ethereum DAO attack...”
Published 2022
Get full text
Thesis -
6by Memon, Ubedullah“...Since the last decade, terrorist attacks on the government primary schools of Pakistan surged rage...”
Published 2022
Get full text
Thesis -
7by Lim, Say Yarn“... known, watermark information which is embedded in frequency domain is more robust to attacks. Logo...”
Published 2007
Get full text
Thesis -
8by Mustapha, Mohammed“... attacks by the BH terror group in northeastern Nigeria, with devastating consequences on the national...”
Published 2022
Get full text
Thesis -
9by Jameel, Mahmood Subhi“... to corrosion, chemical attacks, high surface area to volume ratio and hold massive potential to be strong...”
Published 2021
Get full text
Thesis