Showing 1 - 20 results of 44 for search '"Attacker"', query time: 0.03s Refine Results
  1. 1
    by Roslan, Fairuzan
    Published 2004
    ... of the greatest problems the security community faces is lack of information on the attacker. This is one...
    Get full text
    Thesis
  2. 2
    by Mohamad Alias, Mohd Azuan
    Published 2012
    ...Port knocking is technique first introduce in the Black Hat to prevent attackers from discovering...
    Get full text
    Thesis
  3. 3
    ... password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without...
    Get full text
    Thesis
  4. 4
  5. 5
    by Sapri, Nurnadia
    Published 2015
    ..., it is unsecure because the attacker can break security parameters to obtain access to the data that currently...
    Get full text
    Thesis
  6. 6
    by Abdul Jalil, Mohd Fairuz
    Published 2008
    ... vulnerabilities that does not require security expertise is desirable. By using SQL injection attacks, an attacker...
    Get full text
    Thesis
  7. 7
    by Mohamed, Kamsiah
    Published 2022
    ... cipher relies on substitution and permutation function to protect the cipher against any attacks...
    Get full text
    Thesis
  8. 8
    by Mat Nor, Fazli
    Published 2016
    ... client-side application vulnerabilities as well as privacy threats. Attackers could exploit...
    Get full text
    Thesis
  9. 9
    by Mubarak, Mohd Faizal
    Published 2015
    ... of RFID system with other devices introduce security vulnerabilities which could be exploited by attackers...
    Get full text
    Thesis
  10. 10
    by Mat Isa, Mohd Anuar
    Published 2018
    ... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...
    Get full text
    Thesis
  11. 11
    by Baharudin, Muhammad Saufi
    Published 2009
    .... By using massive attack of zombie, the attackers launch a distribution denial of services (ddos) against...
    Get full text
    Thesis
  12. 12
    by Kamarudin, Nazhatul Hafizah
    Published 2018
    ... threatened by security attacks. It is noted that the use of username and password as an authentication scheme...
    Get full text
    Thesis
  13. 13
    by Yahaya, Zulkifli
    Published 2005
    ... between the two airfoils. The effects of Reynolds numbers, angles of attack, and airfoil profiles...
    Get full text
    Thesis
  14. 14
    by Mohamed, Nur Nabila
    Published 2019
    ... lacks of access control mechanism and no protection from Man In The Middle (MITM) attack. The security...
    Get full text
    Thesis
  15. 15
    by Mohd Nor, Mohd Khairi
    Published 2012
    ... vital policy for users and organization since most commonly attack launched because of the vulnerability...
    Get full text
    Thesis
  16. 16
    by Rosli, Athirah
    Published 2017
    .... The developed equation was validated via experimentation that involved testing the UDP flooding attack, TCP...
    Get full text
    Thesis
  17. 17
    ... and the basic concept of how PGP works and its key components. We also will look into the possible attack...
    Get full text
    Thesis
  18. 18
    by Abdul Rahman, Qatrunnada
    Published 2017
    ... in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man...
    Get full text
    Thesis
  19. 19
    by Ahmad, Aini
    Published 2017
    ...DDos - is a volumetric attack that comes from multiple sources toward a targeted object (website...
    Get full text
    Thesis
  20. 20
    by Azman, Nor Fazalina
    Published 2016
    ... to login to the web page. The proposed technique is proven to mitigate few types of attacks such as Man...
    Get full text
    Thesis