Showing 1 - 20 results of 26 for search '"Attacker"', query time: 0.03s Refine Results
  1. 1
  2. 2
    by Mohd. Ghazzali, Amalina
    Published 2008
    ...This study of web worms attack on web application can be implemented to enhance the security...
    Get full text
    Thesis
  3. 3
    by Mohamad, Nurul Zawiyah
    Published 2008
    ... to keep sensitive and confidential information. Since SQL injection attacks occurred as a new way...
    Get full text
    Thesis
  4. 4
    by Modirkhazeni, Ali
    Published 2011
    ... of conventional techniques of attack and the attacks that are not desirable because of limited resources is a...
    Get full text
    Thesis
  5. 5
    by Kashefi, Iman
    Published 2013
    ... for attackers. Among the leaders in the world of smartphones, Android is a novel platform with rapidly growing...
    Get full text
    Thesis
  6. 6
  7. 7
    by Cheraghi, Seyed Mohammad
    Published 2013
    ... malicious user may deliberately mislead other vehicles and vehicular agencies. Sybil attacks have been...
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
    by Ashouruan, Bahram Yaghoubzadeh
    Published 2013
    ..., it is compromised in face to various sorts of attacks. Unfortunately, none of the presented secured routing...
    Get full text
    Thesis
  11. 11
    by Mandala, Satria
    Published 2012
    ...Mobile Adhoc Network (MANET) is vulnerable to network attacks due toits open communication medium...
    Get full text
    Thesis
  12. 12
    by Daud, Ali Yusny
    Published 2002
    ...) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form...
    Get full text
    Thesis
  13. 13
    by Emami, Mir Shahriar
    Published 2012
    ... that current digital image watermarking approaches are prone to be impacted by watermarking attacks which...
    Get full text
    Thesis
  14. 14
    by Haratian, Mohammad Hossein
    Published 2009
    ... number of efforts have concentrated on handling the vast variety of security attacks. The characteristic...
    Get full text
    Thesis
  15. 15
    by Hamood, Sabah Fadhel
    Published 2013
    ... and security against attacks. In this study Fibonacci numbers have been exploited to achieve these goals...
    Get full text
    Thesis
  16. 16
    by Mnati, Mustafa Nasser
    Published 2010
    ..., but the problem of robustness and transparency from any attack is still becomes the main research issue...
    Get full text
    Thesis
  17. 17
    ...Insider attack is formsthe biggest threat against database management systems. Although many...
    Get full text
    Thesis
  18. 18
    by Abdulkadir, Abubakar
    Published 2013
    .... The used of IDS to deter the massively sophisticated attacks in most of our industries, governmental...
    Get full text
    Thesis
  19. 19
    by Mandala, Satria
    Published 2005
    ..., the nodes become susceptible from several network attacks such as address spoofing, Distributed Denial...
    Get full text
    Thesis
  20. 20
    by Mohd. Shariff, Muhammad Reza
    Published 2008
    ... disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number...
    Get full text
    Thesis