Showing 21 - 40 results of 65 for search '"Attacker"', query time: 0.04s Refine Results
  1. 21
    by Khor, Jing Huey
    Published 2013
    ... attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight...
    Get full text
    Thesis
  2. 22
    by Melhim, Loai Kayed Hassan Bani
    Published 2012
    ... the Internet. This has shifted the focus of cyber attackers from curiosity to financial gain. Attackers use...
    Get full text
    Thesis
  3. 23
    by Awadallah, Ruba N S
    Published 2022
    ... attack (IND-CCA2) because of their malleable nature. Moreover, the client (data owner) cannot prove...
    Get full text
    Thesis
  4. 24
    by Al-Saedi, Karim Hashim Kraidi
    Published 2013
    ... of the threat they pose. Therefore, it is difficult for the security analyst to identify attacks and take...
    Get full text
    Thesis
  5. 25
    by Khairunnisa, Khairunnisa
    Published 2012
    ...Primary school children who develop asthmatic attack during school hours required assistance from...
    Get full text
    Thesis
  6. 26
    by Yaacob, Che Mohd Aziz
    Published 2009
    ... sehingga sukar dibendung. On January 4, 2004, an unidentified group attacked a military camp...
    Get full text
    Thesis
  7. 27
    by Omolara, Abiodun Esther
    Published 2020
    ... scheme to address brute-force attacks specifically in the context of password-based encryption systems...
    Get full text
    Thesis
  8. 28
    ... sessions efficiently and effectively are needed to solve database loading, passive attacks...
    Get full text
    Thesis
  9. 29
    by Ahmed Ali, Ghassan
    Published 2011
    ...) dengan peneroboh. Increasing of network attacks with sophisticated forms has made the network security...
    Get full text
    Thesis
  10. 30
  11. 31
    by Chua , Tze Ping
    Published 2010
    ... for Thermal Interface Materials (TIM) due to its ease of processing, inert to chemical attack, non-toxic...
    Get full text
    Thesis
  12. 32
    by Zulkarnain, Mohammed
    Published 2018
    ...In the wake of the September 11, 2001 attacks, home-grown terrorism (HGT) emerged with significant...
    Get full text
    Thesis
  13. 33
    by Ribadu, Abubakar Bashir
    Published 2018
    ... the nature of attacks and threats faced by investors in the NE by the BH terrorists. Secondly, this is also...
    Get full text
    Thesis
  14. 34
    by Kadir, Ramlah
    Published 2016
    ... be fatal and one of the leading causes of death and illness in the world. The bacteria typi cally attack...
    Get full text
    Thesis
  15. 35
    by Rasdi, Rasnaizam
    Published 2016
    ... be fatal and one of the leading causes of death and illness in the world. The bacteria typi cally attack...
    Get full text
    Thesis
  16. 36
    by Leau, Yu Beng
    Published 2016
    ...% of attacks in web-based applications. The accuracy of IPS can be improved if the network situation is also...
    Get full text
    Thesis
  17. 37
    ... of an open wireless communication medium where messages are exchanged in the plain text allowing attackers...
    Get full text
    Thesis
  18. 38
    ... of neural networks on classifying those features into normal and attack instances. To realize...
    Get full text
    Thesis
  19. 39
    by Ali Hassan, Abdullah Alashw Al
    Published 2008
    .... There was no history of previous similar attack and no medical illness had been known. Social history revealed that he...
    Get full text
    Thesis
  20. 40
    by Jaafar, Mohd Yazid Mohd
    Published 2013
    ... proved that the proposed protocol can resist known attacks against VoIP communication....
    Get full text
    Thesis