Showing 1 - 20 results of 81 for search '"Attacker"', query time: 0.03s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    by Sanaei, Mojtaba Ghanaatpisheh
    Published 2013
    ..., selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One...
    Get full text
    Thesis
  5. 5
    by Khan, Muhammad Murad
    Published 2013
    ... In The Middle can observe key exchange messages and can setup MITM attack between communication. Security...
    Get full text
    Thesis
  6. 6
    ... and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which...
    Get full text
    Thesis
  7. 7
    by Abadi, Ahad Akbar
    Published 2013
    ... issues still the considerable difficulties for customers. This means the attacks which can threat...
    Get full text
    Thesis
  8. 8
    by Boroujerdizadeh, Ali
    Published 2013
    .... We narrow down the project to a specific attack. Collusion attack is the main problem for video...
    Get full text
    Thesis
  9. 9
    by Hosseini, Seyed Mostafa Mir
    Published 2013
    ... is going to explore integrity attacks in RFID systems. Even though the previous related works have...
    Get full text
    Thesis
  10. 10
    by Bojnord, Hoda Soltanian
    Published 2013
    .... VANET security is essential because a badly designed VANET is vulnerable to network attacks...
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
    by Farahmandian, Sara
    Published 2013
    ... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...
    Get full text
    Thesis
  14. 14
    by Kordi, Elahe Fazeldeh
    Published 2014
    ... MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best...
    Get full text
    Thesis
  15. 15
    by Dolatabadi, Zahra Sadat Shams
    Published 2013
    ... to propose a method that can offer high resistance against some image distortions in the geometrical attack...
    Get full text
    Thesis
  16. 16
    by Araghi, Tanya Koohpayeh
    Published 2013
    ... important issue for developing mobile ad hoc networks (MANETs). They expose to various kinds of attacks...
    Get full text
    Thesis
  17. 17
    by Abukar Sufi, Abdul Kadir
    Published 2014
    ... domain, which the attacker have been successfully access the database file and the data became exposed...
    Thesis
  18. 18
    by Sufi, Abdulkadir Abukar
    Published 2014
    ... domain, which the attacker have been successfully access the database file and the data became exposed...
    Get full text
    Thesis
  19. 19
    .... The adversaries attempt to launch the variety of attacks against a system to capture their needed information...
    Thesis
  20. 20
    .... The adversaries attempt to launch the variety of attacks against a system to capture their needed information...
    Get full text
    Thesis