Showing 1 - 5 results of 5 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Aghabababaeyan, Reza
    Published 2015
    .... Robustness is one of the areas to be improved when an attack is implied to watermarked image. One of the main...
    Thesis
  2. 2
    by Ordi, Ali
    Published 2016
    ... in preventing Denial of Service (DoS) attacks. A ‘Connection Request Flooding’ DoS (CRF-DoS) attack is launched...
    Get full text
    Thesis
  3. 3
    by Mat Deli, Mohd. Sharudin
    Published 2017
    ... the computer and internet users from exposing themselves towards malware attacks, identifying the attacks...
    Get full text
    Thesis
  4. 4
    by Noroozi, Erfaneh
    Published 2015
    ..., replacement and collision attacks to check whether or not there is any detection of the same message...
    Get full text
    Thesis
  5. 5
    by Brohi, Sarfraz Nawaz
    Published 2015
    ... and integrity concerns. Malicious attackers have violated the cloud storages to steal, view, manipulate...
    Get full text
    Thesis