Showing 1 - 20 results of 44 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1
    by Haron, Haliza
    Published 2015
    ... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...
    Get full text
    Get full text
    Thesis
  2. 2
    by Abdollah, Mohd Faizal
    Published 2009
    ... transaction. They have also become the main mean to attack host. The popularity of intrusion tools and script...
    Get full text
    Get full text
    Thesis
  3. 3
    by Mohd Salleh, Nurhashikin
    Published 2018
    ... uses the Internet as their platform to form online communities and launch their attack...
    Get full text
    Get full text
    Thesis
  4. 4
    by Salih Ali, Nabeel
    Published 2015
    ... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...
    Get full text
    Get full text
    Thesis
  5. 5
    by Mohd Foozy, Cik Feresa
    Published 2017
    ... the framework for a single attack detection for Spam has been studied. Phishing has never been studied. Existing...
    Get full text
    Get full text
    Thesis
  6. 6
    by Halizah, Saad
    Published 2013
    ... of Android design also become it flaw because it not only attract Android user but also attacker for Android...
    Get full text
    Get full text
    Thesis
  7. 7
    by Abdul Mubin, Norzul Masri
    Published 2017
    .... Mobile device are the main devices that can be manipulates by the attacker towards their victims...
    Get full text
    Get full text
    Thesis
  8. 8
    by Hirzan, Alauddin Maulana
    Published 2017
    ... to allow transmission. Attacker from IPv6 network can use this tunneling mechanism to send intrusion...
    Get full text
    Get full text
    Thesis
  9. 9
    by Abdullah, Raihana Syahirah
    Published 2016
    ...Botnets is a tool for high-profile cyber-attack. It is a collection of compromised computer...
    Get full text
    Get full text
    Thesis
  10. 10
    by Pang, Kok An
    Published 2021
    ... against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading...
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
    by Abdullah, Ahmad Shafawi
    Published 2019
    .... It was observed that bio mimetic design generated 50% more lift at 10° angle of attack compare to same profile...
    Get full text
    Get full text
    Thesis
  13. 13
    by Jamal, Zalifh
    Published 2017
    ... in 2013 reached 600 million, and has grown rapidly in recent years. Malware can attack a wide variety...
    Get full text
    Get full text
    Thesis
  14. 14
    by Suziee, Sukarti
    Published 2013
    ... of corrosion attack has also been discussed on the basis of the morphology and the content properties...
    Get full text
    Get full text
    Thesis
  15. 15
    by Mohammad, Nur Ameera Natasha
    Published 2022
    ... their attacks. This is with a view of fact that an email becomes one of the primary targets of an internal...
    Get full text
    Get full text
    Thesis
  16. 16
    by Jaber, Mustafa Musa
    Published 2016
    ... that caused cannot stop and prevent the attacks of terrorist. Recently, a prevalent relationship between...
    Get full text
    Get full text
    Thesis
  17. 17
    by Abbas, Thamer J.
    Published 2017
    ... that did not prevent the terrorist attacks. Recently, a prevalent relationship between information sharing...
    Get full text
    Get full text
    Thesis
  18. 18
    by Zainuddin, Farah Ayiesya
    Published 2019
    ... of attack α = 15° to α = 18°. These angles of attack are the important phases for airfoil during stall...
    Get full text
    Get full text
    Thesis
  19. 19
    by Hameed, Mustafa Emad
    Published 2022
    ... for high-level security against for various kinds of attacks such as denial-of-service (DoS), Distributed...
    Get full text
    Get full text
    Thesis
  20. 20
    by Najiahtul Syafiqah, Ismail
    Published 2013
    ... diagram of DroidKungFu1 and generate attack pattern of DroidKungFu1. This result will help future...
    Get full text
    Get full text
    Thesis