Showing 1 - 20 results of 52 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1
    by Mohd Jaafar, Fatin Haziqah
    Published 2013
    ...This study is about termite attack at historical building, where it is involves a conservation work...
    Get full text
    Thesis
  2. 2
    by Azali, Muhamad Rizal
    Published 2005
    ...This project is using a honeypot as a tool to detect internal network attack at Faculty...
    Get full text
    Thesis
  3. 3
    by Mohd Fauzi, Shukor Sanim
    Published 2003
    ... of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems...
    Get full text
    Thesis
  4. 4
    by Md Ilyas, Siti Sarah
    Published 2017
    ...The number of phishing attacks involving online banking has records an increase percentage over...
    Get full text
    Thesis
  5. 5
    by Ahmad, Zaid
    Published 2014
    .... Unfortunately, the AODV protocol is vulnerable to attacks due to the lack of security. Among various kinds...
    Get full text
    Thesis
  6. 6
    by Ibrahim, Riziana
    Published 2012
    ...The cyber attack is a severe attack that might cause harm especially to the big organization...
    Get full text
    Thesis
  7. 7
    by Mansor, Ahmad Abdul Azim
    Published 2007
    ... attacker techniques and how to defend against them. Little specialized knowledge is required to set up...
    Get full text
    Thesis
  8. 8
    by Baharuddin, Muhamad Syuhaimi
    Published 2004
    ... of the password to be captured through password guessing attacks or brute-force attack. So, to reduce...
    Thesis
  9. 9
    by Dak, Ahmad Yusri
    Published 2019
    ... to being vulnerable to jamming attacks. A study found that eighty one percent of attacks occurs...
    Get full text
    Thesis
  10. 10
    by Hashim, Md Nazri
    Published 2005
    ...Exploitation by attackers whose have breached the network security of some of the world's most...
    Get full text
    Thesis
  11. 11
    by Ismail, Izaitul Aida
    Published 2021
    .... Rhinoceros beetle (Oryctes rhinoceros) was a major pest and attacked both type of palma. This pest attacked...
    Get full text
    Thesis
  12. 12
    by Hamid Ali, Firkhan Ali
    Published 2004
    ...Exploitation by attackers whose have breached the network security of some of the world's most...
    Get full text
    Thesis
  13. 13
    by Engliman, Muhammad Ariff
    Published 2014
    ... or passing made towards obtaining field goals or penalty comers won by the attacking team. Longer passing...
    Get full text
    Thesis
  14. 14
    by Wan Ali, Wan Nor Ashiqin
    Published 2015
    ... several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6...
    Get full text
    Thesis
  15. 15
    by Mokhtar, Ridwan
    Published 2006
    ... model and the three-dimensional results. The effects of angles of attack and aerofoil profiles were...
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
    by Mohamed, Nur Nabila
    Published 2015
    ... and simplicity but it provides no security mechanism which makes it vulnerable to various attacks. This work...
    Get full text
    Thesis
  19. 19
    by Abdul Satar, Azwan
    Published 2007
    ... to these networks. A large portion of these treats are in the form of spoof attacks. Spoof attacks involve...
    Get full text
    Thesis
  20. 20
    by Mubarak, Mohd Faizal
    Published 2010
    ... that unprotected RFID platform can be compromised either by malicious codes or man in the middle attack. System...
    Get full text
    Thesis