Showing 21 - 40 results of 81 for search '"Attacker"', query time: 0.03s Refine Results
  1. 21
    by Abarghouei, Babak Emami
    Published 2013
    .... An attacker can devour the sensor resources. No central monitoring system, lead to mobile sensor network...
    Get full text
    Thesis
  2. 22
    ... that cloud computing has. Nevertheless, many researchers have suggested methods to mitigate those attacks...
    Get full text
    Thesis
  3. 23
    by Sadeghian, Amirmohammad
    Published 2014
    ... also grows dramatically. One of the most serious and dangerous web application attacks is SQL injection...
    Thesis
  4. 24
    by Abu Bakar, Nurul Badriah
    Published 2013
    ... and unintentional attacks but the various available techniques for watermarking have yet to attain the best defence...
    Get full text
    Thesis
  5. 25
    by Nagalingam, Vanisri
    Published 2014
    ... online banking to online meeting. There are many types of online attacks and one of the famous online...
    Thesis
  6. 26
    by Farahpoor, Mohammadali
    Published 2014
    ... Secret Sharing and Rabin’s Information Dispersal Algorithm. One of the most dangerous attacks which can...
    Thesis
  7. 27
    ... the attacks. Physical security is the most important because it is the first layer in security. In Yemen...
    Get full text
    Thesis
  8. 28
    ...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...
    Get full text
    Thesis
  9. 29
    ...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...
    Get full text
    Thesis
  10. 30
    by Mohamed, Ashara Banu
    Published 2015
    ..., one of the main issues that still remains since its beginning is the huge amount of attack alerts...
    Get full text
    Thesis
  11. 31
    by Farrokhtala, Ali
    Published 2013
    ... principles but still there is not any approved standard in this field. Black hole attack as one of the most...
    Get full text
    Thesis
  12. 32
    by Gaithuru, Juliet Nyokabi
    Published 2013
    ... ways of attacking the algorithms used for encryption. This process of continued improvement...
    Get full text
    Thesis
  13. 33
    by Kalybayev, Almukhammed
    Published 2013
    ... years, potentially leading to a loss of cash. The methods which are utilized by attackers to collect...
    Get full text
    Thesis
  14. 34
    by Mokaramian, Shahram
    Published 2013
    ...2R classes, which include malicious attacks. Therefore, it requires a resampling technique...
    Get full text
    Thesis
  15. 35
    by Behnia, Armaghan
    Published 2013
    ... period of validity it may compromise through brute force attacks or dictionary attacks. In order to come...
    Get full text
    Thesis
  16. 36
    by Noorlaily Izwana Ibrahim
    Published 2012
    ... to the users. The term “malvertising” comes from the word malware and advertising. It is one type of attack...
    Get full text
    Thesis
  17. 37
    by Al-Aswer, Faisal Saleh Nasser
    Published 2017
    ... to OWASP 2013 security report, Cross Site Scripting came in third place. Cross Site Scripting is an attack...
    Get full text
    Thesis
  18. 38
    ...The evolutions of computer network attacks have urged many organizations to install multiple...
    Get full text
    Thesis
  19. 39
    by Essa, Shawnim Ikram
    Published 2013
    ... banking has given rise to an increase in attacks against banking institutions and their customers...
    Get full text
    Thesis
  20. 40
    by Siddiqui, Zeeshan
    Published 2015
    ... for TMIS systems while addressing a number of authentication attacks along with performance issues. However...
    Get full text
    Thesis