Showing 41 - 60 results of 81 for search '"Attacker"', query time: 0.04s Refine Results
  1. 41
    by Arab, Farnaz
    Published 2014
    ... metadata of pixels to ensure achievable efficiency to detect more attacks. All these required additional...
    Get full text
    Thesis
  2. 42
    by Fatani, Tariq Abdulaziz D.
    Published 2013
    ... of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices...
    Get full text
    Thesis
  3. 43
    by Krishnan, Ashvini Devi
    Published 2013
    .... Security specification languages can be used to represent security specification such as attack...
    Thesis
  4. 44
    by Dabiranzohouri, Miranda
    Published 2014
    ... on their computers. The expressiveness of the PDF format, furthermore, enables attackers to evade detection...
    Thesis
  5. 45
    by Abdulqawi, Ala Abdulrahman
    Published 2013
    ... customer information. Malware attacks, phishing fraudsters and other types of attacks have become well...
    Get full text
    Thesis
  6. 46
    by Hussein, Mohamud Sheikh Ali
    Published 2014
    ... to the increasing attacks even in such a new ways of attacks for that reason improving intrusion detection system...
    Thesis
  7. 47
    by Hassan, Reband Jamil
    Published 2014
    ...-square attack. In this study, a new colour image steganography technique is proposed using the LSB...
    Thesis
  8. 48
    by Josiah, Kekere Temitope
    Published 2015
    ... malicious attacks. Intrusion detection serves as a second line of defense apart from firewall...
    Get full text
    Thesis
  9. 49
    by Adnan, Myasar Mundher
    Published 2013
    ... attacks. In this thesis, The RGB colour image watermarking is proposed using by Discrete Slantlet...
    Get full text
    Thesis
  10. 50
    by Ali, Bokan Omar
    Published 2013
    .... It is predominantly used for copyright protection against copyright infringement and malicious attacks. Embedding a...
    Get full text
    Thesis
  11. 51
    by Abunada, Ahmed A. A.
    Published 2013
    ... to detect novel attacks and produces high false alarm. Besides, data labeling is expensive and time...
    Get full text
    Thesis
  12. 52
    by Majid, Gelareh
    Published 2014
    ... image, is one of the frequently used techniques. Adding different type of attack such as noise...
    Thesis
  13. 53
    by Aslahi, Bibi Masoomeh
    Published 2013
    ... on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve...
    Get full text
    Thesis
  14. 54
    by Khiabani, Hamed
    Published 2013
    ... works showed that the accuracy of the model improved from 2% to 41.3% during an oscillating attack...
    Get full text
    Thesis
  15. 55
    by Nasser, Alzahrani Jalal
    Published 2013
    ... types of attacks is applied on watermarked image namely, Gaussian noise, Salt & Pepper Noise, Poisson...
    Thesis
  16. 56
    by Aslahi Shahri, Bibi Masoomeh
    Published 2013
    ... on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve...
    Get full text
    Thesis
  17. 57
    by Kadhim, Karrar Abdul Ameer
    Published 2013
    ..., six types of attacks are applied on watermarked image namely, Gaussian noise, Salt & Pepper Noise...
    Get full text
    Thesis
  18. 58
    by Soltanmohammadi, Saeed
    Published 2013
    ... records. Accessing HIS data through the internet make it more vulnerable to data lost, misuses and attacks...
    Get full text
    Thesis
  19. 59
    ... sure the embedding watermark is undetectable by the human eye, robust against common attack...
    Get full text
    Thesis
  20. 60
    by Shoukat, Ijaz Ali
    Published 2016
    ... (significant than existing). Moreover, mathematical testing shows that common security attacks...
    Get full text
    Thesis