Showing 1 - 20 results of 196 for search 'AT*', query time: 0.06s Refine Results
  1. 1
    by Jafar, Ibraheem
    Published 2017
    ... little attention to data quality issue. Meanwhile, the more the data quality, the more accurate...
    Get full text
    Thesis
  2. 2
  3. 3
    by Kordi, Elahe Fazeldeh
    Published 2014
    ... MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best...
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
    by Mohd. Miswan, Siti Hidayah
    Published 2014
    ... focuses on the development of a model for the attitude elements which is one of the components...
    Get full text
    Thesis
  8. 8
  9. 9
    by Mahmood, Azmi
    Published 1992
    ... atau kejuruteraan. Tesis ini membincangkan suatu penyelidikan yang melibatkan penjanaan aturcara...
    Thesis
  10. 10
    by Abadi, Ahad Akbar
    Published 2013
    ... even more attractive as a service. Without Virtualization cloud computing cannot achieve to its...
    Get full text
    Thesis
  11. 11
    by Dolatabadi, Zahra Sadat Shams
    Published 2013
    ... to propose a method that can offer high resistance against some image distortions in the geometrical attack...
    Get full text
    Thesis
  12. 12
    by Boroujerdizadeh, Ali
    Published 2013
    .... We narrow down the project to a specific attack. Collusion attack is the main problem for video...
    Get full text
    Thesis
  13. 13
    by Bojnord, Hoda Soltanian
    Published 2013
    .... VANET security is essential because a badly designed VANET is vulnerable to network attacks...
    Get full text
    Thesis
  14. 14
  15. 15
    by Araghi, Tanya Koohpayeh
    Published 2013
    ... important issue for developing mobile ad hoc networks (MANETs). They expose to various kinds of attacks...
    Get full text
    Thesis
  16. 16
  17. 17
    ... have attracted a great deal of attention over the years. The wormhole attack can affect the performance...
    Get full text
    Thesis
  18. 18
    by Farahmandian, Sara
    Published 2013
    ... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...
    Get full text
    Thesis
  19. 19
    by Hosseini, Seyed Mostafa Mir
    Published 2013
    ... is going to explore integrity attacks in RFID systems. Even though the previous related works have...
    Get full text
    Thesis
  20. 20
    by Nagalingam, Vanisri
    Published 2014
    ... online banking to online meeting. There are many types of online attacks and one of the famous online...
    Thesis