Showing 1 - 20 results of 65 for search '"Attacker"', query time: 0.03s Refine Results
  1. 1
    ... building. Amongst the common conservation problems of heritage buildings, salt attack and rising damp...
    Get full text
    Thesis
  2. 2
    by Elejla, Omar E. O.
    Published 2018
    ... in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have...
    Get full text
    Thesis
  3. 3
    by Omar, Mohd Nizam
    Published 2011
    ... to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation...
    Get full text
    Thesis
  4. 4
    by Ghaben, Ayman Ibrahim Ali
    Published 2023
    ...This thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed...
    Get full text
    Thesis
  5. 5
    ...The goal of the thesis is to propose an approach that can detect flash crowd attacks that target...
    Get full text
    Thesis
  6. 6
    by Mosa, Mohammad Rasmi Hassun
    Published 2013
    ... to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a...
    Get full text
    Thesis
  7. 7
    by Mohammed Ahmed Saad, Redhwan
    Published 2016
    ..., in which ICMP can be blocked or dropped. ICMPv6 opens the door for attackers to attack IPv6 networks...
    Get full text
    Thesis
  8. 8
  9. 9
    by Ibrahim Al-Ani, Ahmed Khallel
    Published 2020
    ... aims to prevent a DoS attack during the DAD process by designing a rule-based mechanism. The proposed...
    Get full text
    Thesis
  10. 10
  11. 11
    by Cheng, Han Pin
    Published 2008
    ... menjanakan banyak sambungan palsu terhadap pelayan tersebut. Naptha attack aims to disrupt TCP service a...
    Get full text
    Thesis
  12. 12
    by Yunanto, Sri
    Published 2013
    ...This thesis attempts to analyze the involvement of militant Islamist groups in terror attacks...
    Get full text
    Thesis
  13. 13
    by Eid, Almazrooie Mishal
    Published 2018
    ...Asymmetric and symmetric cryptography are believed to be secure against any attack using classical...
    Get full text
    Thesis
  14. 14
    by Mohamad Fadli, Zolkipli
    Published 2012
    ...-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a common...
    Get full text
    Thesis
  15. 15
    by Chong , Chuong Leong
    Published 2011
    ... power at a rotational speed of 300rpm. Wind turbine is investigated as a function of angle of attack...
    Get full text
    Thesis
  16. 16
    by Ibrahim, Ayman Khallel
    Published 2020
    ... making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well...
    Get full text
    Thesis
  17. 17
    by Kasno,
    Published 1982
    ...) ,merupakan serangga yang terpilih untuk dikaji lebih lanjut. A search for arthropods attacking water...
    Get full text
    Thesis
  18. 18
    by Ng, Lee Ping
    Published 2004
    ... implemented in this project are shown to be sensitive for the attack. Attacks applied in this project...
    Get full text
    Thesis
  19. 19
    ... and robust properties which makes it resistant to different well-known attacks. However, existing hybrid SVD...
    Get full text
    Thesis
  20. 20
    by Umar, Wan Ahmad Syahir Wan
    Published 2019
    .... Regardless of type of buildings, termite can be found attacking some common places in the buildings. Termites...
    Get full text
    Thesis