-
21by Abarghouei, Babak Emami“.... An attacker can devour the sensor resources. No central monitoring system, lead to mobile sensor network...”
Published 2013
Get full text
Thesis -
22by Alzubaidi, Mohammed Abdullah Omar“... that cloud computing has. Nevertheless, many researchers have suggested methods to mitigate those attacks...”
Published 2015
Get full text
Thesis -
23by Sadeghian, Amirmohammad“... also grows dramatically. One of the most serious and dangerous web application attacks is SQL injection...”
Published 2014
Thesis -
24by Abu Bakar, Nurul Badriah“... and unintentional attacks but the various available techniques for watermarking have yet to attain the best defence...”
Published 2013
Get full text
Thesis -
25by Nagalingam, Vanisri“... online banking to online meeting. There are many types of online attacks and one of the famous online...”
Published 2014
Thesis -
26by Farahpoor, Mohammadali“... Secret Sharing and Rabin’s Information Dispersal Algorithm. One of the most dangerous attacks which can...”
Published 2014
Thesis -
27by Mohammed Al-Aghbari, Anas Mustafa“... the attacks. Physical security is the most important because it is the first layer in security. In Yemen...”
Published 2013
Get full text
Thesis -
28by Dashti Khavidaki, Seyyed Mojtaba“...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...”
Published 2013
Get full text
Thesis -
29by Khavidaki, Seyyed Mojtaba Dashti“...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...”
Published 2013
Get full text
Thesis -
30by Mohamed, Ashara Banu“..., one of the main issues that still remains since its beginning is the huge amount of attack alerts...”
Published 2015
Get full text
Thesis -
31by Farrokhtala, Ali“... principles but still there is not any approved standard in this field. Black hole attack as one of the most...”
Published 2013
Get full text
Thesis -
32by Gaithuru, Juliet Nyokabi“... ways of attacking the algorithms used for encryption. This process of continued improvement...”
Published 2013
Get full text
Thesis -
33by Kalybayev, Almukhammed“... years, potentially leading to a loss of cash. The methods which are utilized by attackers to collect...”
Published 2013
Get full text
Thesis -
34by Mokaramian, Shahram“...2R classes, which include malicious attacks. Therefore, it requires a resampling technique...”
Published 2013
Get full text
Thesis -
35by Behnia, Armaghan“... period of validity it may compromise through brute force attacks or dictionary attacks. In order to come...”
Published 2013
Get full text
Thesis -
36by Noorlaily Izwana Ibrahim“... to the users. The term “malvertising” comes from the word malware and advertising. It is one type of attack...”
Published 2012
Get full text
Thesis -
37by Al-Aswer, Faisal Saleh Nasser“... to OWASP 2013 security report, Cross Site Scripting came in third place. Cross Site Scripting is an attack...”
Published 2017
Get full text
Thesis -
38by Md. Sirat @ Md. Siraj, Maheyzah“...The evolutions of computer network attacks have urged many organizations to install multiple...”
Published 2013
Get full text
Thesis -
39by Essa, Shawnim Ikram“... banking has given rise to an increase in attacks against banking institutions and their customers...”
Published 2013
Get full text
Thesis -
40by Siddiqui, Zeeshan“... for TMIS systems while addressing a number of authentication attacks along with performance issues. However...”
Published 2015
Get full text
Thesis