Showing 1 - 19 results of 19 for search '"Attacker"', query time: 0.03s Refine Results
  1. 1
    by Safiee, Mohd. Fauzan
    Published 2007
    ...An Intrusion Detection System (IDS) is detects and blocks unwanted attacks to the civilian...
    Get full text
    Thesis
  2. 2
    ...The growth of the Internet and networking has made securing networks against attacks a very...
    Get full text
    Thesis
  3. 3
    by Valashani, Pouya Bagherpour
    Published 2013
    ... are studied: attacking cash machine, cashier’s attacking and making the store messy. In implementing...
    Get full text
    Thesis
  4. 4
    ...-based methods, while in automated methods the robustness against intentional or unintentional attacks...
    Get full text
    Thesis
  5. 5
    by Choong, Kai Bin
    Published 2018
    ...”. Text-based CAPTCHA is the most common technique used across the internet to detect bot from attacking...
    Get full text
    Thesis
  6. 6
    by Chang, Yu Cheng
    Published 2004
    ... scheme such that it is vulnerable to some form of attacks. Since Brand’s scheme is the basis of most E...
    Thesis
  7. 7
    by Mat Sidek, Abd. Rahim
    Published 2006
    ... to determine their characteristics. The analysis consists; statistical test, correlation attack, linear...
    Get full text
    Thesis
  8. 8
    by Fahmi Ariaff, Mohd. Faizz
    Published 2013
    ... stroke, heart attack and heart disease. In this case, accurate blood pressure measurement and prediction...
    Get full text
    Thesis
  9. 9
    by Ahmad, Ashraf Adamu
    Published 2014
    ..., threat detection, and as a support to electronic attack system. Its main feature is to determine...
    Thesis
  10. 10
    by Hew, Kean Yung
    Published 2008
    ... testability and reliability, which in turn will protect the system from attack and will incur less testing...
    Get full text
    Thesis
  11. 11
    by Paraman, Norlina
    Published 2005
    ...Software development for network monitoring is very important to discover new ways of attacking...
    Get full text
    Thesis
  12. 12
    by Al-Hasan, Waleed S. Hasan
    Published 2015
    ... the security problem but proposed technique can withstand attacks....
    Get full text
    Thesis
  13. 13
    by Raja Mohd. Radzi, Raja Zahilah
    Published 2007
    ... applications, such as target identification and tracking. WSN are prone to failure and malicious user attack...
    Get full text
    Thesis
  14. 14
    by Ismail, Mohd. Izuan
    Published 2006
    ... but exposes to attackers. Cryptography services are essential in order to provide the authentication, privacy...
    Get full text
    Thesis
  15. 15
    by Abdul Halim, Abdul Jaafar
    Published 2007
    ... as the number of the terrorist attacks keep increasing from time to time and the technology knowledge...
    Get full text
    Thesis
  16. 16
    by Khalaf, Mohammed Abdullah
    Published 2016
    ... to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI...
    Get full text
    Thesis
  17. 17
    by Tijjani, Auwal Shehu
    Published 2015
    ... the cell is vulnerable to virus and bacteria attack. In future, the technique will supplement the present...
    Get full text
    Thesis
  18. 18
    by Jabas, Hatem Nabih
    Published 2018
    ... attack system. Its main feature is to determine the Pulse Descriptor Words (PDWs) which consists of: 1...
    Get full text
    Thesis
  19. 19
    by Yeap, Yong Yew
    Published 2018
    ... geometrical attacks. With the proposed technique, an overall accuracy rate of 84.33% and 82.79% is obtained...
    Get full text
    Thesis