-
1by Lau, Wei Khang“... applied to digital files to withstand against cropping and resizing attack. In this Dual-watennarking...”
Published 2016
Get full text
Get full text
Get full text
Thesis -
2by Ibrahim, Husam Hamid“... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
3by Ridha, Hussein Ali“... communication from malicious attacks. The data is enabled to be received by the recipients. The data is delayed...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
4by Ibrahim, Husam Hamid“... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
5by Lau, Wei Khang“... applied to digital files to withstand against cropping and resizing attack. In this Dual-watermarking...”
Published 2016
Get full text
Get full text
Get full text
Thesis -
6by Ali, Mohammed Qasim“... to transmit information using IPv6 stack. Sensors perform critical tasks and become targets of attacks...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
7by Hassan, Abdullahi Mohamud“.... Currently the capability of repetition codes on various attacks in not sufficiently studied...”
Published 2015
Get full text
Get full text
Get full text
Thesis -
8by Said, Mohamed Abdisalan“... had shown that the watermark is robust to geometric attacks and removal attacks. DCT and DWT...”
Published 2015
Get full text
Get full text
Get full text
Thesis -
9by Ahmed Marwan, Idrees Aleesa“...The news about distributed denial of service (DDoS) attacks is rapidly increased around the world...”
Published 2021
Get full text
Get full text
Get full text
Thesis -
10by Ahmed Khalaf, Bashar“...) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
11by Koh, Wen Wen“... to ensure the design of KDF may withstand any types of attacks. Nowadays, there are five security models...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
12by Elrowayati, Ali Abdulhafid“... and/or unintentional attacks, such as recompression attack, lossy channel attacks, signal processing attacks, frame...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
13by Ahmad Khalid, Shamsul Kamal“...In today’s world, designer of a watermarking system had to constantly faced with determined attacks...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
14by Yaakub, Mohd Fauzi“...The issue of high angle of attacks at the retreating blade receives attention from countless...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
15by Omotunde, Habeeb Oladapo“...As SQL injection attack (SQLIA) continues to threaten web applications despite several techniques...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
16by Sarhan, Ali Raheem“... Reynolds number airfoils were used to design air catchers with three angles of attack and four different...”
Published 2015
Get full text
Get full text
Get full text
Thesis -
17by Mushtaq, Muhammad Faheem“... cubes are not sufficient to resist attacks and could easily be exploited. Therefore, the large key space...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
18by Hassan Disina, Abdulkadir“... attack. Similarly, the key space should be disproportionately large to resist any attack on the secret...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
19by Zarir, Mustafa Nadhim“... it additionally corresponds to attacks on pc systems. The distinguishing actions that mitigate the operations...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
20by Ali, Mohammed Ahnaf“... that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve...”
Published 2019
Get full text
Get full text
Get full text
Thesis