-
1
-
2
-
3
-
4by Sanaei, Mojtaba Ghanaatpisheh“..., selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One...”
Published 2013
Get full text
Thesis -
5by Khan, Muhammad Murad“... In The Middle can observe key exchange messages and can setup MITM attack between communication. Security...”
Published 2013
Get full text
Thesis -
6by Ardestani, Parichehr Manouchehri“... and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which...”
Published 2013
Get full text
Thesis -
7by Abadi, Ahad Akbar“... issues still the considerable difficulties for customers. This means the attacks which can threat...”
Published 2013
Get full text
Thesis -
8by Boroujerdizadeh, Ali“.... We narrow down the project to a specific attack. Collusion attack is the main problem for video...”
Published 2013
Get full text
Thesis -
9by Hosseini, Seyed Mostafa Mir“... is going to explore integrity attacks in RFID systems. Even though the previous related works have...”
Published 2013
Get full text
Thesis -
10by Bojnord, Hoda Soltanian“.... VANET security is essential because a badly designed VANET is vulnerable to network attacks...”
Published 2013
Get full text
Thesis -
11
-
12
-
13by Farahmandian, Sara“... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...”
Published 2013
Get full text
Thesis -
14by Kordi, Elahe Fazeldeh“... MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best...”
Published 2014
Get full text
Thesis -
15by Dolatabadi, Zahra Sadat Shams“... to propose a method that can offer high resistance against some image distortions in the geometrical attack...”
Published 2013
Get full text
Thesis -
16by Araghi, Tanya Koohpayeh“... important issue for developing mobile ad hoc networks (MANETs). They expose to various kinds of attacks...”
Published 2013
Get full text
Thesis -
17by Abukar Sufi, Abdul Kadir“... domain, which the attacker have been successfully access the database file and the data became exposed...”
Published 2014
Thesis -
18by Sufi, Abdulkadir Abukar“... domain, which the attacker have been successfully access the database file and the data became exposed...”
Published 2014
Get full text
Thesis -
19by Abrishamchi, Mohammad Ali Nassiri“.... The adversaries attempt to launch the variety of attacks against a system to capture their needed information...”
Published 2014
Thesis -
20by Abrishamchi, Mohammad Ali Nassiri“.... The adversaries attempt to launch the variety of attacks against a system to capture their needed information...”
Published 2014
Get full text
Thesis