Showing 1 - 20 results of 215 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1
    by Alahmadi, Ahmed Mohammed A.
    Published 2018
    ... to achieve these vital features the Bitcoin system should be provably secure against the attacks. Many...
    Get full text
    Thesis
  2. 2
    by Apandi, Mohamad Aiman Hanif
    Published 2019
    ...In the wireless network, there is an attack called Wormhole attack that capable in confusing...
    Get full text
    Thesis
  3. 3
  4. 4
    by Hasan, Dahah Ahmed Haidarah
    Published 2019
    ... threats is phishing attacks launched for the purpose of stealing certain sensitive information of victims...
    Get full text
    Thesis
  5. 5
    by Izaddoost, Alireza
    Published 2008
    ... to its intended users. The Denial of Service (DoS) attacks are becoming more serious in security...
    Get full text
    Thesis
  6. 6
    by Ghobadifar, Faranak
    Published 2015
    ... in the fields. The main purpose of this research was to determinate pest attack in paddy field using remote...
    Get full text
    Thesis
  7. 7
    by Ahmed, Dana Hasan
    Published 2017
    ... Reflection Denial of Service (DRDoS) attacks which are called Reflection/Amplification and hassles...
    Get full text
    Thesis
  8. 8
    by Javan, Ali
    Published 2011
    ... threats including coordinated distributed attacks have flourished against the vital services and priceless...
    Get full text
    Thesis
  9. 9
    by Hussein, Noor Sabeeh
    Published 2016
    ... kinds of attacks like denial of service attacks, sybil attacks, jamming attacks, black/sink hole attacks...
    Get full text
    Thesis
  10. 10
    by Rastegari, Samaneh
    Published 2009
    .... In order to prevent this system from different types of attacks, we need to prepare a classification...
    Get full text
    Thesis
  11. 11
    by Mohd Ariffin, Noor Afiza
    Published 2017
    ... data against all types of attacks. Furthermore, most current research only focuses on improving...
    Get full text
    Thesis
  12. 12
  13. 13
    by Mustafa, Mohd Nawawi
    Published 2015
    ... security incidents is failure to determine the root cause of an incident, thus allowing the attacker...
    Get full text
    Thesis
  14. 14
    by Shaukat, Haafizah Rameeza
    Published 2014
    ... them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks...
    Get full text
    Thesis
  15. 15
    by Abdul Razak, Aina Nabila
    Published 2019
    ... to be protected from any attacks. The malware detection process becomes a challenge because the attacker has a new...
    Get full text
    Thesis
  16. 16
    by Enshaei, Mehdi
    Published 2015
    ... to attacks due to the open, cooperative and dynamic nature and needs a new method for secure communication...
    Get full text
    Thesis
  17. 17
    by Che Hasan, Hafizah
    Published 2018
    .... However, NFC is susceptible to some attacks such as data fabrication and eavesdropping. Thus, the mobile...
    Get full text
    Thesis
  18. 18
    by Malekzadeh, Mina
    Published 2011
    .... The main threats against availability of the networks are Denial of Service (DoS) and replay attacks...
    Get full text
    Thesis
  19. 19
    by AlRashidi, Bedour Fahhad Hamed
    Published 2015
    Subjects: ...Denial of service attacks...
    Get full text
    Thesis
  20. 20
    by Khan, Samia
    Published 2018
    ... the disadvantage of being attacked by various types of attacks, specifically black hole attacks and Distributed...
    Get full text
    Thesis