Showing 1 - 20 results of 22 for search '"Attacker"', query time: 0.03s Refine Results
  1. 1
    by Siew, Hong Wei
    Published 2013
    ...The main aims of this study are divided into, firstly, a generic model of crosstalk attack and its...
    Thesis
  2. 2
    by Lim, Boon Ping
    Published 2006
    ...Denial of service (DoS) attacks tie up resources of a remote host or network, thereby denying...
    Thesis
  3. 3
    by Ali, Sameer
    Published 2021
    ..., it is susceptible to attacker’s Distributed Denial of Service (DDoS) attacks. DDoS attacks are the main causes...
    Thesis
  4. 4
    by Chong, Siew Chin
    Published 2005
    ... biometric specific threats. There is risk of being compromised by attacker where an attacker might use...
    Thesis
  5. 5
    by Bashier, Housam Khalifa
    Published 2015
    ... authentication system that is resistant against shoulder-surfing attacks. Hence, in this research work a solution...
    Thesis
  6. 6
    by Phan, Raphael Chung We
    Published 2002
    ... and illustrate a dedicated attact and impossible differential attack on the AES. We also present our results...
    Thesis
  7. 7
    by Phan, Raphael Chung Wei
    Published 2002
    ... and illustrate a dedicated attact and impossible differential attack on the AES. We also present our results...
    Thesis
  8. 8
    by Chan, Gaik Yee
    Published 2012
    ... to address the problems or countermeasure the attacks occurring at the Application Layer. These ID/IP...
    Thesis
  9. 9
    by Yap, Wun She
    Published 2015
    ... and thus cannot be regarded as an ideal cipher. We also present the first known cryptanalytic attack against...
    Thesis
  10. 10
    by Chin, Ji Jian
    Published 2014
    ....’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks and a result...
    Thesis
  11. 11
    by Behna, Rouzbeh
    Published 2013
    ... addressing the private key escrow problem at the same time. Firstly, two attacks are mounted on an efficient...
    Thesis
  12. 12
    by Go, Bok Min
    Published 2006
    ... to exploit their special properties/weaknesses to attack public-key-based security protocols....
    Thesis
  13. 13
    by Kai, Chong Zan
    Published 2010
    ...This thesis presents a robust packet drop attack detection protocol (named as Separation...
    Thesis
  14. 14
    by Chin, Yong Jian
    Published 2012
    ... such as - higher degree of freedom, less prone to spoof attacks, and lower error rates. In the proposed solution...
    Thesis
  15. 15
    by Lee, Nicholas Ming Ze
    Published 2019
    ... (NIDS) has since become a significant topic of research. Most network attacks are not caused by a single...
    Thesis
  16. 16
    by Lee, Sui Ping
    Published 2019
    ..., dedicated for interferometric synthetic aperture radar applications. The proposed algorithm solver attacks...
    Thesis
  17. 17
    by Hussain, Syed Nazir
    Published 2021
    ... problems due to connection errors, sensor faults, and security attacks. This research addresses the problem...
    Thesis
  18. 18
    by Mah, Meng Chuan
    Published 2019
    ... to the UAV operation. The wireless communication link can be vulnerable to malicious attacks such as jamming...
    Thesis
  19. 19
    by Salem, Mohammed Ahmed
    Published 2020
    ... the characteristics of the physical wireless channel to prevent the eavesdropper interruptions and attacks. The use...
    Thesis
  20. 20
    by Chin, Zi Hau
    Published 2021
    ... to fluctuation of hash rate caused by miners leaving or entering the network such as an attack or sudden events...
    Thesis