Showing 1 - 9 results of 9 for search '"Attacker"', query time: 0.02s Refine Results
  1. 1
    ... medium, WLANs are vulnerable to a myriad of attacks. Although there have been concerted efforts...
    Get full text
    Thesis
  2. 2
    by Mohammed Alhaj, Tagwa Ahmed
    Published 2018
    ...Attack Scenario Construction (ASC) via Alert Correlation (AC) is important to reveal the strategy...
    Get full text
    Thesis
  3. 3
    by Al-Rimy, Bander Ali Saleh
    Published 2019
    .... Even after neutralizing such attacks, the targeted files remain encrypted. This irreversible effect...
    Get full text
    Thesis
  4. 4
    ... images requires the generation of intricate secret keys that protect the images from diverse attacks...
    Get full text
    Thesis
  5. 5
    by Ibrahim, Nurudeen Mahmud
    Published 2019
    ... the issue of poor detection accuracy due to insignificant features and coordinated attacks...
    Get full text
    Thesis
  6. 6
    by Abdul Rauf, Abdul Rauf
    Published 2019
    ... of users as well as cloud resources from inside and outside attacks....
    Get full text
    Thesis
  7. 7
    by Safaei, Mahmood
    Published 2019
    ... factors such as noise, weak received signal strength or intrusion attacks. The process of detecting highly...
    Get full text
    Thesis
  8. 8
    by Taha, Mustafa Sabah
    Published 2020
    ... against the statistical, X2 , Histogram and non-structural steganalysis detection attacks. The obtained...
    Get full text
    Thesis
  9. 9
    by Abrahim, Araz Rajab
    Published 2019
    ... the impact of blurring shallow depth, homogenous area, and noise attacks to improve the accuracy. Therefore...
    Get full text
    Thesis