Showing 1 - 9 results of 9 for search '"Attacker"', query time: 0.02s Refine Results
  1. 1
    ... technology is not free from new security concerns. The Distributed Denial of Service (DDoS) attack is one...
    Get full text
    Thesis
  2. 2
    by C. Arjuman, Navaneethan
    Published 2021
    ... flaw within RD protocol has led to Fake RA attacks. Studies shows that the standard RD protocol...
    Get full text
    Thesis
  3. 3
    by Omolara, Abiodun Esther
    Published 2020
    ... scheme to address brute-force attacks specifically in the context of password-based encryption systems...
    Get full text
    Thesis
  4. 4
    by Ali Mohamed, Nachaat Abdelatif
    Published 2022
    ... organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent...
    Get full text
    Thesis
  5. 5
    by Mahmoud Al-Emari, Salam Radi
    Published 2022
    ... to light due to the existing attacks that targeted Ethereum, for instance, the Ethereum DAO attack...
    Get full text
    Thesis
  6. 6
    by Memon, Ubedullah
    Published 2022
    ...Since the last decade, terrorist attacks on the government primary schools of Pakistan surged rage...
    Get full text
    Thesis
  7. 7
    by Lim, Say Yarn
    Published 2007
    ... known, watermark information which is embedded in frequency domain is more robust to attacks. Logo...
    Get full text
    Thesis
  8. 8
    by Mustapha, Mohammed
    Published 2022
    ... attacks by the BH terror group in northeastern Nigeria, with devastating consequences on the national...
    Get full text
    Thesis
  9. 9
    by Jameel, Mahmood Subhi
    Published 2021
    ... to corrosion, chemical attacks, high surface area to volume ratio and hold massive potential to be strong...
    Get full text
    Thesis