Showing 1 - 20 results of 33 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1
    by Lau, Wei Khang
    Published 2016
    ... applied to digital files to withstand against cropping and resizing attack. In this Dual-watennarking...
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
    by Ibrahim, Husam Hamid
    Published 2018
    ... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
    by Ridha, Hussein Ali
    Published 2020
    ... communication from malicious attacks. The data is enabled to be received by the recipients. The data is delayed...
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
    by Ibrahim, Husam Hamid
    Published 2018
    ... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
    by Lau, Wei Khang
    Published 2016
    ... applied to digital files to withstand against cropping and resizing attack. In this Dual-watermarking...
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
    by Ali, Mohammed Qasim
    Published 2019
    ... to transmit information using IPv6 stack. Sensors perform critical tasks and become targets of attacks...
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
    by Hassan, Abdullahi Mohamud
    Published 2015
    .... Currently the capability of repetition codes on various attacks in not sufficiently studied...
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
    by Said, Mohamed Abdisalan
    Published 2015
    ... had shown that the watermark is robust to geometric attacks and removal attacks. DCT and DWT...
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
    by Ahmed Marwan, Idrees Aleesa
    Published 2021
    ...The news about distributed denial of service (DDoS) attacks is rapidly increased around the world...
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
    by Ahmed Khalaf, Bashar
    Published 2019
    ...) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety...
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
    by Koh, Wen Wen
    Published 2019
    ... to ensure the design of KDF may withstand any types of attacks. Nowadays, there are five security models...
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
    by Elrowayati, Ali Abdulhafid
    Published 2020
    ... and/or unintentional attacks, such as recompression attack, lossy channel attacks, signal processing attacks, frame...
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
    by Ahmad Khalid, Shamsul Kamal
    Published 2018
    ...In today’s world, designer of a watermarking system had to constantly faced with determined attacks...
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
    by Yaakub, Mohd Fauzi
    Published 2019
    ...The issue of high angle of attacks at the retreating blade receives attention from countless...
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
    by Omotunde, Habeeb Oladapo
    Published 2018
    ...As SQL injection attack (SQLIA) continues to threaten web applications despite several techniques...
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
    by Sarhan, Ali Raheem
    Published 2015
    ... Reynolds number airfoils were used to design air catchers with three angles of attack and four different...
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
    by Mushtaq, Muhammad Faheem
    Published 2019
    ... cubes are not sufficient to resist attacks and could easily be exploited. Therefore, the large key space...
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
    by Hassan Disina, Abdulkadir
    Published 2018
    ... attack. Similarly, the key space should be disproportionately large to resist any attack on the secret...
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
    by Zarir, Mustafa Nadhim
    Published 2018
    ... it additionally corresponds to attacks on pc systems. The distinguishing actions that mitigate the operations...
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20
    by Ali, Mohammed Ahnaf
    Published 2019
    ... that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve...
    Get full text
    Get full text
    Get full text
    Thesis