-
1
-
2by Mohd. Ghazzali, Amalina“...This study of web worms attack on web application can be implemented to enhance the security...”
Published 2008
Get full text
Thesis -
3by Mohamad, Nurul Zawiyah“... to keep sensitive and confidential information. Since SQL injection attacks occurred as a new way...”
Published 2008
Get full text
Thesis -
4by Modirkhazeni, Ali“... of conventional techniques of attack and the attacks that are not desirable because of limited resources is a...”
Published 2011
Get full text
Thesis -
5by Kashefi, Iman“... for attackers. Among the leaders in the world of smartphones, Android is a novel platform with rapidly growing...”
Published 2013
Get full text
Thesis -
6
-
7by Cheraghi, Seyed Mohammad“... malicious user may deliberately mislead other vehicles and vehicular agencies. Sybil attacks have been...”
Published 2013
Get full text
Thesis -
8
-
9
-
10by Ashouruan, Bahram Yaghoubzadeh“..., it is compromised in face to various sorts of attacks. Unfortunately, none of the presented secured routing...”
Published 2013
Get full text
Thesis -
11by Mandala, Satria“...Mobile Adhoc Network (MANET) is vulnerable to network attacks due toits open communication medium...”
Published 2012
Get full text
Thesis -
12by Daud, Ali Yusny“...) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form...”
Published 2002
Get full text
Thesis -
13by Emami, Mir Shahriar“... that current digital image watermarking approaches are prone to be impacted by watermarking attacks which...”
Published 2012
Get full text
Thesis -
14by Haratian, Mohammad Hossein“... number of efforts have concentrated on handling the vast variety of security attacks. The characteristic...”
Published 2009
Get full text
Thesis -
15by Hamood, Sabah Fadhel“... and security against attacks. In this study Fibonacci numbers have been exploited to achieve these goals...”
Published 2013
Get full text
Thesis -
16by Mnati, Mustafa Nasser“..., but the problem of robustness and transparency from any attack is still becomes the main research issue...”
Published 2010
Get full text
Thesis -
17by Mohammed Rashad Aldhoqm, Arafat“...Insider attack is formsthe biggest threat against database management systems. Although many...”
Published 2013
Get full text
Thesis -
18by Abdulkadir, Abubakar“.... The used of IDS to deter the massively sophisticated attacks in most of our industries, governmental...”
Published 2013
Get full text
Thesis -
19by Mandala, Satria“..., the nodes become susceptible from several network attacks such as address spoofing, Distributed Denial...”
Published 2005
Get full text
Thesis -
20by Mohd. Shariff, Muhammad Reza“... disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number...”
Published 2008
Get full text
Thesis