-
1by Roslan, Fairuzan“... of the greatest problems the security community faces is lack of information on the attacker. This is one...”
Published 2004
Get full text
Thesis -
2by Mohamad Alias, Mohd Azuan“...Port knocking is technique first introduce in the Black Hat to prevent attackers from discovering...”
Published 2012
Get full text
Thesis -
3by Ahmad Tarmizi Lim, Siti Naquiah“... password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without...”
Published 2016
Get full text
Thesis -
4by Ametefe, Divine Senanu“... widespread use, AFIS is highly vulnerable to presentation attacks involving the fabrication and presentation...”
Published 2023
Get full text
Thesis -
5by Sapri, Nurnadia“..., it is unsecure because the attacker can break security parameters to obtain access to the data that currently...”
Published 2015
Get full text
Thesis -
6by Abdul Jalil, Mohd Fairuz“... vulnerabilities that does not require security expertise is desirable. By using SQL injection attacks, an attacker...”
Published 2008
Get full text
Thesis -
7by Mohamed, Kamsiah“... cipher relies on substitution and permutation function to protect the cipher against any attacks...”
Published 2022
Get full text
Thesis -
8by Mat Nor, Fazli“... client-side application vulnerabilities as well as privacy threats. Attackers could exploit...”
Published 2016
Get full text
Thesis -
9A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarakby Mubarak, Mohd Faizal“... of RFID system with other devices introduce security vulnerabilities which could be exploited by attackers...”
Published 2015
Get full text
Thesis -
10by Mat Isa, Mohd Anuar“... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...”
Published 2018
Get full text
Thesis -
11by Baharudin, Muhammad Saufi“.... By using massive attack of zombie, the attackers launch a distribution denial of services (ddos) against...”
Published 2009
Get full text
Thesis -
12by Kamarudin, Nazhatul Hafizah“... threatened by security attacks. It is noted that the use of username and password as an authentication scheme...”
Published 2018
Get full text
Thesis -
13by Yahaya, Zulkifli“... between the two airfoils. The effects of Reynolds numbers, angles of attack, and airfoil profiles...”
Published 2005
Get full text
Thesis -
14by Mohamed, Nur Nabila“... lacks of access control mechanism and no protection from Man In The Middle (MITM) attack. The security...”
Published 2019
Get full text
Thesis -
15by Mohd Nor, Mohd Khairi“... vital policy for users and organization since most commonly attack launched because of the vulnerability...”
Published 2012
Get full text
Thesis -
16by Rosli, Athirah“.... The developed equation was validated via experimentation that involved testing the UDP flooding attack, TCP...”
Published 2017
Get full text
Thesis -
17by Harun, Hilmi“... and the basic concept of how PGP works and its key components. We also will look into the possible attack...”
Get full text
Thesis -
18by Abdul Rahman, Qatrunnada“... in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man...”
Published 2017
Get full text
Thesis -
19by Ahmad, Aini“...DDos - is a volumetric attack that comes from multiple sources toward a targeted object (website...”
Published 2017
Get full text
Thesis -
20by Azman, Nor Fazalina“... to login to the web page. The proposed technique is proven to mitigate few types of attacks such as Man...”
Published 2016
Get full text
Thesis