Showing 1 - 8 results of 8 for search '"Attacker"', query time: 0.02s Refine Results
  1. 1
    by Kuhanraj, Balan
    Published 2020
    ... serious network threats such as denial of service attack, data modification attack, impersonation attack...
    Get full text
    Thesis
  2. 2
  3. 3
    by Yasir, Javed
    Published 2020
    ...). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle...
    Get full text
    Thesis
  4. 4
    by Chanderan, Navein
    Published 2019
    ... of malware are just not enough to combat modern malware attack as it has inherent limitation...
    Get full text
    Thesis
  5. 5
    by Tan, Colin Choon Lin
    Published 2021
    ... phishing attacks. Mainstream solutions and technical approaches for phishing detection suffer from inherent...
    Get full text
    Thesis
  6. 6
    by Faiezah, Abdullah.
    Published 2009
    ... attacked by any biological degradation agents such as fungi, insects and marine borers. There are several...
    Get full text
    Thesis
  7. 7
    by Anes Abdulhadi, Mohammed Jawad
    Published 2018
    ... oxidative stress, which induces ROS, such as 'OH, 02'- and H202 generation, that attack cell components...
    Get full text
    Get full text
    Thesis
  8. 8