Showing 1 - 10 results of 10 for search '"Attacker"', query time: 0.02s Refine Results
  1. 1
    by Nordin, Norfarina
    Published 2020
    ...The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has...
    Get full text
    Thesis
  2. 2
    ... of attackers which publicly embarrasses the victim by sharing some personal information of the victim...
    Get full text
    Thesis
  3. 3
    by Daim, Siti Baroroh
    Published 2019
    ... of this research is to analyze chronology of Bukit Kepong Police Station attack using 3D model of Bukit Kepong...
    Get full text
    Thesis
  4. 4
    by Bismi, Nur Syafiqa
    Published 2020
    ... phones used. One acts as a client and a personal computer act as an attacker. Wireshark and packet...
    Get full text
    Thesis
  5. 5
    by Irfan Abu Hassan, Nur Muhammad
    Published 2020
    ... occurred in the system such as Distributed Denial of Services’ (DDoS) attack which possess difficulty when...
    Get full text
    Thesis
  6. 6
    by Mad Yusop, Alfi Afzal
    Published 2020
    ...% of the total tree that are estimated to be at risk of the attack and it was found that all the tree situated 15...
    Get full text
    Thesis
  7. 7
    by Mohd Alias, Mohamad Ridzuan
    Published 2020
    ... to shield users browsing activity and encrypts data transmitted over the network to prevent sniffing attack...
    Get full text
    Thesis
  8. 8
    by Md Asri, Nur Syafiqa
    Published 2020
    ... attack in Christchurch, New Zealand were selected as case studies. The data was observed approximately 14...
    Get full text
    Thesis
  9. 9
  10. 10
    by Che Humaidi, Siti Nur zulaikha
    Published 2018
    ... than underweight whereby leads too many chronic diseases such as diabetes mellitus and heart attack...
    Get full text
    Thesis